Received: by 2002:a25:d783:0:0:0:0:0 with SMTP id o125csp653476ybg; Thu, 19 Mar 2020 06:28:01 -0700 (PDT) X-Google-Smtp-Source: ADFU+vv9O8Xr8kBKGxPTDM3xjrKoG4TrJBXD+36C4GRfGtdKRFLjooILNqTab4FYgIF5aoquU8at X-Received: by 2002:a05:6830:13d8:: with SMTP id e24mr2309577otq.328.1584624481462; Thu, 19 Mar 2020 06:28:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1584624481; cv=none; d=google.com; s=arc-20160816; b=JlWID1ppz3qm0vVpUFYfzusbKAIKAA3dNV5HRmx2sNo7gOz7CaGYqKABy7yRLEo8gA 0w6PZRWyiLo10YOkBRHpGkUBJRghh+5s0UDFQWm/h3PgAOHvPn0PryppKFGyKLsSTaMa AuljTYSuxoUS5Ai0ozKjYjGeIPULWL6VWX/xqeM7sgOkNLR7xPBGO8il4YP27cZfpksp xTV3OPrOFGh3++hhcQYzVduoZR/21MO7Z7nmV6nFjJt7CKRrZvCUjhban9R0nqkYdb3V gRETXb1uZTIVA7oP9Vx4lBFrc6CLL7oQFtGUUT48MxVxwdDjMhObK69mdNuMDA0+Plf7 MEQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=5vDJG0jolHpuE9Djh5+yBHz8jzNEXhXX6wqUVs02erA=; b=XYH0nULB92gB8hNMs+iGfXnnuSgPu+13HKUHUsPQOjMFbw83p4m1QSwvOsW/MFV37z ayDlRBTolpJFVKI9HT2KJX5lPqsO7OwaWdU0hqLUgnTwIGHkShjsyLE424g3bq+Ur1hZ foR1uUxDhGXQK9bHzJpocLn8xF4ML49E7AEu3g8n5nG7kmolPuTD8+7c8itSpl+5O5p7 QaULk2GOOBQaSYXaoyTmR4WT4JG3yWA0nS5QrGma8bTQm0qN0Lc1k1tyZM3pnaVR0sln dS0fpvge3lh21VqhUOJVDUTlWTqtchNeLAApl+cmrnzOTDj9lKYyme9lO/R8Ly2qU7cA k76Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zzmNwm3h; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o7si1284011otk.185.2020.03.19.06.27.49; Thu, 19 Mar 2020 06:28:01 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=zzmNwm3h; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730507AbgCSN1f (ORCPT + 99 others); Thu, 19 Mar 2020 09:27:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:55904 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729897AbgCSN1d (ORCPT ); Thu, 19 Mar 2020 09:27:33 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3F9D520B1F; Thu, 19 Mar 2020 13:27:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1584624452; bh=KHwXrlKcbaKW5OTF2R6Sp4xIzaqTtcNI8e891CLiBoo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=zzmNwm3hFZMWJZBQwad6eIfSSilezuB6tLbMZZytXQCoAMlGYT3iuyVST3ljmVhnr /kUWNDgy5f02T3sC8VPPqEoVgeE0myHFv3pQVy/bES341CPiepFZtvIlDIZK+vXL+7 5EHUtv9kA18g5wJYeWqQXR+7zC95IAxeB4Nji8ZI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Guillaume Nault , Matteo Croce , Paul Moore , "David S. Miller" Subject: [PATCH 5.5 65/65] ipv4: ensure rcu_read_lock() in cipso_v4_error() Date: Thu, 19 Mar 2020 14:04:47 +0100 Message-Id: <20200319123946.730703428@linuxfoundation.org> X-Mailer: git-send-email 2.25.2 In-Reply-To: <20200319123926.466988514@linuxfoundation.org> References: <20200319123926.466988514@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Matteo Croce commit 3e72dfdf8227b052393f71d820ec7599909dddc2 upstream. Similarly to commit c543cb4a5f07 ("ipv4: ensure rcu_read_lock() in ipv4_link_failure()"), __ip_options_compile() must be called under rcu protection. Fixes: 3da1ed7ac398 ("net: avoid use IPCB in cipso_v4_error") Suggested-by: Guillaume Nault Signed-off-by: Matteo Croce Acked-by: Paul Moore Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv4/cipso_ipv4.c | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) --- a/net/ipv4/cipso_ipv4.c +++ b/net/ipv4/cipso_ipv4.c @@ -1724,6 +1724,7 @@ void cipso_v4_error(struct sk_buff *skb, { unsigned char optbuf[sizeof(struct ip_options) + 40]; struct ip_options *opt = (struct ip_options *)optbuf; + int res; if (ip_hdr(skb)->protocol == IPPROTO_ICMP || error != -EACCES) return; @@ -1735,7 +1736,11 @@ void cipso_v4_error(struct sk_buff *skb, memset(opt, 0, sizeof(struct ip_options)); opt->optlen = ip_hdr(skb)->ihl*4 - sizeof(struct iphdr); - if (__ip_options_compile(dev_net(skb->dev), opt, skb, NULL)) + rcu_read_lock(); + res = __ip_options_compile(dev_net(skb->dev), opt, skb, NULL); + rcu_read_unlock(); + + if (res) return; if (gateway)