Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp502766yba; Mon, 1 Apr 2019 10:35:24 -0700 (PDT) X-Google-Smtp-Source: APXvYqxdpI9wOhgrICN9ACMk6Qq6OHmJ7XciTWCxL0++SBrgN1MugExraJNmzlIW2kyHTczrEbtV X-Received: by 2002:a62:5206:: with SMTP id g6mr47660009pfb.227.1554140124319; Mon, 01 Apr 2019 10:35:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1554140124; cv=none; d=google.com; s=arc-20160816; b=ADAMZSLDH9CjRV9mgqUERbHXo41lKum64g8aM8zDPEJH8WbHmQGzdABzyVCh39nzEL 4XdVK13yebdn9/PNDG3RRXn3ydqKH18BAqNDRQOUW7Vr8CHZnrY0ODTM+DLTEhoeMLHs UbHUgFRjaFfaOrJS2/J3vzfKMxu0gSP27I2MoqOnmH18HoTKnkv7UBaTrldYn7xZPwqk eyFgoV0v4O3+nxhoSgrm2ZcBhT35b2mUJTMkqpi+tP3DHDSlSqxW/yTIkmS3YCPaKmXg 9kNeoVKa2W/FnRxF97alD7N5vHE1Y3SE3k8pUttaGdTBQ1EtbQKbhrdurLOvo4yjgWj3 NXvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=mO79HmCD80EIJjGzIAu48aEEnul1K/RZssEQOTpWwa0=; b=uz6KVHUCgNOuXJixI2DozDAGHgEO8QxcQVcNCphr0WtbkGa2sHGgIj4rlp3Hqf2HCE AjOnLJ9bqQVzmyc378nSmg3L6KRupCsT7aCts6VchDfHdArqBMye0FcFgotKzGvGvo4n j/msiGXj3RaoE22Bw4Go+IcSVs/HotfNblkGKF5REC1CT8cQBb/ghmd2fCO0UTXHTuTe suW0I7fxgLNsqIcS48BIf4evRN92Nf9v4rgFfhKvh5oS6iedNybb3WoLD0XJgowrEZMt OnQWakfaKAIcJI7rJp4hBZ3u8E6jOGYAEfCXIRKDLw/H4vdziRSCeoZA3uuum5QDuMYo lneg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fI7ii+a5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m2si8892831pgp.463.2019.04.01.10.35.08; Mon, 01 Apr 2019 10:35:24 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=fI7ii+a5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387801AbfDARed (ORCPT + 99 others); Mon, 1 Apr 2019 13:34:33 -0400 Received: from mail.kernel.org ([198.145.29.99]:44412 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387794AbfDAReb (ORCPT ); Mon, 1 Apr 2019 13:34:31 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id EF3BF20830; Mon, 1 Apr 2019 17:34:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1554140070; bh=etgDwfiNsYhYDIgxsI6f9aYMQCSCRpytxD73aRkPlCU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=fI7ii+a52sNazMennSVGihhtXW1GHiL99ALyoH2806JdvXPocPl9ZaKU87kXji4zb kbjc0fjgkOwKhqMBUENvftCQBl6br3RA0wE+fSqL3qAlHkYg87ACXrsR8nCL30NY+w WZyQ4vz5DAIzoK+6t/Mqn6/76mzTVGwkE+3qt3Dc= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Li Shuang , Xin Long , "David S. Miller" Subject: [PATCH 4.4 098/131] sctp: get sctphdr by offset in sctp_compute_cksum Date: Mon, 1 Apr 2019 19:02:48 +0200 Message-Id: <20190401170100.124171553@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190401170051.645954551@linuxfoundation.org> References: <20190401170051.645954551@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Xin Long [ Upstream commit 273160ffc6b993c7c91627f5a84799c66dfe4dee ] sctp_hdr(skb) only works when skb->transport_header is set properly. But in Netfilter, skb->transport_header for ipv6 is not guaranteed to be right value for sctphdr. It would cause to fail to check the checksum for sctp packets. So fix it by using offset, which is always right in all places. v1->v2: - Fix the changelog. Fixes: e6d8b64b34aa ("net: sctp: fix and consolidate SCTP checksumming code") Reported-by: Li Shuang Signed-off-by: Xin Long Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- include/net/sctp/checksum.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/include/net/sctp/checksum.h +++ b/include/net/sctp/checksum.h @@ -60,7 +60,7 @@ static inline __wsum sctp_csum_combine(_ static inline __le32 sctp_compute_cksum(const struct sk_buff *skb, unsigned int offset) { - struct sctphdr *sh = sctp_hdr(skb); + struct sctphdr *sh = (struct sctphdr *)(skb->data + offset); __le32 ret, old = sh->checksum; const struct skb_checksum_ops ops = { .update = sctp_csum_update,