Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp7370882yba; Thu, 2 May 2019 08:44:41 -0700 (PDT) X-Google-Smtp-Source: APXvYqwOfGO0FgjofvzwesaI7V8mGitKMNXHE3X4mCVCwTmN83nHPplJ90o/+78TKPHgprTqu/MQ X-Received: by 2002:a17:902:7084:: with SMTP id z4mr4613720plk.305.1556811881401; Thu, 02 May 2019 08:44:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556811881; cv=none; d=google.com; s=arc-20160816; b=rgY0NV/XAtWDTgYTdk08Rt8mCMIr2Fit6GWvaKD8/hy4M4potWuvN0I3JlrQTPtAJs quoiMIoUky8YZ5/YorVvWQ3FF749/on/ivhc7Og2F1M/uz6Flyaim67K+jDQlEzYL5Ly 4JtaYjkJmdxBl4RE4CPF9cUsuJVUMOoeo3OITSyYUpjDDv/IbtRc0r6wnkmy2CUzuAAL u9dKhpZlgzzlMKf3vWgio4hIm2nt1QbigviN41sZAWuOhwyTkFAdgCP3sSIWWF8t7bi/ e5U66KbUbRDV64satQTq32iVpsvxtcrCwA2C1AWMK4FPC2U4ycFBgK8F9WBkbF+IdzEe 2JuQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=p91ZFejDg6tf34jGSW4iYcGfgiejJuczXzPbtQYbmic=; b=t7xQ78LQyhXDv+44Cw7mW/ouBNov97j12IN45B9EF7E/wnj5gZvERRipf821tonOqC bzvey329nShCA2ForKFyY5NVRgk6yrroEGmQS4s7iuRkEJiB2JTk6IW5bXerm3E4TDaq Nf+vLA88MnnpZX7xYTrxM9I0H9yaKUoT95KOM25en00zImSkG1ieymlBlnFpUgcnrfEq ec1KnEqtsJOMgfykSY2DbjHo2PlMpr2hiuJejvXWElEGjRuJ6CQsj7/pPMYM1Mpg+hRw RsV36Bcx1GWbSQm5wmIqp3pW4zj2LQbkk6NC8q7ifz7Ch9sRCoDoijmeGmLnp/8kBU/v 8QLA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=S7AdOSyc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 3si16495237pgy.200.2019.05.02.08.44.25; Thu, 02 May 2019 08:44:41 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=S7AdOSyc; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728004AbfEBP1e (ORCPT + 99 others); Thu, 2 May 2019 11:27:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:44408 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727996AbfEBP1c (ORCPT ); Thu, 2 May 2019 11:27:32 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8EC8E214DA; Thu, 2 May 2019 15:27:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1556810852; bh=d3m7PQSSBTdvSaJ14Zwtv2BlPgAGJByr5swq2PYGtRU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=S7AdOSyc1BKBd7u4jE7IgsLnGefu12Dq7kFhMtwHLkzFgvyzs8sNKSQnHDq/kH4Cj 59L700mxXHffMqgf43rqmRPRRXyDXMphK0oRXGT31F/6K7id1w/nqRAtCLFxNP3yyk OvnaGl485ULDyfKsG/v8F1bdff0DsX08Of+bp6PA= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Li Shuang , Pablo Neira Ayuso , Xin Long , Neil Horman , Florian Westphal , "Sasha Levin (Microsoft)" Subject: [PATCH 4.19 17/72] netfilter: bridge: set skb transport_header before entering NF_INET_PRE_ROUTING Date: Thu, 2 May 2019 17:20:39 +0200 Message-Id: <20190502143334.689747978@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190502143333.437607839@linuxfoundation.org> References: <20190502143333.437607839@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit e166e4fdaced850bee3d5ee12a5740258fb30587 ] Since Commit 21d1196a35f5 ("ipv4: set transport header earlier"), skb->transport_header has been always set before entering INET netfilter. This patch is to set skb->transport_header for bridge before entering INET netfilter by bridge-nf-call-iptables. It also fixes an issue that sctp_error() couldn't compute a right csum due to unset skb->transport_header. Fixes: e6d8b64b34aa ("net: sctp: fix and consolidate SCTP checksumming code") Reported-by: Li Shuang Suggested-by: Pablo Neira Ayuso Signed-off-by: Xin Long Acked-by: Neil Horman Acked-by: Florian Westphal Signed-off-by: Pablo Neira Ayuso Signed-off-by: Sasha Levin (Microsoft) --- net/bridge/br_netfilter_hooks.c | 1 + net/bridge/br_netfilter_ipv6.c | 2 ++ 2 files changed, 3 insertions(+) diff --git a/net/bridge/br_netfilter_hooks.c b/net/bridge/br_netfilter_hooks.c index 3b0a03b92080..212c184c1eee 100644 --- a/net/bridge/br_netfilter_hooks.c +++ b/net/bridge/br_netfilter_hooks.c @@ -515,6 +515,7 @@ static unsigned int br_nf_pre_routing(void *priv, nf_bridge->ipv4_daddr = ip_hdr(skb)->daddr; skb->protocol = htons(ETH_P_IP); + skb->transport_header = skb->network_header + ip_hdr(skb)->ihl * 4; NF_HOOK(NFPROTO_IPV4, NF_INET_PRE_ROUTING, state->net, state->sk, skb, skb->dev, NULL, diff --git a/net/bridge/br_netfilter_ipv6.c b/net/bridge/br_netfilter_ipv6.c index 5811208863b7..09d5e0c7b3ba 100644 --- a/net/bridge/br_netfilter_ipv6.c +++ b/net/bridge/br_netfilter_ipv6.c @@ -235,6 +235,8 @@ unsigned int br_nf_pre_routing_ipv6(void *priv, nf_bridge->ipv6_daddr = ipv6_hdr(skb)->daddr; skb->protocol = htons(ETH_P_IPV6); + skb->transport_header = skb->network_header + sizeof(struct ipv6hdr); + NF_HOOK(NFPROTO_IPV6, NF_INET_PRE_ROUTING, state->net, state->sk, skb, skb->dev, NULL, br_nf_pre_routing_finish_ipv6); -- 2.19.1