diff mbox series

[net] xt_RATEEST: acquire xt_rateest_mutex for hash insert

Message ID 20180201002631.17638-1-xiyou.wangcong@gmail.com
State Changes Requested
Delegated to: Pablo Neira
Headers show
Series [net] xt_RATEEST: acquire xt_rateest_mutex for hash insert | expand

Commit Message

Cong Wang Feb. 1, 2018, 12:26 a.m. UTC
rateest_hash is supposed to be protected by xt_rateest_mutex.

Reported-by: <syzbot+5cb189720978275e4c75@syzkaller.appspotmail.com>
Fixes: 5859034d7eb8 ("[NETFILTER]: x_tables: add RATEEST target")
Cc: Pablo Neira Ayuso <pablo@netfilter.org>
Signed-off-by: Cong Wang <xiyou.wangcong@gmail.com>
---
 net/netfilter/xt_RATEEST.c | 2 ++
 1 file changed, 2 insertions(+)

Comments

Eric Dumazet Feb. 1, 2018, 1:44 a.m. UTC | #1
On Wed, 2018-01-31 at 16:26 -0800, Cong Wang wrote:
> rateest_hash is supposed to be protected by xt_rateest_mutex.
> 
> Reported-by: <syzbot+5cb189720978275e4c75@syzkaller.appspotmail.com>
> Fixes: 5859034d7eb8 ("[NETFILTER]: x_tables: add RATEEST target")
> Cc: Pablo Neira Ayuso <pablo@netfilter.org>
> Signed-off-by: Cong Wang <xiyou.wangcong@gmail.com>
> ---
>  net/netfilter/xt_RATEEST.c | 2 ++
>  1 file changed, 2 insertions(+)
> 
> diff --git a/net/netfilter/xt_RATEEST.c b/net/netfilter/xt_RATEEST.c
> index 498b54fd04d7..83ec3a282755 100644
> --- a/net/netfilter/xt_RATEEST.c
> +++ b/net/netfilter/xt_RATEEST.c
> @@ -36,7 +36,9 @@ static void xt_rateest_hash_insert(struct xt_rateest *est)
>  	unsigned int h;
>  
>  	h = xt_rateest_hash(est->name);
> +	mutex_lock(&xt_rateest_mutex);
>  	hlist_add_head(&est->list, &rateest_hash[h]);
> +	mutex_unlock(&xt_rateest_mutex);
>  }

We probably should make this module netns aware, otherwise bad things
will happen.

(It seems multiple threads could run, so getting the mutex twice 
(xt_rateest_lookup then xt_rateest_hash_insert() is racy)


--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Cong Wang Feb. 1, 2018, 9:50 p.m. UTC | #2
On Wed, Jan 31, 2018 at 5:44 PM, Eric Dumazet <eric.dumazet@gmail.com> wrote:
> On Wed, 2018-01-31 at 16:26 -0800, Cong Wang wrote:
>> rateest_hash is supposed to be protected by xt_rateest_mutex.
>>
>> Reported-by: <syzbot+5cb189720978275e4c75@syzkaller.appspotmail.com>
>> Fixes: 5859034d7eb8 ("[NETFILTER]: x_tables: add RATEEST target")
>> Cc: Pablo Neira Ayuso <pablo@netfilter.org>
>> Signed-off-by: Cong Wang <xiyou.wangcong@gmail.com>
>> ---
>>  net/netfilter/xt_RATEEST.c | 2 ++
>>  1 file changed, 2 insertions(+)
>>
>> diff --git a/net/netfilter/xt_RATEEST.c b/net/netfilter/xt_RATEEST.c
>> index 498b54fd04d7..83ec3a282755 100644
>> --- a/net/netfilter/xt_RATEEST.c
>> +++ b/net/netfilter/xt_RATEEST.c
>> @@ -36,7 +36,9 @@ static void xt_rateest_hash_insert(struct xt_rateest *est)
>>       unsigned int h;
>>
>>       h = xt_rateest_hash(est->name);
>> +     mutex_lock(&xt_rateest_mutex);
>>       hlist_add_head(&est->list, &rateest_hash[h]);
>> +     mutex_unlock(&xt_rateest_mutex);
>>  }
>
> We probably should make this module netns aware, otherwise bad things
> will happen.

Right, both the lock and the hashtable. I can do it for net-next,
if you don't.

>
> (It seems multiple threads could run, so getting the mutex twice
> (xt_rateest_lookup then xt_rateest_hash_insert() is racy)

Yeah, need to merge these two critical sections.

Thanks.
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Florian Westphal Feb. 1, 2018, 10:36 p.m. UTC | #3
Cong Wang <xiyou.wangcong@gmail.com> wrote:
> On Wed, Jan 31, 2018 at 5:44 PM, Eric Dumazet <eric.dumazet@gmail.com> wrote:
> > On Wed, 2018-01-31 at 16:26 -0800, Cong Wang wrote:
> >> rateest_hash is supposed to be protected by xt_rateest_mutex.
> >>
> >> Reported-by: <syzbot+5cb189720978275e4c75@syzkaller.appspotmail.com>
> >> Fixes: 5859034d7eb8 ("[NETFILTER]: x_tables: add RATEEST target")
> >> Cc: Pablo Neira Ayuso <pablo@netfilter.org>
> >> Signed-off-by: Cong Wang <xiyou.wangcong@gmail.com>
> >> ---
> >>  net/netfilter/xt_RATEEST.c | 2 ++
> >>  1 file changed, 2 insertions(+)
> >>
> >> diff --git a/net/netfilter/xt_RATEEST.c b/net/netfilter/xt_RATEEST.c
> >> index 498b54fd04d7..83ec3a282755 100644
> >> --- a/net/netfilter/xt_RATEEST.c
> >> +++ b/net/netfilter/xt_RATEEST.c
> >> @@ -36,7 +36,9 @@ static void xt_rateest_hash_insert(struct xt_rateest *est)
> >>       unsigned int h;
> >>
> >>       h = xt_rateest_hash(est->name);
> >> +     mutex_lock(&xt_rateest_mutex);
> >>       hlist_add_head(&est->list, &rateest_hash[h]);
> >> +     mutex_unlock(&xt_rateest_mutex);
> >>  }
> >
> > We probably should make this module netns aware, otherwise bad things
> > will happen.
> 
> Right, both the lock and the hashtable. I can do it for net-next,
> if you don't.

Note that the xtables af mutexes are not per-netns, the race is iptables
vs. ip6tables.
--
To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
diff mbox series

Patch

diff --git a/net/netfilter/xt_RATEEST.c b/net/netfilter/xt_RATEEST.c
index 498b54fd04d7..83ec3a282755 100644
--- a/net/netfilter/xt_RATEEST.c
+++ b/net/netfilter/xt_RATEEST.c
@@ -36,7 +36,9 @@  static void xt_rateest_hash_insert(struct xt_rateest *est)
 	unsigned int h;
 
 	h = xt_rateest_hash(est->name);
+	mutex_lock(&xt_rateest_mutex);
 	hlist_add_head(&est->list, &rateest_hash[h]);
+	mutex_unlock(&xt_rateest_mutex);
 }
 
 struct xt_rateest *xt_rateest_lookup(const char *name)