Eric Dumazet
92ceba94de
netfilter: nf_tables: prevent nf_skb_duplicated corruption
syzbot found that nf_dup_ipv4() or nf_dup_ipv6() could write
per-cpu variable nf_skb_duplicated in an unsafe way [1].
Disabling preemption as hinted by the splat is not enough,
we have to disable soft interrupts as well.
[1]
BUG: using __this_cpu_write() in preemptible [00000000] code: syz.4.282/6316
caller is nf_dup_ipv4+0x651/0x8f0 net/ipv4/netfilter/nf_dup_ipv4.c:87
CPU: 0 UID: 0 PID: 6316 Comm: syz.4.282 Not tainted 6.11.0-rc7-syzkaller-00104-g7052622fccb1 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:93 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119
check_preemption_disabled+0x10e/0x120 lib/smp_processor_id.c:49
nf_dup_ipv4+0x651/0x8f0 net/ipv4/netfilter/nf_dup_ipv4.c:87
nft_dup_ipv4_eval+0x1db/0x300 net/ipv4/netfilter/nft_dup_ipv4.c:30
expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
nft_do_chain+0x4ad/0x1da0 net/netfilter/nf_tables_core.c:288
nft_do_chain_ipv4+0x202/0x320 net/netfilter/nft_chain_filter.c:23
nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
nf_hook+0x2c4/0x450 include/linux/netfilter.h:269
NF_HOOK_COND include/linux/netfilter.h:302 [inline]
ip_output+0x185/0x230 net/ipv4/ip_output.c:433
ip_local_out net/ipv4/ip_output.c:129 [inline]
ip_send_skb+0x74/0x100 net/ipv4/ip_output.c:1495
udp_send_skb+0xacf/0x1650 net/ipv4/udp.c:981
udp_sendmsg+0x1c21/0x2a60 net/ipv4/udp.c:1269
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg+0x1a6/0x270 net/socket.c:745
____sys_sendmsg+0x525/0x7d0 net/socket.c:2597
___sys_sendmsg net/socket.c:2651 [inline]
__sys_sendmmsg+0x3b2/0x740 net/socket.c:2737
__do_sys_sendmmsg net/socket.c:2766 [inline]
__se_sys_sendmmsg net/socket.c:2763 [inline]
__x64_sys_sendmmsg+0xa0/0xb0 net/socket.c:2763
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f4ce4f7def9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f4ce5d4a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
RAX: ffffffffffffffda RBX: 00007f4ce5135f80 RCX: 00007f4ce4f7def9
RDX: 0000000000000001 RSI: 0000000020005d40 RDI: 0000000000000006
RBP: 00007f4ce4ff0b76 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f4ce5135f80 R15: 00007ffd4cbc6d68
</TASK>
Fixes: d877f07112 ("netfilter: nf_tables: add nft_dup expression")
Reported-by: syzbot <syzkaller@googlegroups.com>
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
2024-09-27 13:55:46 +02:00
..
2024-09-27 13:55:46 +02:00
2024-05-27 16:46:59 -07:00
2024-02-09 14:12:02 -08:00
2024-05-01 18:37:07 -07:00
2024-05-30 15:34:13 -07:00
2024-06-20 13:49:59 -07:00
2024-02-12 17:33:05 -08:00
2024-08-23 14:27:45 +01:00
2024-07-15 13:19:17 -07:00
2024-09-11 20:44:31 -07:00
2024-08-22 16:59:57 -07:00
2024-09-13 21:15:44 -07:00
2024-08-23 14:27:45 +01:00
2024-08-20 14:57:08 +02:00
2024-04-01 10:49:28 +01:00
2024-09-09 17:21:47 -07:00
2023-05-26 10:30:14 +01:00
2023-05-26 10:30:14 +01:00
2024-04-01 10:49:28 +01:00
2024-03-05 13:30:11 +01:00
2024-09-09 14:14:53 +01:00
2024-04-08 13:20:51 +01:00
2024-08-26 14:04:25 -07:00
2024-08-28 17:08:16 -07:00
2024-05-23 14:14:23 -07:00
2024-08-05 16:22:45 -07:00
2024-06-10 11:54:18 +01:00
2024-01-31 16:39:42 -08:00
2023-10-13 09:58:45 -07:00
2024-05-23 14:14:23 -07:00
2024-09-09 14:14:52 +01:00
2024-09-06 18:10:21 -07:00
2024-09-04 16:57:11 -07:00
2024-03-06 12:37:06 +00:00
2024-04-01 10:49:28 +01:00
2024-09-09 14:14:53 +01:00
2024-09-03 11:36:43 +02:00
2022-09-29 07:18:00 +02:00
2023-05-22 11:17:55 +01:00
2024-09-03 11:36:43 +02:00
2024-09-04 16:57:11 -07:00
2024-07-30 18:35:12 -07:00
2024-01-04 10:23:10 -08:00
2024-06-05 10:06:00 +01:00
2024-09-09 14:14:53 +01:00
2024-08-23 14:27:45 +01:00
2024-06-19 12:44:22 +01:00
2024-07-28 13:41:14 -07:00
2024-01-23 15:13:54 +01:00
2024-06-19 12:44:22 +01:00
2024-08-31 17:44:51 +01:00
2024-06-19 12:44:22 +01:00
2024-08-30 11:14:06 -07:00
2024-08-04 13:21:50 +01:00
2024-05-02 16:26:56 -07:00
2024-09-12 20:22:44 -07:00
2022-10-16 15:27:07 -07:00
2024-07-16 07:52:15 -07:00
2024-03-28 18:31:40 -07:00
2024-05-21 13:34:50 +02:00
2024-01-23 15:13:54 +01:00
2024-06-06 11:52:52 +02:00
2024-08-06 12:16:25 -07:00
2024-09-11 20:44:31 -07:00
2024-09-11 20:44:32 -07:00
2023-10-23 09:35:01 +01:00
2024-08-19 17:42:57 -07:00
2024-09-11 20:44:32 -07:00
2024-07-30 18:34:13 -07:00
2024-09-11 20:44:31 -07:00
2022-12-20 03:13:45 +01:00
2023-10-17 17:25:42 -07:00
2024-06-24 16:41:22 -07:00
2024-09-11 15:57:50 -07:00
2023-01-19 09:26:16 -08:00
2024-09-11 20:44:32 -07:00
2024-02-09 14:12:02 -08:00
2023-03-03 17:25:15 +01:00
2024-01-23 15:13:54 +01:00
2023-06-24 15:50:13 -07:00
2024-08-21 17:15:05 -07:00
2024-09-09 14:14:53 +01:00
2023-10-03 11:39:34 +02:00
2024-08-22 16:59:58 -07:00
2023-09-14 16:16:36 +02:00
2024-05-09 10:01:01 -07:00
2024-05-03 13:29:42 +01:00
2024-02-09 14:12:02 -08:00