lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <hvgvn5n45dla46vehvoi63frvkzk7s2wnpbi6l3mrbfl5njk2y@ttfv2gestxf2>
Date: Thu, 1 Jan 2026 18:35:06 -0700
From: Xiang Mei <xmei5@....edu>
To: security@...nel.org
Cc: netdev@...r.kernel.org, jhs@...atatu.com, xiyou.wangcong@...il.com, 
	jiri@...nulli.us
Subject: Re: [PATCH net v2] net/sched: sch_qfq: Fix NULL deref when
 deactivating inactive aggregate in qfq_reset

On Thu, Jan 01, 2026 at 06:31:47PM -0700, Xiang Mei wrote:
> `qfq_class->leaf_qdisc->q.qlen > 0` does not imply that the class
> itself is active.
> 
> Two qfq_class objects may point to the same leaf_qdisc. This happens
> when:
> 
> 1. one QFQ qdisc is attached to the dev as the root qdisc, and
> 
> 2. another QFQ qdisc is temporarily referenced (e.g., via qdisc_get()
> / qdisc_put()) and is pending to be destroyed, as in function
> tc_new_tfilter.
> 
> When packets are enqueued through the root QFQ qdisc, the shared
> leaf_qdisc->q.qlen increases. At the same time, the second QFQ
> qdisc triggers qdisc_put and qdisc_destroy: the qdisc enters
> qfq_reset() with its own q->q.qlen == 0, but its class's leaf
> qdisc->q.qlen > 0. Therefore, the qfq_reset would wrongly deactivate
> an inactive aggregate and trigger a null-deref in qfq_deactivate_agg:
> 
> [    0.977749] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KAI
> [    0.978440] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
> [    0.978875] CPU: 0 UID: 0 PID: 135 Comm: exploit Not tainted 6.12.57 #3
> [    0.979270] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.17.0-0-gb52ca86e094d-prebuilt.qemu.or4
> [    0.979913] RIP: qfq_deactivate_agg+0x187/0xca0
> [    0.980200] Code: 00 fc ff df 48 89 fe 48 c1 ee 03 80 3c 16 00 0f 85 1d 09 00 00 48 be 00 00 00 00 00 fc ff df 48 80
> 
> Code starting with the faulting instruction
> ===========================================
>    0:	00 fc                	add    %bh,%ah
>    2:	ff                   	lcall  (bad)
>    3:	df 48 89             	fisttps -0x77(%rax)
>    6:	fe 48 c1             	decb   -0x3f(%rax)
>    9:	ee                   	out    %al,(%dx)
>    a:	03 80 3c 16 00 0f    	add    0xf00163c(%rax),%eax
>   10:	85 1d 09 00 00 48    	test   %ebx,0x48000009(%rip)        # 0x4800001f
>   16:	be 00 00 00 00       	mov    $0x0,%esi
>   1b:	00 fc                	add    %bh,%ah
>   1d:	ff                   	lcall  (bad)
>   1e:	df 48 80             	fisttps -0x80(%rax)
> [    0.981234] RSP: 0018:ffff8880106d73f8 EFLAGS: 00010246
> [    0.981517] RAX: 0000000000000000 RBX: ffff88800c518000 RCX: ffff888010bc1358
> [    0.981943] RDX: 0000000000000000 RSI: dffffc0000000000 RDI: 0000000000000000
> [    0.982336] RBP: ffff888010bc1340 R08: ffff88800c518158 R09: ffff88800c518158
> [    0.982734] R10: 1ffff110018a302c R11: ffffffff89689156 R12: 0000000000000000
> [    0.983140] R13: ffff888010bc0180 R14: 0000000000000000 R15: ffff888010bc1350
> [    0.983521] FS:  0000000009737380(0000) GS:ffff8880bf000000(0000) knlGS:0000000000000000
> [    0.983955] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [    0.984270] CR2: 00000000097c1000 CR3: 000000000ee7c004 CR4: 0000000000772ef0
