Module Name: src Committed By: riastradh Date: Tue Oct 8 02:30:05 UTC 2024
Modified Files: src/sys/netinet: udp_usrreq.c src/sys/netinet6: udp6_usrreq.c Log Message: udp(4): Clarify udp4/6_espinudp and inp_overudp_cb return. Cleanup to detect problems like this earlier: PR kern/58688: userland panic of kernel via wg(4) To generate a diff of this commit: cvs rdiff -u -r1.265 -r1.266 src/sys/netinet/udp_usrreq.c cvs rdiff -u -r1.155 -r1.156 src/sys/netinet6/udp6_usrreq.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/sys/netinet/udp_usrreq.c diff -u src/sys/netinet/udp_usrreq.c:1.265 src/sys/netinet/udp_usrreq.c:1.266 --- src/sys/netinet/udp_usrreq.c:1.265 Fri Jul 5 04:31:54 2024 +++ src/sys/netinet/udp_usrreq.c Tue Oct 8 02:30:04 2024 @@ -1,4 +1,4 @@ -/* $NetBSD: udp_usrreq.c,v 1.265 2024/07/05 04:31:54 rin Exp $ */ +/* $NetBSD: udp_usrreq.c,v 1.266 2024/10/08 02:30:04 riastradh Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -66,7 +66,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: udp_usrreq.c,v 1.265 2024/07/05 04:31:54 rin Exp $"); +__KERNEL_RCSID(0, "$NetBSD: udp_usrreq.c,v 1.266 2024/10/08 02:30:04 riastradh Exp $"); #ifdef _KERNEL_OPT #include "opt_inet.h" @@ -575,10 +575,12 @@ udp4_realinput(struct sockaddr_in *src, if (inp->inp_flags & INP_ESPINUDP) { switch (udp4_espinudp(mp, off)) { case -1: /* Error, m was freed */ + KASSERT(*mp == NULL); rcvcnt = -1; goto bad; case 1: /* ESP over UDP */ + KASSERT(*mp == NULL); rcvcnt++; goto bad; @@ -599,6 +601,7 @@ udp4_realinput(struct sockaddr_in *src, sintosa(src), inp->inp_overudp_arg); switch (ret) { case -1: /* Error, m was freed */ + KASSERT(*mp == NULL); rcvcnt = -1; goto bad; @@ -1258,7 +1261,7 @@ udp4_espinudp(struct mbuf **mp, int off) if (m->m_len < minlen) { if ((*mp = m_pullup(m, minlen)) == NULL) { - return -1; + return -1; /* dropped */ } m = *mp; } @@ -1270,15 +1273,15 @@ udp4_espinudp(struct mbuf **mp, int off) if ((len == 1) && (*data == 0xff)) { m_freem(m); *mp = NULL; /* avoid any further processing by caller */ - return 1; + return 1; /* consumed */ } /* Handle Non-ESP marker (32bit). If zero, then IKE. */ marker = (uint32_t *)data; if (len <= sizeof(uint32_t)) - return 0; + return 0; /* passthrough */ if (marker[0] == 0) - return 0; + return 0; /* passthrough */ /* * Get the UDP ports. They are handled in network order @@ -1323,7 +1326,8 @@ udp4_espinudp(struct mbuf **mp, int off) if ((tag = m_tag_get(PACKET_TAG_IPSEC_NAT_T_PORTS, sizeof(sport) + sizeof(dport), M_DONTWAIT)) == NULL) { m_freem(m); - return -1; + *mp = NULL; + return -1; /* dropped */ } ((u_int16_t *)(tag + 1))[0] = sport; ((u_int16_t *)(tag + 1))[1] = dport; @@ -1336,7 +1340,7 @@ udp4_espinudp(struct mbuf **mp, int off) /* We handled it, it shouldn't be handled by UDP */ *mp = NULL; /* avoid free by caller ... */ - return 1; + return 1; /* consumed */ } #endif Index: src/sys/netinet6/udp6_usrreq.c diff -u src/sys/netinet6/udp6_usrreq.c:1.155 src/sys/netinet6/udp6_usrreq.c:1.156 --- src/sys/netinet6/udp6_usrreq.c:1.155 Fri Jul 5 04:31:54 2024 +++ src/sys/netinet6/udp6_usrreq.c Tue Oct 8 02:30:05 2024 @@ -1,4 +1,4 @@ -/* $NetBSD: udp6_usrreq.c,v 1.155 2024/07/05 04:31:54 rin Exp $ */ +/* $NetBSD: udp6_usrreq.c,v 1.156 2024/10/08 02:30:05 riastradh Exp $ */ /* $KAME: udp6_usrreq.c,v 1.86 2001/05/27 17:33:00 itojun Exp $ */ /* $KAME: udp6_output.c,v 1.43 2001/10/15 09:19:52 itojun Exp $ */ @@ -63,7 +63,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: udp6_usrreq.c,v 1.155 2024/07/05 04:31:54 rin Exp $"); +__KERNEL_RCSID(0, "$NetBSD: udp6_usrreq.c,v 1.156 2024/10/08 02:30:05 riastradh Exp $"); #ifdef _KERNEL_OPT #include "opt_inet.h" @@ -525,10 +525,12 @@ udp6_realinput(int af, struct sockaddr_i if (inp->inp_flags & IN6P_ESPINUDP) { switch (udp6_espinudp(mp, off)) { case -1: /* Error, m was freed */ + KASSERT(*mp == NULL); rcvcnt = -1; goto bad; case 1: /* ESP over UDP */ + KASSERT(*mp == NULL); rcvcnt++; goto bad; @@ -550,6 +552,7 @@ udp6_realinput(int af, struct sockaddr_i sin6tosa(src), inp->inp_overudp_arg); switch (ret) { case -1: /* Error, m was freed */ + KASSERT(*mp == NULL); rcvcnt = -1; goto bad; @@ -564,6 +567,7 @@ udp6_realinput(int af, struct sockaddr_i * Normal UDP processing will take place, * m may have changed. */ + m = *mp; break; } } @@ -1426,7 +1430,7 @@ udp6_espinudp(struct mbuf **mp, int off) if (m->m_len < minlen) { if ((*mp = m_pullup(m, minlen)) == NULL) { - return -1; + return -1; /* dropped */ } m = *mp; } @@ -1438,15 +1442,15 @@ udp6_espinudp(struct mbuf **mp, int off) if ((len == 1) && (*(unsigned char *)data == 0xff)) { m_freem(m); *mp = NULL; /* avoid any further processing by caller ... */ - return 1; + return 1; /* consumed */ } /* Handle Non-ESP marker (32bit). If zero, then IKE. */ marker = (uint32_t *)data; if (len <= sizeof(uint32_t)) - return 0; + return 0; /* passthrough */ if (marker[0] == 0) - return 0; + return 0; /* passthrough */ /* * Get the UDP ports. They are handled in network @@ -1491,7 +1495,8 @@ udp6_espinudp(struct mbuf **mp, int off) if ((tag = m_tag_get(PACKET_TAG_IPSEC_NAT_T_PORTS, sizeof(sport) + sizeof(dport), M_DONTWAIT)) == NULL) { m_freem(m); - return -1; + *mp = NULL; + return -1; /* dropped */ } ((u_int16_t *)(tag + 1))[0] = sport; ((u_int16_t *)(tag + 1))[1] = dport; @@ -1504,7 +1509,7 @@ udp6_espinudp(struct mbuf **mp, int off) /* We handled it, it shouldn't be handled by UDP */ *mp = NULL; /* avoid free by caller ... */ - return 1; + return 1; /* consumed */ } #endif /* IPSEC */