lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <aCHATgAjsQS2EMIx@calendula>
Date: Mon, 12 May 2025 11:33:02 +0200
From: Pablo Neira Ayuso <pablo@...filter.org>
To: jianqi.ren.cn@...driver.com
Cc: gregkh@...uxfoundation.org, stable@...r.kernel.org,
	patches@...ts.linux.dev, linux-kernel@...r.kernel.org,
	kadlec@...filter.org, fw@...len.de, davem@...emloft.net,
	edumazet@...gle.com, kuba@...nel.org, pabeni@...hat.com,
	netfilter-devel@...r.kernel.org, coreteam@...filter.org,
	netdev@...r.kernel.org
Subject: Re: [PATCH 6.1.y] netfilter: nf_tables: fix memleak in map from
 abort path

Hi,

NACK.

This patch requires:

  e79b47a8615d ("netfilter: nf_tables: restore set elements when delete set fails")

which you have skipped for some reason.

On Mon, May 12, 2025 at 11:02:52AM +0800, jianqi.ren.cn@...driver.com wrote:
> From: Pablo Neira Ayuso <pablo@...filter.org>
> 
> [ Upstream commit 86a1471d7cde792941109b93b558b5dc078b9ee9 ]
> 
> The delete set command does not rely on the transaction object for
> element removal, therefore, a combination of delete element + delete set
> from the abort path could result in restoring twice the refcount of the
> mapping.
> 
> Check for inactive element in the next generation for the delete element
> command in the abort path, skip restoring state if next generation bit
> has been already cleared. This is similar to the activate logic using
> the set walk iterator.
> 
> [ 6170.286929] ------------[ cut here ]------------
> [ 6170.286939] WARNING: CPU: 6 PID: 790302 at net/netfilter/nf_tables_api.c:2086 nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]
> [ 6170.287071] Modules linked in: [...]
> [ 6170.287633] CPU: 6 PID: 790302 Comm: kworker/6:2 Not tainted 6.9.0-rc3+ #365
> [ 6170.287768] RIP: 0010:nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]
> [ 6170.287886] Code: df 48 8d 7d 58 e8 69 2e 3b df 48 8b 7d 58 e8 80 1b 37 df 48 8d 7d 68 e8 57 2e 3b df 48 8b 7d 68 e8 6e 1b 37 df 48 89 ef eb c4 <0f> 0b 48 83 c4 08 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 0f
> [ 6170.287895] RSP: 0018:ffff888134b8fd08 EFLAGS: 00010202
> [ 6170.287904] RAX: 0000000000000001 RBX: ffff888125bffb28 RCX: dffffc0000000000
> [ 6170.287912] RDX: 0000000000000003 RSI: ffffffffa20298ab RDI: ffff88811ebe4750
> [ 6170.287919] RBP: ffff88811ebe4700 R08: ffff88838e812650 R09: fffffbfff0623a55
> [ 6170.287926] R10: ffffffff8311d2af R11: 0000000000000001 R12: ffff888125bffb10
> [ 6170.287933] R13: ffff888125bffb10 R14: dead000000000122 R15: dead000000000100
> [ 6170.287940] FS:  0000000000000000(0000) GS:ffff888390b00000(0000) knlGS:0000000000000000
> [ 6170.287948] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [ 6170.287955] CR2: 00007fd31fc00710 CR3: 0000000133f60004 CR4: 00000000001706f0
> [ 6170.287962] Call Trace:
> [ 6170.287967]  <TASK>
> [ 6170.287973]  ? __warn+0x9f/0x1a0
> [ 6170.287986]  ? nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]
> [ 6170.288092]  ? report_bug+0x1b1/0x1e0
> [ 6170.287986]  ? nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]
> [ 6170.288092]  ? report_bug+0x1b1/0x1e0
> [ 6170.288104]  ? handle_bug+0x3c/0x70
> [ 6170.288112]  ? exc_invalid_op+0x17/0x40
> [ 6170.288120]  ? asm_exc_invalid_op+0x1a/0x20
> [ 6170.288132]  ? nf_tables_chain_destroy+0x2b/0x220 [nf_tables]
> [ 6170.288243]  ? nf_tables_chain_destroy+0x1f7/0x220 [nf_tables]
> [ 6170.288366]  ? nf_tables_chain_destroy+0x2b/0x220 [nf_tables]
> [ 6170.288483]  nf_tables_trans_destroy_work+0x588/0x590 [nf_tables]
> 
> Fixes: 591054469b3e ("netfilter: nf_tables: revisit chain/object refcounting from elements")
> Signed-off-by: Pablo Neira Ayuso <pablo@...filter.org>
> [fixed conflicts due to missing commits
>  0e1ea651c9717ddcd8e0648d8468477a31867b0a ("netfilter: nf_tables: shrink
>  memory consumption of set elements") and
>  9dad402b89e81a0516bad5e0ac009b7a0a80898f ("netfilter: nf_tables: expose
>  opaque set element as struct nft_elem_priv") so we pass the correct types
>  and values to nft_setelem_active_next() + nft_set_elem_ext()]
> Signed-off-by: Jianqi Ren <jianqi.ren.cn@...driver.com>
> Signed-off-by: He Zhe <zhe.he@...driver.com>
> ---
> Verified the build test
> ---
>  net/netfilter/nf_tables_api.c | 16 ++++++++++++++--
>  1 file changed, 14 insertions(+), 2 deletions(-)
> 
> diff --git a/net/netfilter/nf_tables_api.c b/net/netfilter/nf_tables_api.c
> index 656c4fb76773..1d4d77d21d61 100644
> --- a/net/netfilter/nf_tables_api.c
> +++ b/net/netfilter/nf_tables_api.c
> @@ -6772,6 +6772,16 @@ void nft_data_hold(const struct nft_data *data, enum nft_data_types type)
>  	}
>  }
>  
> +static int nft_setelem_active_next(const struct net *net,
> +				   const struct nft_set *set,
> +				   struct nft_set_elem *elem)
> +{
> +	const struct nft_set_ext *ext = nft_set_elem_ext(set, elem->priv);
> +	u8 genmask = nft_genmask_next(net);
> +
> +	return nft_set_elem_active(ext, genmask);
> +}
> +
>  static void nft_setelem_data_activate(const struct net *net,
>  				      const struct nft_set *set,
>  				      struct nft_set_elem *elem)
> @@ -10115,8 +10125,10 @@ static int __nf_tables_abort(struct net *net, enum nfnl_abort_action action)
>  		case NFT_MSG_DELSETELEM:
>  			te = (struct nft_trans_elem *)trans->data;
>  
> -			nft_setelem_data_activate(net, te->set, &te->elem);
> -			nft_setelem_activate(net, te->set, &te->elem);
> +			if (!nft_setelem_active_next(net, te->set, &te->elem)) {
> +				nft_setelem_data_activate(net, te->set, &te->elem);
> +				nft_setelem_activate(net, te->set, &te->elem);
> +			}
>  			if (!nft_setelem_is_catchall(te->set, &te->elem))
>  				te->set->ndeact--;
>  
> -- 
> 2.34.1
> 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