Commit b35560e4 authored by David S. Miller's avatar David S. Miller

Merge branch 'master' of git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec

Steffen Klassert says:

====================
pull request (net): ipsec 2019-02-21

1) Don't do TX bytes accounting for the esp trailer when sending
   from a request socket as this will result in an out of bounds
   memory write. From Martin Willi.

2) Destroy xfrm_state synchronously on net exit path to
   avoid nested gc flush callbacks that may trigger a
   warning in xfrm6_tunnel_net_exit(). From Cong Wang.

3) Do an unconditionally clone in pfkey_broadcast_one()
   to avoid a race when freeing the skb.
   From Sean Tranchetti.

4) Fix inbound traffic via XFRM interfaces across network
   namespaces. We did the lookup for interfaces and policies
   in the wrong namespace. From Tobias Brunner.

Please pull or let me know if there are problems.
====================
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parents 31088cb5 660899dd
...@@ -853,7 +853,7 @@ static inline void xfrm_pols_put(struct xfrm_policy **pols, int npols) ...@@ -853,7 +853,7 @@ static inline void xfrm_pols_put(struct xfrm_policy **pols, int npols)
xfrm_pol_put(pols[i]); xfrm_pol_put(pols[i]);
} }
void __xfrm_state_destroy(struct xfrm_state *); void __xfrm_state_destroy(struct xfrm_state *, bool);
static inline void __xfrm_state_put(struct xfrm_state *x) static inline void __xfrm_state_put(struct xfrm_state *x)
{ {
...@@ -863,7 +863,13 @@ static inline void __xfrm_state_put(struct xfrm_state *x) ...@@ -863,7 +863,13 @@ static inline void __xfrm_state_put(struct xfrm_state *x)
static inline void xfrm_state_put(struct xfrm_state *x) static inline void xfrm_state_put(struct xfrm_state *x)
{ {
if (refcount_dec_and_test(&x->refcnt)) if (refcount_dec_and_test(&x->refcnt))
__xfrm_state_destroy(x); __xfrm_state_destroy(x, false);
}
static inline void xfrm_state_put_sync(struct xfrm_state *x)
{
if (refcount_dec_and_test(&x->refcnt))
__xfrm_state_destroy(x, true);
} }
static inline void xfrm_state_hold(struct xfrm_state *x) static inline void xfrm_state_hold(struct xfrm_state *x)
...@@ -1590,7 +1596,7 @@ struct xfrmk_spdinfo { ...@@ -1590,7 +1596,7 @@ struct xfrmk_spdinfo {
struct xfrm_state *xfrm_find_acq_byseq(struct net *net, u32 mark, u32 seq); struct xfrm_state *xfrm_find_acq_byseq(struct net *net, u32 mark, u32 seq);
int xfrm_state_delete(struct xfrm_state *x); int xfrm_state_delete(struct xfrm_state *x);
int xfrm_state_flush(struct net *net, u8 proto, bool task_valid); int xfrm_state_flush(struct net *net, u8 proto, bool task_valid, bool sync);
int xfrm_dev_state_flush(struct net *net, struct net_device *dev, bool task_valid); int xfrm_dev_state_flush(struct net *net, struct net_device *dev, bool task_valid);
void xfrm_sad_getinfo(struct net *net, struct xfrmk_sadinfo *si); void xfrm_sad_getinfo(struct net *net, struct xfrmk_sadinfo *si);
void xfrm_spd_getinfo(struct net *net, struct xfrmk_spdinfo *si); void xfrm_spd_getinfo(struct net *net, struct xfrmk_spdinfo *si);
......
...@@ -328,7 +328,7 @@ int esp_output_head(struct xfrm_state *x, struct sk_buff *skb, struct esp_info * ...@@ -328,7 +328,7 @@ int esp_output_head(struct xfrm_state *x, struct sk_buff *skb, struct esp_info *
skb->len += tailen; skb->len += tailen;
skb->data_len += tailen; skb->data_len += tailen;
