Received: by 10.223.176.5 with SMTP id f5csp3361101wra; Mon, 29 Jan 2018 12:10:34 -0800 (PST) X-Google-Smtp-Source: AH8x226QKlofhz0c1mmpSbIQDIWRZB2SBfvehrfRjNwwiURQM9CDfEquQw+JumtXkLHy94uzGNQR X-Received: by 2002:a17:902:595d:: with SMTP id e29-v6mr23398148plj.436.1517256634413; Mon, 29 Jan 2018 12:10:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1517256634; cv=none; d=google.com; s=arc-20160816; b=yABUdhbylRkl4/FEcOZz2p9x5texpTqMsbhYdPVZnEITPD3NtF6c5HJfvP/gWPePt9 /oJt5vThWQkLIGM3PvBKRWMd6GvoRTu1jyc0D2fK50z/YxOO9FTu1qemC8Jbhvltluy5 HmFEuT5JvJB7ZJiHCAxXDi5WA8vlQmmtHdg4yWrDpAJL9cAN3E1sEdPDbMxGFYbYTt81 jqpYO5m1vuGLr6MtSX4QtbFnwK6+U6QbZo1lPizcihnzGjjUBXXVjUKP7hnnxXfVkMwv TyZ5WvHdFuW6Hk+Uu1TBh69/Tk2I0M5J13OwTNrjO/BBX+qwXr5weBIr/WM6TKvkA3K3 iI3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=FJjL5KIKVc00/bNAF2XFtsnRaiqsm7KRmX0kYX/mV3Y=; b=XDC+aJV7dWODgtZMADXkkaHgKvRQuM8sixQ6yXYJICVjAIyxudyEhxv1BresaRuxfn cs4zsRKsgoYNFFFklcu/lIEm7RlKE2S1lelqU1x1t+xyszryhNe0BgalWvNmUIxOBNWZ DheTBE5BL1pKRnT8NXuezkuxL78Sg045p+whzcj6MlNlFQVI/UH2Xz4cHSR4BrYg/skN jvMky7RMfm1SZ6uuxy2x2WgnwosmXyTSnupg3gwGQo0azPeRrYmAEKVXpY94rGN0Z2y4 Pxr8LWGpOmmEBXDUfK5poDeogLkhmG5T+iJkswloEB51ioHCd+miSo46JNM8Jyy8f7gt t6hQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v70si2072883pfa.405.2018.01.29.12.10.20; Mon, 29 Jan 2018 12:10:34 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753370AbeA2UJ7 (ORCPT + 99 others); Mon, 29 Jan 2018 15:09:59 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:55964 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753352AbeA2UJ5 (ORCPT ); Mon, 29 Jan 2018 15:09:57 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id A0A1B2EBE; Mon, 29 Jan 2018 12:59:52 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eric Dumazet , Willem de Bruijn , Jason Wang , syzbot+9da69ebac7dddd804552@syzkaller.appspotmail.com, "David S. Miller" Subject: [PATCH 3.18 45/52] net: qdisc_pkt_len_init() should be more robust Date: Mon, 29 Jan 2018 13:57:03 +0100 Message-Id: <20180129123630.151216006@linuxfoundation.org> X-Mailer: git-send-email 2.16.1 In-Reply-To: <20180129123628.168904217@linuxfoundation.org> References: <20180129123628.168904217@linuxfoundation.org> User-Agent: quilt/0.65 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.18-stable review patch. If anyone has any objections, please let me know. ------------------ From: Eric Dumazet [ Upstream commit 7c68d1a6b4db9012790af7ac0f0fdc0d2083422a ] Without proper validation of DODGY packets, we might very well feed qdisc_pkt_len_init() with invalid GSO packets. tcp_hdrlen() might access out-of-bound data, so let's use skb_header_pointer() and proper checks. Whole story is described in commit d0c081b49137 ("flow_dissector: properly cap thoff field") We have the goal of validating DODGY packets earlier in the stack, so we might very well revert this fix in the future. Signed-off-by: Eric Dumazet Cc: Willem de Bruijn Cc: Jason Wang Reported-by: syzbot+9da69ebac7dddd804552@syzkaller.appspotmail.com Acked-by: Jason Wang Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/core/dev.c | 19 +++++++++++++++---- 1 file changed, 15 insertions(+), 4 deletions(-) --- a/net/core/dev.c +++ b/net/core/dev.c @@ -2772,10 +2772,21 @@ static void qdisc_pkt_len_init(struct sk hdr_len = skb_transport_header(skb) - skb_mac_header(skb); /* + transport layer */ - if (likely(shinfo->gso_type & (SKB_GSO_TCPV4 | SKB_GSO_TCPV6))) - hdr_len += tcp_hdrlen(skb); - else - hdr_len += sizeof(struct udphdr); + if (likely(shinfo->gso_type & (SKB_GSO_TCPV4 | SKB_GSO_TCPV6))) { + const struct tcphdr *th; + struct tcphdr _tcphdr; + + th = skb_header_pointer(skb, skb_transport_offset(skb), + sizeof(_tcphdr), &_tcphdr); + if (likely(th)) + hdr_len += __tcp_hdrlen(th); + } else { + struct udphdr _udphdr; + + if (skb_header_pointer(skb, skb_transport_offset(skb), + sizeof(_udphdr), &_udphdr)) + hdr_len += sizeof(struct udphdr); + } if (shinfo->gso_type & SKB_GSO_DODGY) gso_segs = DIV_ROUND_UP(skb->len - hdr_len,