Skip to content

[fips-9.2] veth: Fix use after free in XDP_REDIRECT #264

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged

Conversation

dvdgomez
Copy link

jira VULN-67449
cve CVE-2023-53107

commit-author Shawn Bohrer <[email protected]> commit 7c10131803e45269ddc6c817f19ed649110f3cae

Commit 718a18a0c8a6 ("veth: Rework veth_xdp_rcv_skb in order to accept non-linear skb") introduced a bug where it tried to use pskb_expand_head() if the headroom was less than XDP_PACKET_HEADROOM.  This however uses kmalloc to expand the head, which will later allow consume_skb() to free the skb while is it still in use by AF_XDP.

Previously if the headroom was less than XDP_PACKET_HEADROOM we continued on to allocate a new skb from pages so this restores that behavior.

BUG: KASAN: use-after-free in __xsk_rcv+0x18d/0x2c0 Read of size 78 at addr ffff888976250154 by task napi/iconduit-g/148640

CPU: 5 PID: 148640 Comm: napi/iconduit-g Kdump: loaded Tainted: G           O       6.1.4-cloudflare-kasan-2023.1.2 #1
Hardware name: Quanta Computer Inc. QuantaPlex T41S-2U/S2S-MB, BIOS S2S_3B10.03 06/21/2018
Call Trace:
  <TASK>
  dump_stack_lvl+0x34/0x48
  print_report+0x170/0x473
  ? __xsk_rcv+0x18d/0x2c0
  kasan_report+0xad/0x130
  ? __xsk_rcv+0x18d/0x2c0
  kasan_check_range+0x149/0x1a0
  memcpy+0x20/0x60
  __xsk_rcv+0x18d/0x2c0
  __xsk_map_redirect+0x1f3/0x490
  ? veth_xdp_rcv_skb+0x89c/0x1ba0 [veth]
  xdp_do_redirect+0x5ca/0xd60
  veth_xdp_rcv_skb+0x935/0x1ba0 [veth]
  ? __netif_receive_skb_list_core+0x671/0x920
  ? veth_xdp+0x670/0x670 [veth]
  veth_xdp_rcv+0x304/0xa20 [veth]
  ? do_xdp_generic+0x150/0x150
  ? veth_xdp_rcv_one+0xde0/0xde0 [veth]
  ? _raw_spin_lock_bh+0xe0/0xe0
  ? newidle_balance+0x887/0xe30
  ? __perf_event_task_sched_in+0xdb/0x800
  veth_poll+0x139/0x571 [veth]
  ? veth_xdp_rcv+0xa20/0xa20 [veth]
  ? _raw_spin_unlock+0x39/0x70
  ? finish_task_switch.isra.0+0x17e/0x7d0
  ? __switch_to+0x5cf/0x1070
  ? __schedule+0x95b/0x2640
  ? io_schedule_timeout+0x160/0x160
  __napi_poll+0xa1/0x440
  napi_threaded_poll+0x3d1/0x460
  ? __napi_poll+0x440/0x440
  ? __kthread_parkme+0xc6/0x1f0
  ? __napi_poll+0x440/0x440
  kthread+0x2a2/0x340
  ? kthread_complete_and_exit+0x20/0x20
  ret_from_fork+0x22/0x30
  </TASK>

Freed by task 148640:
  kasan_save_stack+0x23/0x50
  kasan_set_track+0x21/0x30
  kasan_save_free_info+0x2a/0x40
  ____kasan_slab_free+0x169/0x1d0
  slab_free_freelist_hook+0xd2/0x190
  __kmem_cache_free+0x1a1/0x2f0
  skb_release_data+0x449/0x600
  consume_skb+0x9f/0x1c0
  veth_xdp_rcv_skb+0x89c/0x1ba0 [veth]
  veth_xdp_rcv+0x304/0xa20 [veth]
  veth_poll+0x139/0x571 [veth]
  __napi_poll+0xa1/0x440
  napi_threaded_poll+0x3d1/0x460
  kthread+0x2a2/0x340
  ret_from_fork+0x22/0x30