skb->truesize += tailen; skb->truesize += tailen;
if (sk) if (sk && sk_fullsock(sk))
refcount_add(tailen, &sk->sk_wmem_alloc); refcount_add(tailen, &sk->sk_wmem_alloc);
goto out; goto out;
......
...@@ -296,7 +296,7 @@ int esp6_output_head(struct xfrm_state *x, struct sk_buff *skb, struct esp_info ...@@ -296,7 +296,7 @@ int esp6_output_head(struct xfrm_state *x, struct sk_buff *skb, struct esp_info
skb->len += tailen; skb->len += tailen;
skb->data_len += tailen; skb->data_len += tailen;
skb->truesize += tailen; skb->truesize += tailen;
if (sk) if (sk && sk_fullsock(sk))
refcount_add(tailen, &sk->sk_wmem_alloc); refcount_add(tailen, &sk->sk_wmem_alloc);
goto out; goto out;
......
...@@ -344,8 +344,8 @@ static void __net_exit xfrm6_tunnel_net_exit(struct net *net) ...@@ -344,8 +344,8 @@ static void __net_exit xfrm6_tunnel_net_exit(struct net *net)
struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net); struct xfrm6_tunnel_net *xfrm6_tn = xfrm6_tunnel_pernet(net);
unsigned int i; unsigned int i;
xfrm_state_flush(net, IPSEC_PROTO_ANY, false);
xfrm_flush_gc(); xfrm_flush_gc();
xfrm_state_flush(net, IPSEC_PROTO_ANY, false, true);
for (i = 0; i < XFRM6_TUNNEL_SPI_BYADDR_HSIZE; i++) for (i = 0; i < XFRM6_TUNNEL_SPI_BYADDR_HSIZE; i++)
WARN_ON_ONCE(!hlist_empty(&xfrm6_tn->spi_byaddr[i])); WARN_ON_ONCE(!hlist_empty(&xfrm6_tn->spi_byaddr[i]));
......
...@@ -196,30 +196,22 @@ static int pfkey_release(struct socket *sock) ...@@ -196,30 +196,22 @@ static int pfkey_release(struct socket *sock)
return 0; return 0;
} }
static int pfkey_broadcast_one(struct sk_buff *skb, struct sk_buff **skb2, static int pfkey_broadcast_one(struct sk_buff *skb, gfp_t allocation,
gfp_t allocation, struct sock *sk) struct sock *sk)
{ {
int err = -ENOBUFS; int err = -ENOBUFS;
sock_hold(sk); if (atomic_read(&sk->sk_rmem_alloc) > sk->sk_rcvbuf)
if (*skb2 == NULL) { return err;
if (refcount_read(&skb->users) != 1) {
*skb2 = skb_clone(skb, allocation); skb = skb_clone(skb, allocation);
} else {
*skb2 = skb; if (skb) {
refcount_inc(&skb->users); skb_set_owner_r(skb, sk);
} skb_queue_tail(&sk->sk_receive_queue, skb);
} sk->sk_data_ready(sk);
if (*skb2 != NULL) { err = 0;
if (atomic_read(&sk->sk_rmem_alloc) <= sk->sk_rcvbuf) {
skb_set_owner_r(*skb2, sk);
skb_queue_tail(&sk->sk_receive_queue, *skb2);
sk->sk_data_ready(sk);
*skb2 = NULL;
err = 0;
}
} }
sock_put(sk);
return err; return err;
} }
...@@ -234,7 +226,6 @@ static int pfkey_broadcast(struct sk_buff *skb, gfp_t allocation, ...@@ -234,7 +226,6 @@ static int pfkey_broadcast(struct sk_buff *skb, gfp_t allocation,
{ {
struct netns_pfkey *net_pfkey = net_generic(net, pfkey_net_id); struct netns_pfkey *net_pfkey = net_generic(net, pfkey_net_id);
struct sock *sk; struct sock *sk;
struct sk_buff *skb2 = NULL;
int err = -ESRCH; int err = -ESRCH;
/* XXX Do we need something like netlink_overrun? I think /* XXX Do we need something like netlink_overrun? I think
...@@ -253,7 +244,7 @@ static int pfkey_broadcast(struct sk_buff *skb, gfp_t allocation, ...@@ -253,7 +244,7 @@ static int pfkey_broadcast(struct sk_buff *skb, gfp_t allocation,
* socket. * socket.
*/ */
if (pfk->promisc) if (pfk->promisc)
pfkey_broadcast_one(skb, &skb2, GFP_ATOMIC, sk); pfkey_broadcast_one(skb, GFP_ATOMIC, sk);
/* the exact target will be processed later */ /* the exact target will be processed later */
