diff options
author | Steffen Klassert <steffen.klassert@secunet.com> | 2011-09-20 19:38:58 -0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2011-09-21 15:20:57 -0400 |
commit | bcf66bf54aabffc150acd1c99e0f4bc51935eada (patch) | |
tree | 7373ca2db919a39ea8f2e11416c881121ade0930 | |
parent | 561dac2d410ffac0b57a23b85ae0a623c1a076ca (diff) |
xfrm: Perform a replay check after return from async codepaths
When asyncronous crypto algorithms are used, there might be many
packets that passed the xfrm replay check, but the replay advance
function is not called yet for these packets. So the replay check
function would accept a replay of all of these packets. Also the
system might crash if there are more packets in async processing
than the size of the anti replay window, because the replay advance
function would try to update the replay window beyond the bounds.
This pach adds a second replay check after resuming from the async
processing to fix these issues.
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
Acked-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | net/xfrm/xfrm_input.c | 5 |
1 files changed, 5 insertions, 0 deletions
diff --git a/net/xfrm/xfrm_input.c b/net/xfrm/xfrm_input.c index a026b0ef2443..54a0dc2e2f8d 100644 --- a/net/xfrm/xfrm_input.c +++ b/net/xfrm/xfrm_input.c | |||
@@ -212,6 +212,11 @@ resume: | |||
212 | /* only the first xfrm gets the encap type */ | 212 | /* only the first xfrm gets the encap type */ |
213 | encap_type = 0; | 213 | encap_type = 0; |
214 | 214 | ||
215 | if (async && x->repl->check(x, skb, seq)) { | ||
216 | XFRM_INC_STATS(net, LINUX_MIB_XFRMINSTATESEQERROR); | ||
217 | goto drop_unlock; | ||
218 | } | ||
219 | |||
215 | x->repl->advance(x, seq); | 220 | x->repl->advance(x, seq); |
216 | 221 | ||
217 | x->curlft.bytes += skb->len; | 222 | x->curlft.bytes += skb->len; |