Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp492505yba; Mon, 1 Apr 2019 10:22:58 -0700 (PDT) X-Google-Smtp-Source: APXvYqzqvw3zdyCxrOgc0SuFQA9P6w2lZNlru97iGnV3CtGCpQZusAXjCdMUmFDk0w3J2HLSi1vV X-Received: by 2002:a65:5c4b:: with SMTP id v11mr60843721pgr.411.1554139378861; Mon, 01 Apr 2019 10:22:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554139378; cv=none; d=google.com; s=arc-20160816; b=vWNfOJKaA4K+MKH7ATbLnE/4Kg9zurZIUPOV8vAnFFO/b9BOUknLdvqEWPYMbV5CVK uO4rTOkEDUzyutGTwlP2YmNYKY9sDs8K7R1HX3eYoBSPIqPvdAUB65qSdiKNOI+GfN/Z xvL6dAfeuaVA5EdFe8t0RQkHlzn7RUkKdU2efCqqWZH6m64OFhU1/MZSXUjhISP5hpUV AGwfMVzqcMPnpm74PY04A0Sate+38QJfDtZaPY8B50PTxeSdHCyFT+OTUOqHzJadJADy n+ZV0fxr5s+HUKj1UNrjW4pzvFwMI2+zsMJNWBJI9aVzTXU83JvpTnKJausIXwIKchcQ CG6Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=q125+DHsq7KcaixAZIXLH4aSt4B3KsHeMusDO8/A/f4=; b=wjkeS5x6VagEkC7SeVc67Tu13+eISNaJkw6my+BOhMIL3bGfMGIDlACrVIlfurUqLy GqfEKFga4sXRRWJEmtI8qn7t7Dq6umZ0HT1QbbjzHvhW5696DamEaQ4RezAmJr/8lR9S Pt9St8LHkH1Wp/9syhOfOPpzZwBvO+b/guZiLY6DfDxaZOwzVL0LO69rSfZaNUcSeuA2 v9wnSPxofPlemMWEav7nqq+sXaERAWu1RhIbHISrxLKlZog/aWk4fs+LJOkRkFgaM3Oa 3qcTju2NjSvmbnN/IDkV+Vbd5KWOxrJSk+H3Q9qiAAobx/su/3PzFlAilMwfveUIWl8d SesA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="atVoy/2s"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w126si542726pfw.53.2019.04.01.10.22.43; Mon, 01 Apr 2019 10:22:58 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="atVoy/2s"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731704AbfDARUp (ORCPT + 99 others); Mon, 1 Apr 2019 13:20:45 -0400 Received: from mail.kernel.org ([198.145.29.99]:48994 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731695AbfDARUl (ORCPT ); Mon, 1 Apr 2019 13:20:41 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7B6C121473; Mon, 1 Apr 2019 17:20:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554139241; bh=TeZUaZBXZG+0YdcaTmEjmQCzup7M9tuNSTIjWLXIaP8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=atVoy/2snG/jWb+llPTJk4nMNHwr0an8OoGmJC9mCb1gHM37YnQlQv3UqoTz3QQpy d68AzXGVZ7OrwcTBing3C6m4U8z5vrui5l94S0AyupVx5zu9GxP22kObsaBUiZYgIV KLeMmlzmD7MMnnBi+Hk7UD7Oxun9zDRbNQvSZ3qA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Li Shuang , Xin Long , "David S. Miller" Subject: [PATCH 4.14 019/107] sctp: get sctphdr by offset in sctp_compute_cksum Date: Mon, 1 Apr 2019 19:01:34 +0200 Message-Id: <20190401170047.295858155@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190401170045.246405031@linuxfoundation.org> References: <20190401170045.246405031@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Xin Long [ Upstream commit 273160ffc6b993c7c91627f5a84799c66dfe4dee ] sctp_hdr(skb) only works when skb->transport_header is set properly. But in Netfilter, skb->transport_header for ipv6 is not guaranteed to be right value for sctphdr. It would cause to fail to check the checksum for sctp packets. So fix it by using offset, which is always right in all places. v1->v2: - Fix the changelog. Fixes: e6d8b64b34aa ("net: sctp: fix and consolidate SCTP checksumming code") Reported-by: Li Shuang Signed-off-by: Xin Long Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- include/net/sctp/checksum.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/include/net/sctp/checksum.h +++ b/include/net/sctp/checksum.h @@ -60,7 +60,7 @@ static inline __wsum sctp_csum_combine(_ static inline __le32 sctp_compute_cksum(const struct sk_buff *skb, unsigned int offset) { - struct sctphdr *sh = sctp_hdr(skb); + struct sctphdr *sh = (struct sctphdr *)(skb->data + offset); __le32 ret, old = sh->checksum; const struct skb_checksum_ops ops = { .update = sctp_csum_update,