> [    0.984654] PKRU: 55555554
> [    0.984804] Call Trace:
> [    0.984957]  <TASK>
> [    0.985084]  qfq_reset_qdisc+0x27c/0x3e0
> [    0.985316]  ? __pfx_mutex_lock+0x10/0x10
> [    0.985541]  qdisc_reset+0x9d/0x590
> [    0.985736]  ? __tcf_block_put+0x2e/0x2b0
> [    0.985980]  ? __pfx_mutex_unlock+0x10/0x10
> [    0.986237]  ? __tcf_chain_put+0x4a/0x880
> [    0.986465]  __qdisc_destroy+0xb2/0x280
> [    0.986686]  tc_new_tfilter+0x9af/0x2180
> [    0.986932]  ? __pfx_stack_trace_consume_entry+0x10/0x10
> [    0.987216]  ? __pfx_stack_trace_consume_entry+0x10/0x10
> [    0.987505]  ? __pfx_tc_new_tfilter+0x10/0x10
> [    0.987755]  ? unwind_get_return_address+0x5e/0xa0
> [    0.988025]  ? arch_stack_walk+0xac/0x100
> [    0.988241]  ? stack_depot_save_flags+0x29/0x7e0
> [    0.988506]  ? stack_trace_save+0x94/0xd0
> [    0.988722]  ? security_capable+0xda/0x160
> [    0.988970]  rtnetlink_rcv_msg+0x543/0xc50
> [    0.989204]  ? __pfx_rtnetlink_rcv_msg+0x10/0x10
> [    0.989458]  netlink_rcv_skb+0x134/0x370
> [    0.989676]  ? __pfx_rtnetlink_rcv_msg+0x10/0x10
> [    0.989951]  ? __pfx_netlink_rcv_skb+0x10/0x10
> [    0.990190]  ? __pfx___netlink_lookup+0x10/0x10
> [    0.990440]  ? kasan_save_track+0x14/0x30
> [    0.990659]  ? _copy_from_iter+0x214/0x1100
> [    0.990886]  netlink_unicast+0x6db/0xa20
> [    0.991116]  ? __pfx_netlink_unicast+0x10/0x10
> [    0.991355]  ? unwind_get_return_address+0x5e/0xa0
> [    0.991616]  ? arch_stack_walk+0xac/0x100
> [    0.991854]  ? __check_object_size+0x46c/0x690
> [    0.992091]  netlink_sendmsg+0x72b/0xbd0
> [    0.992301]  ? __pfx_netlink_sendmsg+0x10/0x10
> [    0.992545]  ? __pfx_aa_file_perm+0x10/0x10
> [    0.992793]  sock_write_iter+0x489/0x560
> [    0.993043]  ? kmem_cache_free+0x249/0x4b0
> [    0.993282]  ? __pfx_sock_write_iter+0x10/0x10
> [    0.993565]  ? security_file_permission+0x7e/0xe0
> [    0.993922]  ? rw_verify_area+0x70/0x4d0
> [    0.994192]  vfs_write+0x930/0xea0
> [    0.994439]  ? __pfx_vfs_write+0x10/0x10
> [    0.994642]  ? fdget_pos+0x57/0x4f0
> [    0.994810]  ? __call_rcu_common.constprop.0+0x247/0x7a0
> [    0.995105]  ksys_write+0x17c/0x1d0
> [    0.995290]  ? __pfx_ksys_write+0x10/0x10
> [    0.995511]  ? __x64_sys_close+0x7c/0xd0
> [    0.995732]  do_syscall_64+0x58/0x120
> [    0.995959]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
> [    0.996233] RIP: 0033:0x424c34
> [    0.996397] Code: 89 02 48 c7 c0 ff ff ff ff eb bd 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 80 3d 2d 44 09 00 09
> 
> Code starting with the faulting instruction
> ===========================================
>    0:	89 02                	mov    %eax,(%rdx)
>    2:	48 c7 c0 ff ff ff ff 	mov    $0xffffffffffffffff,%rax
>    9:	eb bd                	jmp    0xffffffffffffffc8
>    b:	66 2e 0f 1f 84 00 00 	cs nopw 0x0(%rax,%rax,1)
>   12:	00 00 00
>   15:	90                   	nop
>   16:	f3 0f 1e fa          	endbr64
>   1a:	80 3d 2d 44 09 00 09 	cmpb   $0x9,0x9442d(%rip)        # 0x9444e
> [    0.997360] RSP: 002b:00007ffea27af418 EFLAGS: 00000202 ORIG_RAX: 0000000000000001
