Received: by 2002:ac0:b08d:0:0:0:0:0 with SMTP id l13csp4915542imc; Mon, 25 Feb 2019 13:33:12 -0800 (PST) X-Google-Smtp-Source: AHgI3IZy/qd1lvSN+Xuu/AhPafypqJlcafEDmNxcg2r5PbDJsLZwkWAbQPmHwLWESU0kf88NNcKu X-Received: by 2002:a17:902:6a2:: with SMTP id 31mr9727259plh.129.1551130392037; Mon, 25 Feb 2019 13:33:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551130392; cv=none; d=google.com; s=arc-20160816; b=vkpJoBoqy6FN96lJeO4c+kOBvxzhFpQrxCFXFbKi4tbEwM+DMDpA0N+Do5b4Zc0uzK iMsr4hVcTq+3bF3VAFUDlvWUTuDbSx/kqh4T3VNyUOkLpHJDimW6Bt7tcX+X7p0mMDZz 7r1QH3iHvC4WYGxPqaSVlRAy1ncexDKrDn1UDfPTj7NcGLGH9TxLf6HhpiKt7c1kH8kF 7/1Tb0qEpX9WOpZbQKRiIXsejPn7JAIxQ4iFdNohhHN1btbvEklZEEE+IaKzciXnQ1Y4 M7Jkgdcm3Ccm/LsBfbEzuutfn5vb3YOV1NPaW1rvwolo+MchYsfTSAmtUsSIwQiUm9y1 HEzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=+9Rcj0+ywDTqDiZtKl2vCvDQhF8ABP7hTrv0uma316s=; b=SMX9SN/IQkAs9DjvoiJ7pKFbbICm+x9rgXzYTa7V05w68S5iBvjsriGQ0JG6G6tPZC T/m7lOzCji4tBXRjsuXuRpqrW6DHQkwj64tRCYUndsUV3Ay0o/ZQrXfhDir0OG2h+PmX ahLrA17d4Je1vcxB6C0NUTaaH5oRBUthOEtnA9tLx9GV2vTdoedhQwITOmbQhIV8BEXJ QzcznyPgA+SryV6ZvbIBnP44UBVTe2nBiz8Qrhkkd+rlddfIjbnWjmTMNckcgpNmoQcN txrJ8nrKRFbeqgNz+eAvEjQmQXg9tntGJp4l8J1dR7okxFbmjATVZ4QhAOVACrKD1jRe 5RUg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=PVIpOSKJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 91si10642759pla.89.2019.02.25.13.32.57; Mon, 25 Feb 2019 13:33:12 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=PVIpOSKJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732525AbfBYVck (ORCPT + 99 others); Mon, 25 Feb 2019 16:32:40 -0500 Received: from mail.kernel.org ([198.145.29.99]:38290 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732515AbfBYVci (ORCPT ); Mon, 25 Feb 2019 16:32:38 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4E27F2184D; Mon, 25 Feb 2019 21:32:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1551130356; bh=UJHaR4V1dCu0gkRQJNd1rqf3IdkfHKd8pEqoZL+Gh4c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=PVIpOSKJveuQKh69Kw2XyEh8uAzaDcNB1IMaeM+AU7ww+lUGL2zXd8siMEGpCuk15 L8snLy0DCSPDSAW4DlUu1FG+QsVmUgvtwEx5nhLeX4cyOY5wh2dcgWqClF6bB4bC06 lpX0UIwcwJAaYblpZ6501l/hTrL8W+pHx5JxJJEw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Trond Myklebust , Anna Schumaker , Sasha Levin Subject: [PATCH 4.20 094/183] SUNRPC: Ensure we respect the RPCSEC_GSS sequence number limit Date: Mon, 25 Feb 2019 22:11:07 +0100 Message-Id: <20190225195110.486984321@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190225195054.748060397@linuxfoundation.org> References: <20190225195054.748060397@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 97b78ae96ba76f4ca2d8f5afee6a2e567ccb8f45 ] According to RFC2203, the RPCSEC_GSS sequence numbers are bounded to an upper limit of MAXSEQ = 0x80000000. Ensure