linux-yocto/net/xfrm
Paul Chaignon 35e6a84883 xfrm: Sanitize marks before insert
[ Upstream commit 0b91fda3a1 ]

Prior to this patch, the mark is sanitized (applying the state's mask to
the state's value) only on inserts when checking if a conflicting XFRM
state or policy exists.

We discovered in Cilium that this same sanitization does not occur
in the hot-path __xfrm_state_lookup. In the hot-path, the sk_buff's mark
is simply compared to the state's value:

    if ((mark & x->mark.m) != x->mark.v)
        continue;

Therefore, users can define unsanitized marks (ex. 0xf42/0xf00) which will
never match any packet.

This commit updates __xfrm_state_insert and xfrm_policy_insert to store
the sanitized marks, thus removing this footgun.

This has the side effect of changing the ip output, as the
returned mark will have the mask applied to it when printed.

Fixes: 3d6acfa764 ("xfrm: SA lookups with mark")
Signed-off-by: Paul Chaignon <paul.chaignon@gmail.com>
Signed-off-by: Louis DeLosSantos <louis.delos.devel@gmail.com>
Co-developed-by: Louis DeLosSantos <louis.delos.devel@gmail.com>
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2025-06-04 14:40:19 +02:00
..
espintcp.c
Kconfig
Makefile
xfrm_algo.c
xfrm_compat.c
xfrm_device.c xfrm: extract dst lookup parameters into a struct 2024-11-01 01:56:03 +01:00
xfrm_hash.c
xfrm_hash.h
xfrm_inout.h
xfrm_input.c xfrm: Preserve vlan tags for transport mode software GRO 2024-05-17 11:56:10 +02:00
xfrm_interface_core.c
xfrm_ipcomp.c
xfrm_output.c xfrm_output: Force software GSO only in tunnel mode 2025-03-28 21:58:59 +01:00
xfrm_policy.c xfrm: Sanitize marks before insert 2025-06-04 14:40:19 +02:00
xfrm_proc.c
xfrm_replay.c xfrm: replay: Fix the update of replay_esn->oseq_hi for GSO 2025-02-21 13:49:21 +01:00
xfrm_state.c xfrm: Sanitize marks before insert 2025-06-04 14:40:19 +02:00
xfrm_sysctl.c
xfrm_user.c xfrm: validate new SA's prefixlen using SA family when sel.family is unset 2024-11-01 01:56:07 +01:00