Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp332085rwd; Thu, 8 Jun 2023 01:01:37 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4uVtAvgZ0c8N3TlWZ+0T7WVKSKw/FJJZ5HOQT6xRfnb/7EuaBEGW60l6TP3wzK03rESGlb X-Received: by 2002:a54:4805:0:b0:398:2b18:9aa8 with SMTP id j5-20020a544805000000b003982b189aa8mr7613567oij.20.1686211297654; Thu, 08 Jun 2023 01:01:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1686211297; cv=none; d=google.com; s=arc-20160816; b=U6LRft8iDZ3mK15azvGMSiLDpjBaMrkxFqYbtkjeBfpys1FBxUTVqgnERaj7L0lhR4 AQpVJvFBBZ9Znh/xgQLsi/GV3+l7fYsw7FwkXZdN47he28fbKDLmWEF8v1KpsbWK313M o68DR7Lg9F8n5ijAgkuzK3r0saG3eRDbI4o9qlMIZRHPQ7g04v9vYkXOHEXqpecZa9fg zFLVL7Z2d68tQiui8hXeZzRLnzKiwkR1bCcl/HWhk4/3hSFsoIXopC7T8trbdSBGosne 8vQkZqIC23gKLyLOmrqyp7CGuQ7urmxoT+CQARNakI3TRld1P25vvkkgYMHU17hJ3Zrq GJng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=XIsZbJjvqd7k/Lp3o6ek9Z6ncJfbvDLiIn1TToR9WKc=; b=TE35EvbWPBfNNqagktkh1/NIUaDitXYjtFkUwSVBhKA2rIQVl3CEDyxtGn4+xBsNzg cqOWA9GbTKeXmQNx77VeiHWMkYhnlqMOxiW8g/GnXSqjxyKmoYVtP5NmEvMcdGFZRUiI aPrjckHbOj6wWiIpBtpWvRbnM2ZNEnv1DlIMu7MCcJNfXlE83cj6SrR8E4AXAM8ys3N+ d5cZvo1vGERqDuD42Z7yNLRuKWj0lzZUrSR6lNUFpvBBNgJFC1v3alJe1I0ksE7CkT6p GHYzscGHeGczaMLCXXluZRTdsmbVenMJOU31xu3hapnJeyGigCQv2c4KcnlHQqHbnulF 2VAQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=BaPNrsyC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id y5-20020a17090a86c500b00253695cadcasi2373901pjv.180.2023.06.08.01.01.23; Thu, 08 Jun 2023 01:01:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=BaPNrsyC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234156AbjFHH3d (ORCPT + 99 others); Thu, 8 Jun 2023 03:29:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34144 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235365AbjFHH33 (ORCPT ); Thu, 8 Jun 2023 03:29:29 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8BC791BF7 for ; Thu, 8 Jun 2023 00:29:18 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 14AA864088 for ; Thu, 8 Jun 2023 07:29:18 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 4177CC433EF; Thu, 8 Jun 2023 07:29:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1686209357; bh=fTXGZtsvjHuJPXHpI4JJ8GQPMLGUVrrCn8vbVtMpWuU=; h=From:To:Cc:Subject:Date:From; b=BaPNrsyCybUJr40Mpe35lK+mkb7m8gkxBYtXCziieTrN8YOPBsJH49B+Ho870Nn4k r8JLLSxvU9CuDdaKgNGMlwNkYuQvuHAHgWqL1zbiUHKbSK2zBQ/ZZGSpHGUI7zdIg2 cN7y+R/vFuEYURbrDboUfV8gkulNcYpXiRgdivhLLTnMyBm3zSB7VZDO2NVbH6sqGQ YRzV7PHbk8SPk4wHBo3Unmr4GdDWXn0pNG1O7JltTLq+8VGF/9ex4VvD3tmXLp3NZL q9C5bhz7DkR6GGJBha0UycHbCjc+e3O5iKQ/9u7lF38ZPOOwGbp3noeCX91A0p+ap6 cUbY41qH47IkA== From: Lee Jones To: lee@kernel.org, jhs@mojatatu.com, xiyou.wangcong@gmail.com, jiri@resnulli.us, davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com Cc: linux-kernel@vger.kernel.org, netdev@vger.kernel.org, stable@kernel.org Subject: [PATCH v2 1/1] net/sched: cls_u32: Fix reference counter leak leading to overflow Date: Thu, 8 Jun 2023 08:29:03 +0100 Message-ID: <20230608072903.3404438-1-lee@kernel.org> X-Mailer: git-send-email 2.41.0.rc0.172.g3f132b7071-goog MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In the event of a failure in tcf_change_indev(), u32_set_parms() will immediately return without decrementing the recently incremented reference counter. If this happens enough times, the counter will rollover and the reference freed, leading to a double free which can be used to do 'bad things'. In order to prevent this, move the point of possible failure above the point where the reference counter is incremented. Also save any meaningful return values to be applied to the return data at the appropriate point in time. This issue was caught with KASAN. Fixes: 705c7091262d ("net: sched: cls_u32: no need to call tcf_exts_change for newly allocated struct") Suggested-by: Eric Dumazet Signed-off-by: Lee Jones --- v1 -> v2: - Instead of decrementing the refcnt in the error path, move the point of failure up above the section which increments it. net/sched/cls_u32.c | 18 ++++++++++-------- 1 file changed, 10 insertions(+), 8 deletions(-) diff --git a/net/sched/cls_u32.c b/net/sched/cls_u32.c index 4e2e269f121f8..d15d50de79802 100644 --- a/net/sched/cls_u32.c +++ b/net/sched/cls_u32.c @@ -718,13 +718,19 @@ static int u32_set_parms(struct net *net, struct tcf_proto *tp, struct nlattr *est, u32 flags, u32 fl_flags, struct netlink_ext_ack *extack) { - int err; + int err, ifindex = -1; err = tcf_exts_validate_ex(net, tp, tb, est, &n->exts, flags, fl_flags, extack); if (err < 0) return err; + if (tb[TCA_U32_INDEV]) { + ifindex = tcf_change_indev(net, tb[TCA_U32_INDEV], extack); + if (ifindex < 0) + return -EINVAL; + } + if (tb[TCA_U32_LINK]) { u32 handle = nla_get_u32(tb[TCA_U32_LINK]); struct tc_u_hnode *ht_down = NULL, *ht_old; @@ -759,13 +765,9 @@ static int u32_set_parms(struct net *net, struct tcf_proto *tp, tcf_bind_filter(tp, &n->res, base); } - if (tb[TCA_U32_INDEV]) { - int ret; - ret = tcf_change_indev(net, tb[TCA_U32_INDEV], extack); - if (ret < 0) - return -EINVAL; - n->ifindex = ret; - } + if (ifindex >= 0) + n->ifindex = ifindex; + return 0; } -- 2.41.0.rc0.172.g3f132b7071-goog