lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CACGkMEt+LW8FBNwcn6f0cBwTOuKy+ZPy3Smg6fJgo9OrCUAOjQ@mail.gmail.com>
Date:   Tue, 25 Jul 2023 11:39:46 +0800
From:   Jason Wang <jasowang@...hat.com>
To:     Andrew Kanner <andrew.kanner@...il.com>
Cc:     davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org,
        pabeni@...hat.com, netdev@...r.kernel.org, brouer@...hat.com,
        linux-kernel@...r.kernel.org,
        linux-kernel-mentees@...ts.linuxfoundation.org,
        syzbot+f817490f5bd20541b90a@...kaller.appspotmail.com
Subject: Re: [PATCH 2/2] drivers: net: prevent tun_can_build_skb() to exceed
 xdp size limits

On Tue, Jul 25, 2023 at 6:15 AM Andrew Kanner <andrew.kanner@...il.com> wrote:
>
> Tested with syzkaller repro with reduced packet size. It was
> discovered that XDP_PACKET_HEADROOM is not checked in
> tun_can_build_skb(), although pad may be incremented in
> tun_build_skb().
>
> Fixes: 7df13219d757 ("tun: reserve extra headroom only when XDP is set")
> Link: https://syzkaller.appspot.com/text?tag=ReproC&x=12b2593ea80000
> Signed-off-by: Andrew Kanner <andrew.kanner@...il.com>
> ---
>  drivers/net/tun.c | 8 +++++++-
>  1 file changed, 7 insertions(+), 1 deletion(-)
>
> diff --git a/drivers/net/tun.c b/drivers/net/tun.c
> index 18ccbbe9830a..cdf2bd85b383 100644
> --- a/drivers/net/tun.c
> +++ b/drivers/net/tun.c
> @@ -1582,7 +1582,13 @@ static void tun_rx_batched(struct tun_struct *tun, struct tun_file *tfile,
>  static bool tun_can_build_skb(struct tun_struct *tun, struct tun_file *tfile,
>                               int len, int noblock, bool zerocopy, int *skb_xdp)
>  {
> -       if (SKB_DATA_ALIGN(len + TUN_RX_PAD) +
> +       int pad = TUN_RX_PAD;
> +       struct bpf_prog *xdp_prog = rcu_dereference(tun->xdp_prog);

This misses rcu read lock.

I wonder if things could be simpler if we move the limit check from
tun_can_build_skb() to tun_build_skb():

rcu_read_lock();
xdp_prog = rcu_dereference(tun->xdp_prog);
        if (xdp_prog)
                pad += XDP_PACKET_HEADROOM;
buflen += SKB_DATA_ALIGN(len + pad);
rcu_read_unlock();

Thanks

> +
> +       if (xdp_prog)
> +               pad += XDP_PACKET_HEADROOM;
> +
> +       if (SKB_DATA_ALIGN(len + pad) +
>             SKB_DATA_ALIGN(sizeof(struct skb_shared_info)) > PAGE_SIZE) {
>                 *skb_xdp = 0;
>                 return false;
> --
> 2.39.3
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