The buggy address belongs to the object at ffff888976250000
  which belongs to the cache kmalloc-2k of size 2048
The buggy address is located 340 bytes inside of
  2048-byte region [ffff888976250000, ffff888976250800)

The buggy address belongs to the physical page:
page:00000000ae18262a refcount:2 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x976250 head:00000000ae18262a order:3 compound_mapcount:0 compound_pincount:0 flags: 0x2ffff800010200(slab|head|node=0|zone=2|lastcpupid=0x1ffff) raw: 002ffff800010200 0000000000000000 dead000000000122 ffff88810004cf00 raw: 0000000000000000 0000000080080008 00000002ffffffff 0000000000000000 page dumped because: kasan: bad access detected

Memory state around the buggy address:
  ffff888976250000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
  ffff888976250080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
> ffff888976250100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                                                  ^
  ffff888976250180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
  ffff888976250200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb

Fixes: 718a18a0c8a6 ("veth: Rework veth_xdp_rcv_skb in order to accept non-linear skb")
	Signed-off-by: Shawn Bohrer <[email protected]>
	Acked-by: Lorenzo Bianconi <[email protected]>
	Acked-by: Toshiaki Makita <[email protected]>
	Acked-by: Toke Høiland-Jørgensen <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
	Signed-off-by: Jakub Kicinski <[email protected]>
(cherry picked from commit 7c10131803e45269ddc6c817f19ed649110f3cae)
	Signed-off-by: David Gomez <[email protected]>

Build Log

INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/soc/sof/snd-sof.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/soc/sof/xtensa/snd-sof-xtensa-dsp.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/soundcore.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/soc/sof/snd-sof-utils.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/soc/sof/snd-sof-pci.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/soc/sof/snd-sof-probes.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/synth/emux/snd-emux-synth.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/soc/sof/snd-sof-utils.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/soundcore.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/soc/sof/xtensa/snd-sof-xtensa-dsp.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/synth/emux/snd-emux-synth.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/soc/sof/xtensa/snd-sof-xtensa-dsp.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/soundcore.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/synth/snd-util-mem.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/6fire/snd-usb-6fire.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/soc/sof/snd-sof.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/synth/emux/snd-emux-synth.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/bcd2000/snd-bcd2000.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/synth/snd-util-mem.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/caiaq/snd-usb-caiaq.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/6fire/snd-usb-6fire.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/bcd2000/snd-bcd2000.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/synth/snd-util-mem.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/soc/sof/snd-sof.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/6fire/snd-usb-6fire.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/hiface/snd-usb-hiface.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/caiaq/snd-usb-caiaq.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/bcd2000/snd-bcd2000.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/line6/snd-usb-line6.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/line6/snd-usb-pod.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/hiface/snd-usb-hiface.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/caiaq/snd-usb-caiaq.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/hiface/snd-usb-hiface.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/line6/snd-usb-line6.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/line6/snd-usb-pod.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/line6/snd-usb-podhd.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/line6/snd-usb-toneport.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/line6/snd-usb-variax.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/line6/snd-usb-line6.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/line6/snd-usb-pod.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/line6/snd-usb-podhd.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/line6/snd-usb-toneport.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/misc/snd-ua101.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/line6/snd-usb-variax.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/snd-usb-audio.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/snd-usbmidi-lib.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/line6/snd-usb-toneport.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/line6/snd-usb-podhd.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/line6/snd-usb-variax.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/misc/snd-ua101.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/snd-usbmidi-lib.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/usx2y/snd-usb-us122l.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/misc/snd-ua101.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/snd-usb-audio.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/usx2y/snd-usb-usx2y.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/usx2y/snd-usb-us122l.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/snd-usbmidi-lib.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/virtio/virtio_snd.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/x86/snd-hdmi-lpe-audio.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/xen/snd_xen_front.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/usx2y/snd-usb-us122l.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/snd-usb-audio.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/usx2y/snd-usb-usx2y.ko
  INSTALL /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/virt/lib/irqbypass.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/x86/snd-hdmi-lpe-audio.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/virtio/virtio_snd.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/xen/snd_xen_front.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/usb/usx2y/snd-usb-usx2y.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/virtio/virtio_snd.ko
  STRIP   /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/virt/lib/irqbypass.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/x86/snd-hdmi-lpe-audio.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/sound/xen/snd_xen_front.ko
  SIGN    /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+/kernel/virt/lib/irqbypass.ko
  DEPMOD  /lib/modules/5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+
[TIMER]{MODULES}: 14s
Making Install
sh ./arch/x86/boot/install.sh \
	5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+ arch/x86/boot/bzImage \
	System.map "/boot"
[TIMER]{INSTALL}: 54s
Checking kABI
Checking kABI
kABI check passed
Setting Default Kernel to /boot/vmlinuz-5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+ and Index to 0
The default is /boot/loader/entries/7b8cc30b1d5f42b0a4f1b1f8af928cf8-5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+.conf with index 0 and kernel /boot/vmlinuz-5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+
The default is /boot/loader/entries/7b8cc30b1d5f42b0a4f1b1f8af928cf8-5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+.conf with index 0 and kernel /boot/vmlinuz-5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab+
Generating grub configuration file ...
Adding boot menu entry for UEFI Firmware Settings ...
done
Hopefully Grub2.0 took everything ... rebooting after time metrices
[TIMER]{MRPROPER}: 23s
[TIMER]{BUILD}: 3309s
[TIMER]{MODULES}: 14s
[TIMER]{INSTALL}: 54s
[TIMER]{TOTAL} 3415s

