Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp495965yba; Mon, 1 Apr 2019 10:27:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqyMTZopPqsnvq2BzGnq74pudP2WbpvNJe6ALmKLY3gcmsw/SIud5TJHAVXy4ZBvCFYvhlz3 X-Received: by 2002:a17:902:3283:: with SMTP id z3mr64957582plb.236.1554139644118; Mon, 01 Apr 2019 10:27:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554139644; cv=none; d=google.com; s=arc-20160816; b=lUCZpggHmNPW5tI40j4b/WTnlSvFeB+yP6NITpICwTACOTCoENSoSjn237Eultj0jp viFxs7SXC8CvL3WB9OIqKv4MyFPZ84DaTSoAkiOffP7jtfPx1K0QRCGuvuANI3lWCu2x uf8oJFbc8tqnH7/DO6rKVh8DiKZpBnkykfFTfvgLFINBhJEbo9hSUbNBJb63CxOWoj4L ccG6BcKWJMuWIeCT2pVXxhKxGqVTN2mqBDqvNp+3aV4VLjKT/hQjgpro7i0EqkrppyK8 F0OwhOzZ/Vxpe9u7LZKtOxTz3wiAHk6RCJbSslH8V8CbpKtBCQy9pSFBUZ4rkRXjYcFD E6hw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=pJ+i7UlbTavnMDHcbPlrljAEU6fzd770WM+0Etb7YB8=; b=BSao+zcJ5EHf9HSGKXD8aqDfQ2kplXSlerRlkT3quz83zB3c+HY6DkFxZCvljvx/Mr NX1Y/unrHHeXsfCcWxGqj0ByXaYRW79PxJoHyLWc0T6oh37IDfE/muxkjXT/62E3zB6v voQD2lRBunfKZbHulioiydSUe8vms7UXKA97/ViJA/tuFMPISF4JfUVXcu8I2Gz1Tk82 CxizODYQ8U3gp9qCjzZYRgE5SWQNMEL6ONWOjd82gK6Bh26As0OFV/BBIWcyPRMsKFuZ eTY5pHm5zhf1iiLyXM9XwXNy75o0jv5swuk7d4wOlwXkYSIvVm93VMdRFpqzvbbnUN5P lemQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vKZffGkE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 38si9533365pln.90.2019.04.01.10.27.08; Mon, 01 Apr 2019 10:27:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=vKZffGkE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732564AbfDAR0c (ORCPT + 99 others); Mon, 1 Apr 2019 13:26:32 -0400 Received: from mail.kernel.org ([198.145.29.99]:58690 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732018AbfDAR0b (ORCPT ); Mon, 1 Apr 2019 13:26:31 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1FEA720830; Mon, 1 Apr 2019 17:26:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554139590; bh=2tS9aKPuceuRwJGKin9gwgB9t/sdvi0b8/7Z4+taiqI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=vKZffGkEV0ildZ5RuV6YmrCs2D3KmX/YsqU3QUFbbxudPQQPgnRuhEfMV1UPJqYMS IRXuAIB0V7X+LLd198z0C0Kp9m1dUBQ7kklRDej55wTPbtfMYXrsURlw/Me7gAV362 EH+gRAgY4WJMQYEMW9RuqoSL9t3n/rMneNL4dwo4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Li Shuang , Xin Long , "David S. Miller" Subject: [PATCH 4.9 13/56] sctp: get sctphdr by offset in sctp_compute_cksum Date: Mon, 1 Apr 2019 19:02:29 +0200 Message-Id: <20190401170104.645234540@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190401170103.398401360@linuxfoundation.org> References: <20190401170103.398401360@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Xin Long [ Upstream commit 273160ffc6b993c7c91627f5a84799c66dfe4dee ] sctp_hdr(skb) only works when skb->transport_header is set properly. But in Netfilter, skb->transport_header for ipv6 is not guaranteed to be right value for sctphdr. It would cause to fail to check the checksum for sctp packets. So fix it by using offset, which is always right in all places. v1->v2: - Fix the changelog. Fixes: e6d8b64b34aa ("net: sctp: fix and consolidate SCTP checksumming code") Reported-by: Li Shuang Signed-off-by: Xin Long Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- include/net/sctp/checksum.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/include/net/sctp/checksum.h +++ b/include/net/sctp/checksum.h @@ -60,7 +60,7 @@ static inline __wsum sctp_csum_combine(_ static inline __le32 sctp_compute_cksum(const struct sk_buff *skb, unsigned int offset) { - struct sctphdr *sh = sctp_hdr(skb); + struct sctphdr *sh = (struct sctphdr *)(skb->data + offset); __le32 ret, old = sh->checksum; const struct skb_checksum_ops ops = { .update = sctp_csum_update,