net: tipc: fix refcount warning in tipc_aead_encrypt
authorCharalampos Mitrodimas <charmitro@posteo.net>
Tue, 27 May 2025 16:35:44 +0000 (16:35 +0000)
committerPaolo Abeni <pabeni@redhat.com>
Thu, 29 May 2025 10:07:26 +0000 (12:07 +0200)
syzbot reported a refcount warning [1] caused by calling get_net() on
a network namespace that is being destroyed (refcount=0). This happens
when a TIPC discovery timer fires during network namespace cleanup.

The recently added get_net() call in commit e279024617134 ("net/tipc:
fix slab-use-after-free Read in tipc_aead_encrypt_done") attempts to
hold a reference to the network namespace. However, if the namespace
is already being destroyed, its refcount might be zero, leading to the
use-after-free warning.

Replace get_net() with maybe_get_net(), which safely checks if the
refcount is non-zero before incrementing it. If the namespace is being
destroyed, return -ENODEV early, after releasing the bearer reference.

[1]: https://lore.kernel.org/all/68342b55.a70a0220.253bc2.0091.GAE@google.com/T/#m12019cf9ae77e1954f666914640efa36d52704a2

Reported-by: syzbot+f0c4a4aba757549ae26c@syzkaller.appspotmail.com
Closes: https://lore.kernel.org/all/68342b55.a70a0220.253bc2.0091.GAE@google.com/T/#m12019cf9ae77e1954f666914640efa36d52704a2
Fixes: e27902461713 ("net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done")
Signed-off-by: Charalampos Mitrodimas <charmitro@posteo.net>
Reviewed-by: Tung Nguyen <tung.quang.nguyen@est.tech>
Link: https://patch.msgid.link/20250527-net-tipc-warning-v2-1-df3dc398a047@posteo.net
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
net/tipc/crypto.c

index f4cfe88670f55418a43a7eb0d11a851e335faa8d..ea5bb131ebd0602f224f79250be15164ba917f35 100644 (file)
@@ -818,7 +818,11 @@ static int tipc_aead_encrypt(struct tipc_aead *aead, struct sk_buff *skb,
        }
 
        /* Get net to avoid freed tipc_crypto when delete namespace */
-       get_net(aead->crypto->net);
+       if (!maybe_get_net(aead->crypto->net)) {
+               tipc_bearer_put(b);
+               rc = -ENODEV;
+               goto exit;
+       }
 
        /* Now, do encrypt */
        rc = crypto_aead_encrypt(req);