if (sk == one_sk) if (sk == one_sk)
...@@ -268,7 +259,7 @@ static int pfkey_broadcast(struct sk_buff *skb, gfp_t allocation, ...@@ -268,7 +259,7 @@ static int pfkey_broadcast(struct sk_buff *skb, gfp_t allocation,
continue; continue;
} }
err2 = pfkey_broadcast_one(skb, &skb2, GFP_ATOMIC, sk); err2 = pfkey_broadcast_one(skb, GFP_ATOMIC, sk);
/* Error is cleared after successful sending to at least one /* Error is cleared after successful sending to at least one
* registered KM */ * registered KM */
...@@ -278,9 +269,8 @@ static int pfkey_broadcast(struct sk_buff *skb, gfp_t allocation, ...@@ -278,9 +269,8 @@ static int pfkey_broadcast(struct sk_buff *skb, gfp_t allocation,
rcu_read_unlock(); rcu_read_unlock();
if (one_sk != NULL) if (one_sk != NULL)
err = pfkey_broadcast_one(skb, &skb2, allocation, one_sk); err = pfkey_broadcast_one(skb, allocation, one_sk);
kfree_skb(skb2);
kfree_skb(skb); kfree_skb(skb);
return err; return err;
} }
...@@ -1783,7 +1773,7 @@ static int pfkey_flush(struct sock *sk, struct sk_buff *skb, const struct sadb_m ...@@ -1783,7 +1773,7 @@ static int pfkey_flush(struct sock *sk, struct sk_buff *skb, const struct sadb_m
if (proto == 0) if (proto == 0)
return -EINVAL; return -EINVAL;
err = xfrm_state_flush(net, proto, true); err = xfrm_state_flush(net, proto, true, false);
err2 = unicast_flush_resp(sk, hdr); err2 = unicast_flush_resp(sk, hdr);
if (err || err2) { if (err || err2) {
if (err == -ESRCH) /* empty table - go quietly */ if (err == -ESRCH) /* empty table - go quietly */
......
...@@ -76,10 +76,10 @@ static struct xfrm_if *xfrmi_decode_session(struct sk_buff *skb) ...@@ -76,10 +76,10 @@ static struct xfrm_if *xfrmi_decode_session(struct sk_buff *skb)
int ifindex; int ifindex;
struct xfrm_if *xi; struct xfrm_if *xi;
if (!skb->dev) if (!secpath_exists(skb) || !skb->dev)
return NULL; return NULL;
xfrmn = net_generic(dev_net(skb->dev), xfrmi_net_id); xfrmn = net_generic(xs_net(xfrm_input_state(skb)), xfrmi_net_id);
ifindex = skb->dev->ifindex; ifindex = skb->dev->ifindex;
for_each_xfrmi_rcu(xfrmn->xfrmi[0], xi) { for_each_xfrmi_rcu(xfrmn->xfrmi[0], xi) {
......
...@@ -3314,8 +3314,10 @@ int __xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, ...@@ -3314,8 +3314,10 @@ int __xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb,
if (ifcb) { if (ifcb) {
xi = ifcb->decode_session(skb); xi = ifcb->decode_session(skb);
if (xi) if (xi) {
if_id = xi->p.if_id; if_id = xi->p.if_id;
net = xi->net;
}
} }
rcu_read_unlock(); rcu_read_unlock();
......
...@@ -432,7 +432,7 @@ void xfrm_state_free(struct xfrm_state *x) ...@@ -432,7 +432,7 @@ void xfrm_state_free(struct xfrm_state *x)
} }
EXPORT_SYMBOL(xfrm_state_free); EXPORT_SYMBOL(xfrm_state_free);
static void xfrm_state_gc_destroy(struct xfrm_state *x) static void ___xfrm_state_destroy(struct xfrm_state *x)
{ {
tasklet_hrtimer_cancel(&x->mtimer); tasklet_hrtimer_cancel(&x->mtimer);
del_timer_sync(&x->rtimer); del_timer_sync(&x->rtimer);
...@@ -474,7 +474,7 @@ static void xfrm_state_gc_task(struct work_struct *work) ...@@ -474,7 +474,7 @@ static void xfrm_state_gc_task(struct work_struct *work)
synchronize_rcu(); synchronize_rcu();
hlist_for_each_entry_safe(x, tmp, &gc_list, gclist) hlist_for_each_entry_safe(x, tmp, &gc_list, gclist)
xfrm_state_gc_destroy(x); ___xfrm_state_destroy(x);
} }
