Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp781214ybl; Wed, 11 Dec 2019 07:25:41 -0800 (PST) X-Google-Smtp-Source: APXvYqysMXgkWTdFBU5IVfZh7kukPQD60CVHdlCqIApzB0VYOND9VNjg9Qe0jQXY8hHccyamufPZ X-Received: by 2002:aca:f495:: with SMTP id s143mr3087872oih.118.1576077941077; Wed, 11 Dec 2019 07:25:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576077941; cv=none; d=google.com; s=arc-20160816; b=Ar888Xm+1Ntn020Cde/Rywpc+ChlbrZnqvEJN2FcGWYc3w/J1Qa94fY+Yq32mg+4LK H2z4g3CocX/4DsLNaGAE9HW3fp9mt4M/Bl0wJYlmq5iPAOfeaWfhE3dvPk/Z0hKHNr4h FtfGwsxNXXyjOzdZc3QE991KbpE+AohZNJuTEbliXfTsViQldvXKWBxF94703JxvnDn7 eeQfXJ9KVRcsow/lYSlmkKqla0kjMGzrZ/uVlm7bQYYvjF7J+QEg9xVEV3Yd3tzOVw9q 5yQGq2B6cJ0MQ3eR+PCAYWbftyX97AFUC2n2QL2czqB9gLmhSPYKJv7INebxvc8mIIiQ RlKQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=bc9aQ4j15meFUZoOyKirEQWNYgmcqCISf1rZj2tzc94=; b=CpGpu7PgOuudZpQdyjKOI5UWXD3Eshk2wVHhwTbO9G3ojwbG0fh10QHrWBpuXeUDG8 0u28oq/30w+EH8yuY95E7a3Anqxm5Yb43X65GENl9yzxnauCYXE7aNW+u+u3/5e9aaed HeDGUGZUym0ye/7o0M428E7k/eCRuOB3yf6rkxoIwZxO+/5vIAhY7fRVslSAKulV221c C0tc+WutbFT7fcpWm1q0c78TSsHgTfy+7ex5B4LA1FGQf7W7Nj2yDLaSszICG/UqD4Mu x1rJp6n27JCvwuNgiVYKLHVALy7nGC7RMAVff8S1+Aw/ouegYXi5HrqKJPwhwgXTjn2X 8Q/g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VhdvbNov; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d26si1228855ote.285.2019.12.11.07.25.27; Wed, 11 Dec 2019 07:25:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=VhdvbNov; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732934AbfLKPZD (ORCPT + 99 others); Wed, 11 Dec 2019 10:25:03 -0500 Received: from mail.kernel.org ([198.145.29.99]:56542 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732926AbfLKPY7 (ORCPT ); Wed, 11 Dec 2019 10:24:59 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BE60724658; Wed, 11 Dec 2019 15:24:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1576077899; bh=v+sWtlARkp7pEjZCr67ok4GUfzy/pMIxtzAZLAoB/BE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=VhdvbNovXKLRr0QL1IsEiDewp52TEz2MmXFaWKNykyVyM+Jg9Z8REx1oyB0zf+Xzd MVEom6Y7y9ZM/M40cusco0VraUaCEuhvT+rZVQkuug3dNWfNPyl6HKN4vlvdGn1FRk BhYT7Q6VxSdkughEyH2p1inl/aW7Ta+jQ8KmoA80= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Nicolas Dichtel , Julien Floret , Steffen Klassert Subject: [PATCH 4.19 213/243] xfrm interface: avoid corruption on changelink Date: Wed, 11 Dec 2019 16:06:15 +0100 Message-Id: <20191211150353.723385635@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191211150339.185439726@linuxfoundation.org> References: <20191211150339.185439726@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Nicolas Dichtel commit e9e7e85d75f3731079ffd77c1a66f037aef04fe7 upstream. The new parameters must not be stored in the netdev_priv() before validation, it may corrupt the interface. Note also that if data is NULL, only a memset() is done. $ ip link add xfrm1 type xfrm dev lo if_id 1 $ ip link add xfrm2 type xfrm dev lo if_id 2 $ ip link set xfrm1 type xfrm dev lo if_id 2 RTNETLINK answers: File exists $ ip -d link list dev xfrm1 5: xfrm1@lo: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/none 00:00:00:00:00:00 brd 00:00:00:00:00:00 promiscuity 0 minmtu 68 maxmtu 1500 xfrm if_id 0x2 addrgenmode eui64 numtxqueues 1 numrxqueues 1 gso_max_size 65536 gso_max_segs 65535 => "if_id 0x2" Fixes: f203b76d7809 ("xfrm: Add virtual xfrm interfaces") Signed-off-by: Nicolas Dichtel Tested-by: Julien Floret Signed-off-by: Steffen Klassert Signed-off-by: Greg Kroah-Hartman --- net/xfrm/xfrm_interface.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) --- a/net/xfrm/xfrm_interface.c +++ b/net/xfrm/xfrm_interface.c @@ -674,12 +674,12 @@ static int xfrmi_changelink(struct net_d struct nlattr *data[], struct netlink_ext_ack *extack) { - struct xfrm_if *xi = netdev_priv(dev); struct net *net = dev_net(dev); + struct xfrm_if_parms p; + struct xfrm_if *xi; - xfrmi_netlink_parms(data, &xi->p); - - xi = xfrmi_locate(net, &xi->p); + xfrmi_netlink_parms(data, &p); + xi = xfrmi_locate(net, &p); if (!xi) { xi = netdev_priv(dev); } else { @@ -687,7 +687,7 @@ static int xfrmi_changelink(struct net_d return -EEXIST; } - return xfrmi_update(xi, &xi->p); + return xfrmi_update(xi, &p); } static size_t xfrmi_get_size(const struct net_device *dev)