Skip to content

Commit 6a17280

Browse files
committed
Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec
Steffen Klassert says: ==================== pull request (net): ipsec 2017-11-09 1) Fix a use after free due to a reallocated skb head. From Florian Westphal. 2) Fix sporadic lookup failures on labeled IPSEC. From Florian Westphal. 3) Fix a stack out of bounds when a socket policy is applied to an IPv6 socket that sends IPv4 packets. Please pull or let me know if there are problems. ==================== Signed-off-by: David S. Miller <[email protected]>
2 parents 623859a + c9f3f81 commit 6a17280

File tree

2 files changed

+37
-38
lines changed

2 files changed

+37
-38
lines changed

net/xfrm/xfrm_input.c

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -266,8 +266,6 @@ int xfrm_input(struct sk_buff *skb, int nexthdr, __be32 spi, int encap_type)
266266
goto lock;
267267
}
268268

269-
daddr = (xfrm_address_t *)(skb_network_header(skb) +
270-
XFRM_SPI_SKB_CB(skb)->daddroff);
271269
family = XFRM_SPI_SKB_CB(skb)->family;
272270

273271
/* if tunnel is present override skb->mark value with tunnel i_key */
@@ -294,6 +292,8 @@ int xfrm_input(struct sk_buff *skb, int nexthdr, __be32 spi, int encap_type)
294292
goto drop;
295293
}
296294

295+
daddr = (xfrm_address_t *)(skb_network_header(skb) +
296+
XFRM_SPI_SKB_CB(skb)->daddroff);
297297
do {
298298
if (skb->sp->len == XFRM_MAX_DEPTH) {
299299
XFRM_INC_STATS(net, LINUX_MIB_XFRMINBUFFERERROR);

net/xfrm/xfrm_policy.c

Lines changed: 35 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -1361,36 +1361,29 @@ xfrm_tmpl_resolve_one(struct xfrm_policy *policy, const struct flowi *fl,
13611361
struct net *net = xp_net(policy);
13621362
int nx;
13631363
int i, error;
1364-
xfrm_address_t *daddr = xfrm_flowi_daddr(fl, family);
1365-
xfrm_address_t *saddr = xfrm_flowi_saddr(fl, family);
13661364
xfrm_address_t tmp;
13671365

13681366
for (nx = 0, i = 0; i < policy->xfrm_nr; i++) {
13691367
struct xfrm_state *x;
1370-
xfrm_address_t *remote = daddr;
1371-
xfrm_address_t *local = saddr;
1368+
xfrm_address_t *local;
1369+
xfrm_address_t *remote;
13721370
struct xfrm_tmpl *tmpl = &policy->xfrm_vec[i];
13731371

1374-
if (tmpl->mode == XFRM_MODE_TUNNEL ||
1375-
tmpl->mode == XFRM_MODE_BEET) {
1376-
remote = &tmpl->id.daddr;
1377-
local = &tmpl->saddr;
1378-
if (xfrm_addr_any(local, tmpl->encap_family)) {
1379-
error = xfrm_get_saddr(net, fl->flowi_oif,
1380-
&tmp, remote,
1381-
tmpl->encap_family, 0);
1382-
if (error)
1383-
goto fail;
1384-
local = &tmp;
1385-
}
1372+
remote = &tmpl->id.daddr;
1373+
local = &tmpl->saddr;
1374+
if (xfrm_addr_any(local, tmpl->encap_family)) {
1375+
error = xfrm_get_saddr(net, fl->flowi_oif,
1376+
&tmp, remote,
1377+
tmpl->encap_family, 0);
1378+
if (error)
1379+
goto fail;
1380+
local = &tmp;
13861381
}
13871382

13881383
x = xfrm_state_find(remote, local, fl, tmpl, policy, &error, family);
13891384

13901385
if (x && x->km.state == XFRM_STATE_VALID) {
13911386
xfrm[nx++] = x;
1392-
daddr = remote;
1393-
saddr = local;
13941387
continue;
13951388
}
13961389
if (x) {
@@ -1787,19 +1780,23 @@ void xfrm_policy_cache_flush(void)
17871780
put_online_cpus();
17881781
}
17891782

1790-
static bool xfrm_pol_dead(struct xfrm_dst *xdst)
1783+
static bool xfrm_xdst_can_reuse(struct xfrm_dst *xdst,
1784+
struct xfrm_state * const xfrm[],
1785+
int num)
17911786
{
1792-
unsigned int num_pols = xdst->num_pols;
1793-
unsigned int pol_dead = 0, i;
1787+
const struct dst_entry *dst = &xdst->u.dst;
1788+
int i;
17941789

1795-
for (i = 0; i < num_pols; i++)
1796-
pol_dead |= xdst->pols[i]->walk.dead;
1790+
if (xdst->num_xfrms != num)
1791+
return false;
17971792

1798-
/* Mark DST_OBSOLETE_DEAD to fail the next xfrm_dst_check() */
1799-
if (pol_dead)
1800-
xdst->u.dst.obsolete = DST_OBSOLETE_DEAD;
1793+
for (i = 0; i < num; i++) {
1794+
if (!dst || dst->xfrm != xfrm[i])
1795+
return false;
1796+
dst = dst->child;
1797+
}
18011798

1802-
return pol_dead;
1799+
return xfrm_bundle_ok(xdst);
18031800
}
18041801

18051802
static struct xfrm_dst *
@@ -1813,26 +1810,28 @@ xfrm_resolve_and_create_bundle(struct xfrm_policy **pols, int num_pols,
18131810
struct dst_entry *dst;
18141811
int err;
18151812

1813+
/* Try to instantiate a bundle */
1814+
err = xfrm_tmpl_resolve(pols, num_pols, fl, xfrm, family);
1815+
if (err <= 0) {
1816+
if (err != 0 && err != -EAGAIN)
1817+
XFRM_INC_STATS(net, LINUX_MIB_XFRMOUTPOLERROR);
1818+
return ERR_PTR(err);
1819+
}
1820+
18161821
xdst = this_cpu_read(xfrm_last_dst);
18171822
if (xdst &&
18181823
xdst->u.dst.dev == dst_orig->dev &&
18191824
xdst->num_pols == num_pols &&
1820-
!xfrm_pol_dead(xdst) &&
18211825
memcmp(xdst->pols, pols,
18221826
sizeof(struct xfrm_policy *) * num_pols) == 0 &&
1823-
xfrm_bundle_ok(xdst)) {
1827+
xfrm_xdst_can_reuse(xdst, xfrm, err)) {
18241828
dst_hold(&xdst->u.dst);
1829+
while (err > 0)
1830+
xfrm_state_put(xfrm[--err]);
18251831
return xdst;
18261832
}
18271833

18281834
old = xdst;
1829-
/* Try to instantiate a bundle */
1830-
err = xfrm_tmpl_resolve(pols, num_pols, fl, xfrm, family);
1831-
if (err <= 0) {
1832-
if (err != 0 && err != -EAGAIN)
1833-
XFRM_INC_STATS(net, LINUX_MIB_XFRMOUTPOLERROR);
1834-
return ERR_PTR(err);
1835-
}
18361835

18371836
dst = xfrm_bundle_create(pols[0], xfrm, err, fl, dst_orig);
18381837
if (IS_ERR(dst)) {

0 commit comments

Comments
 (0)