Module Name: src Committed By: bouyer Date: Sun Sep 15 21:00:16 UTC 2019
Modified Files: src/sys/netinet: ip_input.c src/sys/netinet6: ip6_input.c Log Message: Packet filters can return an mbuf chain with fragmented headers, so m_pullup() it if needed and remove the KASSERT()s. To generate a diff of this commit: cvs rdiff -u -r1.389 -r1.390 src/sys/netinet/ip_input.c cvs rdiff -u -r1.208 -r1.209 src/sys/netinet6/ip6_input.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/sys/netinet/ip_input.c diff -u src/sys/netinet/ip_input.c:1.389 src/sys/netinet/ip_input.c:1.390 --- src/sys/netinet/ip_input.c:1.389 Mon May 13 07:47:59 2019 +++ src/sys/netinet/ip_input.c Sun Sep 15 21:00:15 2019 @@ -1,4 +1,4 @@ -/* $NetBSD: ip_input.c,v 1.389 2019/05/13 07:47:59 ozaki-r Exp $ */ +/* $NetBSD: ip_input.c,v 1.390 2019/09/15 21:00:15 bouyer Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -91,7 +91,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ip_input.c,v 1.389 2019/05/13 07:47:59 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ip_input.c,v 1.390 2019/09/15 21:00:15 bouyer Exp $"); #ifdef _KERNEL_OPT #include "opt_inet.h" @@ -581,10 +581,25 @@ ip_input(struct mbuf *m) IP_STATINC(IP_STAT_PFILDROP_IN); goto out; } - KASSERT(m->m_len >= sizeof(struct ip)); + if (__predict_false(m->m_len < sizeof(struct ip))) { + if ((m = m_pullup(m, sizeof(struct ip))) == NULL) { + IP_STATINC(IP_STAT_TOOSMALL); + goto out; + } + } ip = mtod(m, struct ip *); hlen = ip->ip_hl << 2; - KASSERT(m->m_len >= hlen); + if (hlen < sizeof(struct ip)) { /* minimum header length */ + IP_STATINC(IP_STAT_BADHLEN); + goto out; + } + if (hlen > m->m_len) { + if ((m = m_pullup(m, hlen)) == NULL) { + IP_STATINC(IP_STAT_BADHLEN); + goto out; + } + ip = mtod(m, struct ip *); + } /* * XXX The setting of "srcrt" here is to prevent ip_forward() Index: src/sys/netinet6/ip6_input.c diff -u src/sys/netinet6/ip6_input.c:1.208 src/sys/netinet6/ip6_input.c:1.209 --- src/sys/netinet6/ip6_input.c:1.208 Mon May 13 07:47:59 2019 +++ src/sys/netinet6/ip6_input.c Sun Sep 15 21:00:15 2019 @@ -1,4 +1,4 @@ -/* $NetBSD: ip6_input.c,v 1.208 2019/05/13 07:47:59 ozaki-r Exp $ */ +/* $NetBSD: ip6_input.c,v 1.209 2019/09/15 21:00:15 bouyer Exp $ */ /* $KAME: ip6_input.c,v 1.188 2001/03/29 05:34:31 itojun Exp $ */ /* @@ -62,7 +62,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ip6_input.c,v 1.208 2019/05/13 07:47:59 ozaki-r Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ip6_input.c,v 1.209 2019/09/15 21:00:15 bouyer Exp $"); #ifdef _KERNEL_OPT #include "opt_gateway.h" @@ -356,7 +356,13 @@ ip6_input(struct mbuf *m, struct ifnet * IP6_STATINC(IP6_STAT_PFILDROP_IN); return; } - KASSERT(m->m_len >= sizeof(struct ip6_hdr)); + if (m->m_len < sizeof(struct ip6_hdr)) { + if ((m = m_pullup(m, sizeof(struct ip6_hdr))) == NULL) { + IP6_STATINC(IP6_STAT_TOOSMALL); + in6_ifstat_inc(rcvif, ifs6_in_hdrerr); + return; + } + } ip6 = mtod(m, struct ip6_hdr *); srcrt = !IN6_ARE_ADDR_EQUAL(&odst, &ip6->ip6_dst); }