Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2507825imm; Thu, 7 Jun 2018 11:49:53 -0700 (PDT) X-Google-Smtp-Source: ADUXVKL0o9NNBiPq/me//xIBnFWcEHfukcNtgj2IISPqRA+ncgk8/GgyTs5rSPbA/hSVWvLTog2A X-Received: by 2002:a65:55c7:: with SMTP id k7-v6mr2339005pgs.311.1528397393490; Thu, 07 Jun 2018 11:49:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528397393; cv=none; d=google.com; s=arc-20160816; b=tAbkmaZ2A7WAWoJao2ttlVLz/Yk7VgsAxKeAI92aPvHhdFzvf3ogvwp7x23lHpPhJ8 MWdQEYTjEGSB4syPjMfeHD/KBypqkJPWrW/4/73yeCfJ5N5Fxt+wJWBxxWGxmHsJV526 KLLLRTvJ00Chr6zcvqOlZss37te61IIj8ag4cZA5n8c5lu22aXaB/wiuRmeapwGLHL3q JYEYs2j4a8h0kQHF8L7i8M/N6QcHbMg8r3gbXHbL6C+WJ4fgsLiOSeUq6GPRU0mxuX8J 6oGo6OdC9WveAt6YOKZY72yQESYNTyyunqD7sQIqb2Jp1SGpvDf6+G/PBGFgJc4H121J A5SA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:subject:message-id:date:cc:to :from:mime-version:content-transfer-encoding:content-disposition :arc-authentication-results; bh=bOCkILUdvcFgx/jYkAecPaZTfvaZJISyMlM9EJ4iwFw=; b=sCJMH19zyyLPaQ9GW3Of16mFJ4edWZ3nTGUIOZiGhGVLttTNae+yVfV9UvWlRqxgJ6 i/xpwhw9F+/xJ3Jvb6lspf2rpv5LSfrAVl3+fEGJzaDNoue8AyMuqntykyEdDccghqib BHQLaOsLhFttTUNDTV0zSpo1Ne8CIDC//7I1he032r5vkIGJJSOAHUC0ZDBNBjc9bCM7 SlAe3PWhBWWfPmYEOAbntkJG0Ihr3wJUOnTi8QnnrT4cKSIrdh8SY970RMojS1vnqRn+ 4/YaRBIXVDCa8SIhs3Bey4Bxd9xv9/oQHLK98CX8Ipr7HK1kd8lvgP8J2IkdVzMGsokH /P7A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u75-v6si53460110pfd.328.2018.06.07.11.49.01; Thu, 07 Jun 2018 11:49:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935860AbeFGPMT (ORCPT + 99 others); Thu, 7 Jun 2018 11:12:19 -0400 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126]:41462 "EHLO shadbolt.e.decadent.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S964965AbeFGPCw (ORCPT ); Thu, 7 Jun 2018 11:02:52 -0400 Received: from [148.252.241.226] (helo=deadeye) by shadbolt.decadent.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.84_2) (envelope-from ) id 1fQvbb-0005hL-KX; Thu, 07 Jun 2018 15:09:35 +0100 Received: from ben by deadeye with local (Exim 4.91) (envelope-from ) id 1fQvb8-00034u-Aq; Thu, 07 Jun 2018 15:09:06 +0100 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit MIME-Version: 1.0 From: Ben Hutchings To: linux-kernel@vger.kernel.org, stable@vger.kernel.org CC: akpm@linux-foundation.org, "Alexey Kodanev" , "David S. Miller" Date: Thu, 07 Jun 2018 15:05:21 +0100 Message-ID: X-Mailer: LinuxStableQueue (scripts by bwh) Subject: [PATCH 3.16 253/410] udplite: fix partial checksum initialization In-Reply-To: X-SA-Exim-Connect-IP: 148.252.241.226 X-SA-Exim-Mail-From: ben@decadent.org.uk X-SA-Exim-Scanned: No (on shadbolt.decadent.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.16.57-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: Alexey Kodanev commit 15f35d49c93f4fa9875235e7bf3e3783d2dd7a1b upstream. Since UDP-Lite is always using checksum, the following path is triggered when calculating pseudo header for it: udp4_csum_init() or udp6_csum_init() skb_checksum_init_zero_check() __skb_checksum_validate_complete() The problem can appear if skb->len is less than CHECKSUM_BREAK. In this particular case __skb_checksum_validate_complete() also invokes __skb_checksum_complete(skb). If UDP-Lite is using partial checksum that covers only part of a packet, the function will return bad checksum and the packet will be dropped. It can be fixed if we skip skb_checksum_init_zero_check() and only set the required pseudo header checksum for UDP-Lite with partial checksum before udp4_csum_init()/udp6_csum_init() functions return. Fixes: ed70fcfcee95 ("net: Call skb_checksum_init in IPv4") Fixes: e4f45b7f40bd ("net: Call skb_checksum_init in IPv6") Signed-off-by: Alexey Kodanev Signed-off-by: David S. Miller Signed-off-by: Ben Hutchings --- include/net/udplite.h | 1 + net/ipv4/udp.c | 5 +++++ net/ipv6/ip6_checksum.c | 5 +++++ 3 files changed, 11 insertions(+) --- a/include/net/udplite.h +++ b/include/net/udplite.h @@ -61,6 +61,7 @@ static inline int udplite_checksum_init( UDP_SKB_CB(skb)->cscov = cscov; if (skb->ip_summed == CHECKSUM_COMPLETE) skb->ip_summed = CHECKSUM_NONE; + skb->csum_valid = 0; } return 0; --- a/net/ipv4/udp.c +++ b/net/ipv4/udp.c @@ -1729,6 +1729,11 @@ static inline int udp4_csum_init(struct err = udplite_checksum_init(skb, uh); if (err) return err; + + if (UDP_SKB_CB(skb)->partial_cov) { + skb->csum = inet_compute_pseudo(skb, proto); + return 0; + } } return skb_checksum_init_zero_check(skb, proto, uh->check, --- a/net/ipv6/ip6_checksum.c +++ b/net/ipv6/ip6_checksum.c @@ -73,6 +73,11 @@ int udp6_csum_init(struct sk_buff *skb, err = udplite_checksum_init(skb, uh); if (err) return err; + + if (UDP_SKB_CB(skb)->partial_cov) { + skb->csum = ip6_compute_pseudo(skb, proto); + return 0; + } } /* To support RFC 6936 (allow zero checksum in UDP/IPV6 for tunnels)