Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp1782095imm; Thu, 27 Sep 2018 02:22:58 -0700 (PDT) X-Google-Smtp-Source: ACcGV602BQ608SVAEsacaRA/DBOf6pRUkvSsFvhNPWVqm156lwjjnuwgXYLmVV5OlAeM9w6yPyXe X-Received: by 2002:a63:4f20:: with SMTP id d32-v6mr56873pgb.231.1538040178195; Thu, 27 Sep 2018 02:22:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1538040178; cv=none; d=google.com; s=arc-20160816; b=LMvGTfD9jFcClYKcLG7/ZiCS6Vlah0eJiE1SQO1Ryr2jYh+okyc9DOLKlDByHU1KqG I9VLlRqMeF5PIF/2ou6ih5Nw759PYsp3S4tc1NKWtMRwbsM9jQRtv2MWyx95hZZfUd5E GV5dmpQd9cSmx1XuLT8W9phd01S5BAFAL/mtWu/YUK5+x4ZTvpeY8dfx9rBWP1CkoY00 5RacZLBmJKtH8+bXf34kUzwAi1IquvDXZ3RpEI07Ee5CSwYU0SfWZlj8SgJmPODjbOta ZFJUQB332lJtTi0DgBo56eKR8D62+hDcLkGKkrfk9TWxSK42PUnAh8J/Dx5GvHSUVFqZ ZuOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from; bh=ph+V2x5AYwZsAJDha/ROQKqmBBojimZZOIFgNPtcI9s=; b=oAmY7Q7z+3OeLo7DrP7pvUxszYfEsdy5XVqs5wTFebgUNhsvr9lhjRRoK+y3meemld JdnnrUHl97UXj/4oFime4/yYIKhYHpTj0pyjunuNb0Z3WH53nGvJ2rJpdWdE4e/LZQCT dH/ahqEQ5IBjmj5FO8LL2Wzi861Zclrn9Zs1fGijkdhEYOzFVGtpoPWmStfL7ZEHsSo6 4ONQ8Ry1QzU4WXokib0gqOqGS7KY4Ihn5i5TI6xfV+5RpNC6o9aN/Pb8d1qDf/FUSjgj 5zpkUZWUWbmq4y5Fwb1U9o5C6hRxm6ZdrCgJ4elGk2wz2NzXT3XdDicPYeD4eTSnfJxJ 7KVA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b12-v6si887645pgw.668.2018.09.27.02.22.43; Thu, 27 Sep 2018 02:22:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728228AbeI0Pjy (ORCPT + 99 others); Thu, 27 Sep 2018 11:39:54 -0400 Received: from mail.linuxfoundation.org ([140.211.169.12]:56502 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727057AbeI0Pjy (ORCPT ); Thu, 27 Sep 2018 11:39:54 -0400 Received: from localhost (ip-213-127-77-73.ip.prioritytelecom.net [213.127.77.73]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id 67A981113; Thu, 27 Sep 2018 09:22:34 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Juergen Gross , "David S. Miller" Subject: [PATCH 4.14 29/64] xen/netfront: dont bug in case of too many frags Date: Thu, 27 Sep 2018 11:03:46 +0200 Message-Id: <20180927090254.267128774@linuxfoundation.org> X-Mailer: git-send-email 2.19.0 In-Reply-To: <20180927090249.801943776@linuxfoundation.org> References: <20180927090249.801943776@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Juergen Gross commit ad4f15dc2c70b1de5e0a64d27335962fbc9cf71c upstream. Commit 57f230ab04d291 ("xen/netfront: raise max number of slots in xennet_get_responses()") raised the max number of allowed slots by one. This seems to be problematic in some configurations with netback using a larger MAX_SKB_FRAGS value (e.g. old Linux kernel with MAX_SKB_FRAGS defined as 18 instead of nowadays 17). Instead of BUG_ON() in this case just fall back to retransmission. Fixes: 57f230ab04d291 ("xen/netfront: raise max number of slots in xennet_get_responses()") Cc: stable@vger.kernel.org Signed-off-by: Juergen Gross Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- drivers/net/xen-netfront.c | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) --- a/drivers/net/xen-netfront.c +++ b/drivers/net/xen-netfront.c @@ -907,7 +907,11 @@ static RING_IDX xennet_fill_frags(struct BUG_ON(pull_to <= skb_headlen(skb)); __pskb_pull_tail(skb, pull_to - skb_headlen(skb)); } - BUG_ON(skb_shinfo(skb)->nr_frags >= MAX_SKB_FRAGS); + if (unlikely(skb_shinfo(skb)->nr_frags >= MAX_SKB_FRAGS)) { + queue->rx.rsp_cons = ++cons; + kfree_skb(nskb); + return ~0U; + } skb_add_rx_frag(skb, skb_shinfo(skb)->nr_frags, skb_frag_page(nfrag), @@ -1044,6 +1048,8 @@ err: skb->len += rx->status; i = xennet_fill_frags(queue, skb, &tmpq); + if (unlikely(i == ~0U)) + goto err; if (rx->flags & XEN_NETRXF_csum_blank) skb->ip_summed = CHECKSUM_PARTIAL;