mirror of
				https://github.com/torvalds/linux.git
				synced 2025-11-04 02:30:34 +02:00 
			
		
		
		
	Fix the return value of none_validate_challenge() to be explicitly true
(which indicates the source packet should simply be discarded) rather than
implicitly true (because rxrpc_abort_conn() always returns -EPROTO which
gets converted to true).
Note that this change doesn't change the behaviour of the code (which is
correct by accident) and, in any case, we *shouldn't* get a CHALLENGE
packet to an rxnull connection (ie. no security).
Reported-by: Dan Carpenter <dan.carpenter@linaro.org>
Closes: https://lists.infradead.org/pipermail/linux-afs/2025-April/009738.html
Signed-off-by: David Howells <dhowells@redhat.com>
cc: Marc Dionne <marc.dionne@auristor.com>
cc: Jakub Kicinski <kuba@kernel.org>
cc: "David S. Miller" <davem@davemloft.net>
cc: Eric Dumazet <edumazet@google.com>
cc: Paolo Abeni <pabeni@redhat.com>
cc: Simon Horman <horms@kernel.org>
cc: linux-afs@lists.infradead.org
cc: netdev@vger.kernel.org
Reviewed-by: Simon Horman <horms@kernel.org>
Link: https://patch.msgid.link/10720.1748358103@warthog.procyon.org.uk
Fixes: 5800b1cf3f ("rxrpc: Allow CHALLENGEs to the passed to the app for a RESPONSE")
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
		
	
			
		
			
				
	
	
		
			96 lines
		
	
	
	
		
			2.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			96 lines
		
	
	
	
		
			2.3 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
// SPDX-License-Identifier: GPL-2.0-or-later
 | 
						|
/* Null security operations.
 | 
						|
 *
 | 
						|
 * Copyright (C) 2016 Red Hat, Inc. All Rights Reserved.
 | 
						|
 * Written by David Howells (dhowells@redhat.com)
 | 
						|
 */
 | 
						|
 | 
						|
#include <net/af_rxrpc.h>
 | 
						|
#include "ar-internal.h"
 | 
						|
 | 
						|
static int none_init_connection_security(struct rxrpc_connection *conn,
 | 
						|
					 struct rxrpc_key_token *token)
 | 
						|
{
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Allocate an appropriately sized buffer for the amount of data remaining.
 | 
						|
 */
 | 
						|
static struct rxrpc_txbuf *none_alloc_txbuf(struct rxrpc_call *call, size_t remain, gfp_t gfp)
 | 
						|
{
 | 
						|
	return rxrpc_alloc_data_txbuf(call, umin(remain, RXRPC_JUMBO_DATALEN), 1, gfp);
 | 
						|
}
 | 
						|
 | 
						|
static int none_secure_packet(struct rxrpc_call *call, struct rxrpc_txbuf *txb)
 | 
						|
{
 | 
						|
	txb->pkt_len = txb->len;
 | 
						|
	if (txb->len == RXRPC_JUMBO_DATALEN)
 | 
						|
		txb->jumboable = true;
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static int none_verify_packet(struct rxrpc_call *call, struct sk_buff *skb)
 | 
						|
{
 | 
						|
	struct rxrpc_skb_priv *sp = rxrpc_skb(skb);
 | 
						|
 | 
						|
	sp->flags |= RXRPC_RX_VERIFIED;
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static void none_free_call_crypto(struct rxrpc_call *call)
 | 
						|
{
 | 
						|
}
 | 
						|
 | 
						|
static bool none_validate_challenge(struct rxrpc_connection *conn,
 | 
						|
				    struct sk_buff *skb)
 | 
						|
{
 | 
						|
	rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO,
 | 
						|
			 rxrpc_eproto_rxnull_challenge);
 | 
						|
	return true;
 | 
						|
}
 | 
						|
 | 
						|
static int none_sendmsg_respond_to_challenge(struct sk_buff *challenge,
 | 
						|
					     struct msghdr *msg)
 | 
						|
{
 | 
						|
	return -EINVAL;
 | 
						|
}
 | 
						|
 | 
						|
static int none_verify_response(struct rxrpc_connection *conn,
 | 
						|
				struct sk_buff *skb)
 | 
						|
{
 | 
						|
	return rxrpc_abort_conn(conn, skb, RX_PROTOCOL_ERROR, -EPROTO,
 | 
						|
				rxrpc_eproto_rxnull_response);
 | 
						|
}
 | 
						|
 | 
						|
static void none_clear(struct rxrpc_connection *conn)
 | 
						|
{
 | 
						|
}
 | 
						|
 | 
						|
static int none_init(void)
 | 
						|
{
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
static void none_exit(void)
 | 
						|
{
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * RxRPC Kerberos-based security
 | 
						|
 */
 | 
						|
const struct rxrpc_security rxrpc_no_security = {
 | 
						|
	.name				= "none",
 | 
						|
	.security_index			= RXRPC_SECURITY_NONE,
 | 
						|
	.init				= none_init,
 | 
						|
	.exit				= none_exit,
 | 
						|
	.init_connection_security	= none_init_connection_security,
 | 
						|
	.free_call_crypto		= none_free_call_crypto,
 | 
						|
	.alloc_txbuf			= none_alloc_txbuf,
 | 
						|
	.secure_packet			= none_secure_packet,
 | 
						|
	.verify_packet			= none_verify_packet,
 | 
						|
	.validate_challenge		= none_validate_challenge,
 | 
						|
	.sendmsg_respond_to_challenge	= none_sendmsg_respond_to_challenge,
 | 
						|
	.verify_response		= none_verify_response,
 | 
						|
	.clear				= none_clear,
 | 
						|
};
 |