> [    0.997746] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000424c34
> [    0.998123] RDX: 000000000000003c RSI: 00000000097bf5d0 RDI: 0000000000000003
> [    0.998495] RBP: 00007ffea27af460 R08: 0000000000000000 R09: 0000000000000000
> [    0.998862] R10: 0000000000000001 R11: 0000000000000202 R12: 00007ffea27af5c8
> [    0.999224] R13: 00007ffea27af5d8 R14: 00000000004b3828 R15: 0000000000000001
> [    0.999592]  </TASK>
> [    0.999711] Modules linked in:
> [    0.999899] ---[ end trace 0000000000000000 ]---
> [    1.000143] RIP: qfq_deactivate_agg+0x187/0xca0
> [    1.000396] Code: 00 fc ff df 48 89 fe 48 c1 ee 03 80 3c 16 00 0f 85 1d 09 00 00 48 be 00 00 00 00 00 fc ff df 48 80
> 
> Code starting with the faulting instruction
> ===========================================
>    0:	00 fc                	add    %bh,%ah
>    2:	ff                   	lcall  (bad)
>    3:	df 48 89             	fisttps -0x77(%rax)
>    6:	fe 48 c1             	decb   -0x3f(%rax)
>    9:	ee                   	out    %al,(%dx)
>    a:	03 80 3c 16 00 0f    	add    0xf00163c(%rax),%eax
>   10:	85 1d 09 00 00 48    	test   %ebx,0x48000009(%rip)        # 0x4800001f
>   16:	be 00 00 00 00       	mov    $0x0,%esi
>   1b:	00 fc                	add    %bh,%ah
>   1d:	ff                   	lcall  (bad)
>   1e:	df 48 80             	fisttps -0x80(%rax)
> [    1.001456] RSP: 0018:ffff8880106d73f8 EFLAGS: 00010246
> [    1.001735] RAX: 0000000000000000 RBX: ffff88800c518000 RCX: ffff888010bc1358
> [    1.002107] RDX: 0000000000000000 RSI: dffffc0000000000 RDI: 0000000000000000
> [    1.002478] RBP: ffff888010bc1340 R08: ffff88800c518158 R09: ffff88800c518158
> [    1.002853] R10: 1ffff110018a302c R11: ffffffff89689156 R12: 0000000000000000
> [    1.003204] R13: ffff888010bc0180 R14: 0000000000000000 R15: ffff888010bc1350
> [    1.003559] FS:  0000000009737380(0000) GS:ffff8880bf000000(0000) knlGS:0000000000000000
> [    1.003962] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
> [    1.004243] CR2: 00000000097c1000 CR3: 000000000ee7c004 CR4: 0000000000772ef0
> [    1.004599] PKRU: 55555554
> [    1.004740] Kernel panic - not syncing: Fatal exception
> [    1.005071] Kernel Offset: disabled
> 
> Fixes: 0545a3037773 ("pkt_sched: QFQ - quick fair queue scheduler")
> Signed-off-by: Xiang Mei <xmei5@....edu>
> ---
> v2: attach the crash information to the commit message
> 
>  net/sched/sch_qfq.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/net/sched/sch_qfq.c b/net/sched/sch_qfq.c
> index d920f57dc6d7..f4013b547438 100644
> --- a/net/sched/sch_qfq.c
> +++ b/net/sched/sch_qfq.c
> @@ -1481,7 +1481,7 @@ static void qfq_reset_qdisc(struct Qdisc *sch)
>  
>  	for (i = 0; i < q->clhash.hashsize; i++) {
>  		hlist_for_each_entry(cl, &q->clhash.hash[i], common.hnode) {
> -			if (cl->qdisc->q.qlen > 0)
> +			if (cl_is_active(cl))
>  				qfq_deactivate_class(q, cl);
>  
>  			qdisc_reset(cl->qdisc);
> -- 
> 2.43.0
>

Sorry for the delay of update.

For the new version of patch, I attached the crash infomation decoded from
scripts/decode_stacktrace.sh.

Thanks,
Xiang

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