static enum hrtimer_restart xfrm_timer_handler(struct hrtimer *me) static enum hrtimer_restart xfrm_timer_handler(struct hrtimer *me)
...@@ -598,14 +598,19 @@ struct xfrm_state *xfrm_state_alloc(struct net *net) ...@@ -598,14 +598,19 @@ struct xfrm_state *xfrm_state_alloc(struct net *net)
} }
EXPORT_SYMBOL(xfrm_state_alloc); EXPORT_SYMBOL(xfrm_state_alloc);
void __xfrm_state_destroy(struct xfrm_state *x) void __xfrm_state_destroy(struct xfrm_state *x, bool sync)
{ {
WARN_ON(x->km.state != XFRM_STATE_DEAD); WARN_ON(x->km.state != XFRM_STATE_DEAD);
spin_lock_bh(&xfrm_state_gc_lock); if (sync) {
hlist_add_head(&x->gclist, &xfrm_state_gc_list); synchronize_rcu();
spin_unlock_bh(&xfrm_state_gc_lock); ___xfrm_state_destroy(x);
schedule_work(&xfrm_state_gc_work); } else {
spin_lock_bh(&xfrm_state_gc_lock);
hlist_add_head(&x->gclist, &xfrm_state_gc_list);
spin_unlock_bh(&xfrm_state_gc_lock);
schedule_work(&xfrm_state_gc_work);
}
} }
EXPORT_SYMBOL(__xfrm_state_destroy); EXPORT_SYMBOL(__xfrm_state_destroy);
...@@ -708,7 +713,7 @@ xfrm_dev_state_flush_secctx_check(struct net *net, struct net_device *dev, bool ...@@ -708,7 +713,7 @@ xfrm_dev_state_flush_secctx_check(struct net *net, struct net_device *dev, bool
} }
#endif #endif
int xfrm_state_flush(struct net *net, u8 proto, bool task_valid) int xfrm_state_flush(struct net *net, u8 proto, bool task_valid, bool sync)
{ {
int i, err = 0, cnt = 0; int i, err = 0, cnt = 0;
...@@ -730,7 +735,10 @@ int xfrm_state_flush(struct net *net, u8 proto, bool task_valid) ...@@ -730,7 +735,10 @@ int xfrm_state_flush(struct net *net, u8 proto, bool task_valid)
err = xfrm_state_delete(x); err = xfrm_state_delete(x);
xfrm_audit_state_delete(x, err ? 0 : 1, xfrm_audit_state_delete(x, err ? 0 : 1,
task_valid); task_valid);
xfrm_state_put(x); if (sync)
xfrm_state_put_sync(x);
else
xfrm_state_put(x);
if (!err) if (!err)
cnt++; cnt++;
...@@ -2215,7 +2223,7 @@ void xfrm_state_delete_tunnel(struct xfrm_state *x) ...@@ -2215,7 +2223,7 @@ void xfrm_state_delete_tunnel(struct xfrm_state *x)
if (atomic_read(&t->tunnel_users) == 2) if (atomic_read(&t->tunnel_users) == 2)
xfrm_state_delete(t); xfrm_state_delete(t);
atomic_dec(&t->tunnel_users); atomic_dec(&t->tunnel_users);
xfrm_state_put(t); xfrm_state_put_sync(t);
x->tunnel = NULL; x->tunnel = NULL;
} }
} }
...@@ -2375,8 +2383,8 @@ void xfrm_state_fini(struct net *net) ...@@ -2375,8 +2383,8 @@ void xfrm_state_fini(struct net *net)
unsigned int sz; unsigned int sz;
flush_work(&net->xfrm.state_hash_work); flush_work(&net->xfrm.state_hash_work);
xfrm_state_flush(net, IPSEC_PROTO_ANY, false);
flush_work(&xfrm_state_gc_work); flush_work(&xfrm_state_gc_work);
xfrm_state_flush(net, IPSEC_PROTO_ANY, false, true);
WARN_ON(!list_empty(&net->xfrm.state_all)); WARN_ON(!list_empty(&net->xfrm.state_all));
......
...@@ -1932,7 +1932,7 @@ static int xfrm_flush_sa(struct sk_buff *skb, struct nlmsghdr *nlh, ...@@ -1932,7 +1932,7 @@ static int xfrm_flush_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
struct xfrm_usersa_flush *p = nlmsg_data(nlh); struct xfrm_usersa_flush *p = nlmsg_data(nlh);
int err; int err;
err = xfrm_state_flush(net, p->proto, true); err = xfrm_state_flush(net, p->proto, true, false);
if (err) { if (err) {
if (err == -ESRCH) /* empty table */ if (err == -ESRCH) /* empty table */
return 0; return 0;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment