Received: by 2002:a05:6a10:1a4d:0:0:0:0 with SMTP id nk13csp5777277pxb; Mon, 14 Feb 2022 07:23:57 -0800 (PST) X-Google-Smtp-Source: ABdhPJz5w0I3Vyfc0AegVtmgQb8+h1vSXVJWsfWjl70R1puhy8Zd6wWMQsOWmtEfiztrYbQqdU5Q X-Received: by 2002:a63:2bc5:: with SMTP id r188mr188905pgr.363.1644852236769; Mon, 14 Feb 2022 07:23:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1644852236; cv=none; d=google.com; s=arc-20160816; b=I0iQYyEMhIQPvBR7cAXzp63pa1FiKyseyYKcYsrE2vjrD+EC0oc3kjwjg8+mW0Cw95 x4Mx3XZhul94nSEh0CdTY6WomlYmuVsO4AVZtfGjWBBUuMfRpqXhxDennxFXZdAv8uCx dA6TO1SeXTi6t37XrxvzF7J2g4S+uflHymrlTpAOzfbGquYfaMIM9ph2mLgqMWdS63yk ugwKFwSIF1KKsumSyfjjXzHd9DHQrHRCwOIMnbeIcV3A4vjMpSR6SOide7BgjOH7YfV5 Dce3eT4DhED0ednbFe1iYMTZs3oN7HcvSNRQuVsla5WLloI5vwy67fax2tGOFTk1Vszg vRug== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=qi4htwqUmHWpW589WSF3d0d05irybebr+yd1SHKaBlc=; b=YKX/E1QMqkaS/SR5upTnWEapcJg5bGQ5tmyr3dNLhSha5aKgZS1ubXFe9mfi6MqX4q uDJFNT+nLwroC/c/bFG8eCnuC53ERHnwLWhwVB+CFBlTyOz3nbMGn0Ggp8IUvAHdJote k8tqdkxx3X0Igf3BM/DjH2W2RurWVXjvyCBMHE3U2IA9fmMRVXrttQICG7OPiotlVZiB 1OwXymV7iDS0Ut3X6J79MP7NCHB7hdNdjwQhohIr4O1BQNcypP/lk+6K+dS3A+vxLf97 LLblGNWjsciNbAOsdb4y2fWpkkiD0kHfZTMDkSz37YceCbPRxOL8N9/qmpxS3WKvldEe tnAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=yY8uAQkx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j22si11619186pll.304.2022.02.14.07.23.40; Mon, 14 Feb 2022 07:23:56 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=yY8uAQkx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344100AbiBNJ6q (ORCPT + 99 others); Mon, 14 Feb 2022 04:58:46 -0500 Received: from mxb-00190b01.gslb.pphosted.com ([23.128.96.19]:60946 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235066AbiBNJwX (ORCPT ); Mon, 14 Feb 2022 04:52:23 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3BC3A69CD5; Mon, 14 Feb 2022 01:43:42 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id CB73361244; Mon, 14 Feb 2022 09:43:41 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id AB3FDC340E9; Mon, 14 Feb 2022 09:43:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1644831821; bh=h/90sFQJ4ADpeoVXdbJhADLAI2IKpcQnwVbtczvVWjg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=yY8uAQkxV1AM04Du9AniWv9LHkL8k2VE1iieO1Gb6FMH2hCxcL4cAaJN+qq0B/DWN 9SGNeKSCH0VYyEvo94xb+XM3eAaRBdeFvURhRtMBAjYSapsNeEzIfvW/Bk+ht8/BLN T1ZlbI3LBSoxHthXHtPOItunizp0JrdjZMbFkXuA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Paolo Abeni , Vlad Buslov , Antoine Tenart , "David S. Miller" , Sasha Levin Subject: [PATCH 5.10 076/116] net: do not keep the dst cache when uncloning an skb dst and its metadata Date: Mon, 14 Feb 2022 10:26:15 +0100 Message-Id: <20220214092501.382151728@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220214092458.668376521@linuxfoundation.org> References: <20220214092458.668376521@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.2 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Antoine Tenart [ Upstream commit cfc56f85e72f5b9c5c5be26dc2b16518d36a7868 ] When uncloning an skb dst and its associated metadata a new dst+metadata is allocated and the tunnel information from the old metadata is copied over there. The issue is the tunnel metadata has references to cached dst, which are copied along the way. When a dst+metadata refcount drops to 0 the metadata is freed including the cached dst entries. As they are also referenced in the initial dst+metadata, this ends up in UaFs. In practice the above did not happen because of another issue, the dst+metadata was never freed because its refcount never dropped to 0 (this will be fixed in a subsequent patch). Fix this by initializing the dst cache after copying the tunnel information from the old metadata to also unshare the dst cache. Fixes: d71785ffc7e7 ("net: add dst_cache to ovs vxlan lwtunnel") Cc: Paolo Abeni Reported-by: Vlad Buslov Tested-by: Vlad Buslov Signed-off-by: Antoine Tenart Acked-by: Paolo Abeni Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- include/net/dst_metadata.h | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/include/net/dst_metadata.h b/include/net/dst_metadata.h index 14efa0ded75dd..b997e0c1e3627 100644 --- a/include/net/dst_metadata.h +++ b/include/net/dst_metadata.h @@ -123,6 +123,19 @@ static inline struct metadata_dst *tun_dst_unclone(struct sk_buff *skb) memcpy(&new_md->u.tun_info, &md_dst->u.tun_info, sizeof(struct ip_tunnel_info) + md_size); +#ifdef CONFIG_DST_CACHE + /* Unclone the dst cache if there is one */ + if (new_md->u.tun_info.dst_cache.cache) { + int ret; + + ret = dst_cache_init(&new_md->u.tun_info.dst_cache, GFP_ATOMIC); + if (ret) { + metadata_dst_free(new_md); + return ERR_PTR(ret); + } + } +#endif + skb_dst_drop(skb); dst_hold(&new_md->dst); skb_dst_set(skb, &new_md->dst); -- 2.34.1