Revision da353fac65fede6b8b4cfe207f0d9408e3121105 authored by Daniel Jordan on 27 October 2021, 21:59:20 UTC, committed by David S. Miller on 28 October 2021, 13:41:20 UTC
sk->sk_err appears to expect a positive value, a convention that ktls doesn't always follow and that leads to memory corruption in other code. For instance, [kworker] tls_encrypt_done(..., err=<negative error from crypto request>) tls_err_abort(.., err) sk->sk_err = err; [task] splice_from_pipe_feed ... tls_sw_do_sendpage if (sk->sk_err) { ret = -sk->sk_err; // ret is positive splice_from_pipe_feed (continued) ret = actor(...) // ret is still positive and interpreted as bytes // written, resulting in underflow of buf->len and // sd->len, leading to huge buf->offset and bogus // addresses computed in later calls to actor() Fix all tls_err_abort() callers to pass a negative error code consistently and centralize the error-prone sign flip there, throwing in a warning to catch future misuse and uninlining the function so it really does only warn once. Cc: stable@vger.kernel.org Fixes: c46234ebb4d1e ("tls: RX path for ktls") Reported-by: syzbot+b187b77c8474f9648fae@syzkaller.appspotmail.com Signed-off-by: Daniel Jordan <daniel.m.jordan@oracle.com> Signed-off-by: David S. Miller <davem@davemloft.net>
1 parent a32f07d
File | Mode | Size |
---|---|---|
104-quad-8.c | -rw-r--r-- | 30.7 KB |
Kconfig | -rw-r--r-- | 3.1 KB |
Makefile | -rw-r--r-- | 489 bytes |
counter.c | -rw-r--r-- | 38.3 KB |
ftm-quaddec.c | -rw-r--r-- | 8.3 KB |
intel-qep.c | -rw-r--r-- | 13.0 KB |
interrupt-cnt.c | -rw-r--r-- | 5.9 KB |
microchip-tcb-capture.c | -rw-r--r-- | 10.5 KB |
stm32-lptimer-cnt.c | -rw-r--r-- | 13.6 KB |
stm32-timer-cnt.c | -rw-r--r-- | 11.5 KB |
ti-eqep.c | -rw-r--r-- | 10.8 KB |
![swh spinner](/static/img/swh-spinner.gif)
Computing file changes ...