that we handle that correctly. Signed-off-by: Trond Myklebust Signed-off-by: Anna Schumaker Signed-off-by: Sasha Levin --- net/sunrpc/auth_gss/auth_gss.c | 12 +++++++++--- net/sunrpc/clnt.c | 19 ++++++++++++------- 2 files changed, 21 insertions(+), 10 deletions(-) diff --git a/net/sunrpc/auth_gss/auth_gss.c b/net/sunrpc/auth_gss/auth_gss.c index ba765473d1f06..efeee5586b2ac 100644 --- a/net/sunrpc/auth_gss/auth_gss.c +++ b/net/sunrpc/auth_gss/auth_gss.c @@ -1563,8 +1563,10 @@ gss_marshal(struct rpc_task *task, __be32 *p) cred_len = p++; spin_lock(&ctx->gc_seq_lock); - req->rq_seqno = ctx->gc_seq++; + req->rq_seqno = (ctx->gc_seq < MAXSEQ) ? ctx->gc_seq++ : MAXSEQ; spin_unlock(&ctx->gc_seq_lock); + if (req->rq_seqno == MAXSEQ) + goto out_expired; *p++ = htonl((u32) RPC_GSS_VERSION); *p++ = htonl((u32) ctx->gc_proc); @@ -1586,14 +1588,18 @@ gss_marshal(struct rpc_task *task, __be32 *p) mic.data = (u8 *)(p + 1); maj_stat = gss_get_mic(ctx->gc_gss_ctx, &verf_buf, &mic); if (maj_stat == GSS_S_CONTEXT_EXPIRED) { - clear_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags); + goto out_expired; } else if (maj_stat != 0) { - printk("gss_marshal: gss_get_mic FAILED (%d)\n", maj_stat); + pr_warn("gss_marshal: gss_get_mic FAILED (%d)\n", maj_stat); + task->tk_status = -EIO; goto out_put_ctx; } p = xdr_encode_opaque(p, NULL, mic.len); gss_put_ctx(ctx); return p; +out_expired: + clear_bit(RPCAUTH_CRED_UPTODATE, &cred->cr_flags); + task->tk_status = -EKEYEXPIRED; out_put_ctx: gss_put_ctx(ctx); return NULL; diff --git a/net/sunrpc/clnt.c b/net/sunrpc/clnt.c index 2189fbc4c5704..1ee04e0ec4bca 100644 --- a/net/sunrpc/clnt.c +++ b/net/sunrpc/clnt.c @@ -1740,11 +1740,8 @@ rpc_xdr_encode(struct rpc_task *task) req->rq_rcvsize); p = rpc_encode_header(task); - if (p == NULL) { - printk(KERN_INFO "RPC: couldn't encode RPC header, exit EIO\n"); - rpc_exit(task, -EIO); + if (p == NULL) return; - } encode = task->tk_msg.rpc_proc->p_encode; if (encode == NULL) @@ -1769,10 +1766,17 @@ call_encode(struct rpc_task *task) /* Did the encode result in an error condition? */ if (task->tk_status != 0) { /* Was the error nonfatal? */ - if (task->tk_status == -EAGAIN || task->tk_status == -ENOMEM) + switch (task->tk_status) { + case -EAGAIN: + case -ENOMEM: rpc_delay(task, HZ >> 4); - else + break; + case -EKEYEXPIRED: + task->tk_action = call_refresh; + break; + default: rpc_exit(task, task->tk_status); + } return; } @@ -2334,7 +2338,8 @@ rpc_encode_header(struct rpc_task *task) *p++ = htonl(clnt->cl_vers); /* program version */ *p++ = htonl(task->tk_msg.rpc_proc->p_proc); /* procedure */ p = rpcauth_marshcred(task, p); - req->rq_slen = xdr_adjust_iovec(&req->rq_svec[0], p); + if (p) + req->rq_slen = xdr_adjust_iovec(&req->rq_svec[0], p); return p; } -- 2.19.1