Testing

5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab.log
5.14.0-284.30.1.el9_2.ciqfips.0.11.1.x86_64.log

# Before patch
$ grep ^ok 5.14.0-284.30.1.el9_2.ciqfips.0.11.1.x86_64.log | wc -l
301

# After patch
$ grep ^ok 5.14.0-dgomez-fips-9-compliant_VULN-67449-877c6d72a1ab.log | wc -l
304

Similar to #262

jira VULN-67449
cve CVE-2023-53107
commit-author Shawn Bohrer <[email protected]>
commit 7c10131

Commit 718a18a ("veth: Rework veth_xdp_rcv_skb in order
to accept non-linear skb") introduced a bug where it tried to
use pskb_expand_head() if the headroom was less than
XDP_PACKET_HEADROOM.  This however uses kmalloc to expand the head,
which will later allow consume_skb() to free the skb while is it still
in use by AF_XDP.

Previously if the headroom was less than XDP_PACKET_HEADROOM we
continued on to allocate a new skb from pages so this restores that
behavior.

BUG: KASAN: use-after-free in __xsk_rcv+0x18d/0x2c0
Read of size 78 at addr ffff888976250154 by task napi/iconduit-g/148640

CPU: 5 PID: 148640 Comm: napi/iconduit-g Kdump: loaded Tainted: G           O       6.1.4-cloudflare-kasan-2023.1.2 #1
Hardware name: Quanta Computer Inc. QuantaPlex T41S-2U/S2S-MB, BIOS S2S_3B10.03 06/21/2018
Call Trace:
  <TASK>
  dump_stack_lvl+0x34/0x48
  print_report+0x170/0x473
  ? __xsk_rcv+0x18d/0x2c0
  kasan_report+0xad/0x130
  ? __xsk_rcv+0x18d/0x2c0
  kasan_check_range+0x149/0x1a0
  memcpy+0x20/0x60
  __xsk_rcv+0x18d/0x2c0
  __xsk_map_redirect+0x1f3/0x490
  ? veth_xdp_rcv_skb+0x89c/0x1ba0 [veth]
  xdp_do_redirect+0x5ca/0xd60
  veth_xdp_rcv_skb+0x935/0x1ba0 [veth]
  ? __netif_receive_skb_list_core+0x671/0x920
  ? veth_xdp+0x670/0x670 [veth]
  veth_xdp_rcv+0x304/0xa20 [veth]
  ? do_xdp_generic+0x150/0x150
  ? veth_xdp_rcv_one+0xde0/0xde0 [veth]
  ? _raw_spin_lock_bh+0xe0/0xe0
  ? newidle_balance+0x887/0xe30
  ? __perf_event_task_sched_in+0xdb/0x800
  veth_poll+0x139/0x571 [veth]
  ? veth_xdp_rcv+0xa20/0xa20 [veth]
  ? _raw_spin_unlock+0x39/0x70
  ? finish_task_switch.isra.0+0x17e/0x7d0
  ? __switch_to+0x5cf/0x1070
  ? __schedule+0x95b/0x2640
  ? io_schedule_timeout+0x160/0x160
  __napi_poll+0xa1/0x440
  napi_threaded_poll+0x3d1/0x460
  ? __napi_poll+0x440/0x440
  ? __kthread_parkme+0xc6/0x1f0
  ? __napi_poll+0x440/0x440
  kthread+0x2a2/0x340
  ? kthread_complete_and_exit+0x20/0x20
  ret_from_fork+0x22/0x30
  </TASK>

Freed by task 148640:
  kasan_save_stack+0x23/0x50
  kasan_set_track+0x21/0x30
  kasan_save_free_info+0x2a/0x40
  ____kasan_slab_free+0x169/0x1d0
  slab_free_freelist_hook+0xd2/0x190
  __kmem_cache_free+0x1a1/0x2f0
  skb_release_data+0x449/0x600
  consume_skb+0x9f/0x1c0
  veth_xdp_rcv_skb+0x89c/0x1ba0 [veth]
  veth_xdp_rcv+0x304/0xa20 [veth]
  veth_poll+0x139/0x571 [veth]
  __napi_poll+0xa1/0x440
  napi_threaded_poll+0x3d1/0x460
  kthread+0x2a2/0x340
  ret_from_fork+0x22/0x30

The buggy address belongs to the object at ffff888976250000
  which belongs to the cache kmalloc-2k of size 2048
The buggy address is located 340 bytes inside of
  2048-byte region [ffff888976250000, ffff888976250800)

The buggy address belongs to the physical page:
page:00000000ae18262a refcount:2 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x976250
head:00000000ae18262a order:3 compound_mapcount:0 compound_pincount:0
flags: 0x2ffff800010200(slab|head|node=0|zone=2|lastcpupid=0x1ffff)
raw: 002ffff800010200 0000000000000000 dead000000000122 ffff88810004cf00
raw: 0000000000000000 0000000080080008 00000002ffffffff 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
  ffff888976250000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
  ffff888976250080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
> ffff888976250100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                                                  ^
  ffff888976250180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
  ffff888976250200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb

Fixes: 718a18a ("veth: Rework veth_xdp_rcv_skb in order to accept non-linear skb")
	Signed-off-by: Shawn Bohrer <[email protected]>
	Acked-by: Lorenzo Bianconi <[email protected]>
	Acked-by: Toshiaki Makita <[email protected]>
	Acked-by: Toke Høiland-Jørgensen <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
	Signed-off-by: Jakub Kicinski <[email protected]>
(cherry picked from commit 7c10131)
	Signed-off-by: David Gomez <[email protected]>
@dvdgomez dvdgomez self-assigned this May 14, 2025
Copy link
Collaborator

@bmastbergen bmastbergen left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🥌

Copy link
Collaborator

@PlaidCat PlaidCat left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

:shipit:

@dvdgomez dvdgomez merged commit c9255b4 into fips-9-compliant/5.14.0-284.30.1 May 15, 2025
2 checks passed
@dvdgomez dvdgomez deleted the dgomez-fips-9-compliant/VULN-67449 branch May 15, 2025 20:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

3 participants