Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp776578ybl; Wed, 11 Dec 2019 07:21:35 -0800 (PST) X-Google-Smtp-Source: APXvYqw6kREt4JG0V1hBtfX8VHewxXPLH2RqS2wY7HJ6laoeQscN4UG+RBXf9zCZhLBv8735c1AW X-Received: by 2002:aca:72cd:: with SMTP id p196mr2999141oic.99.1576077695151; Wed, 11 Dec 2019 07:21:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576077695; cv=none; d=google.com; s=arc-20160816; b=tf4nS6lhFHCKkgcpiifYRGs6azTYSUjxixEreV/1GzUlIJ6QO0DzkbNqtlx0NKK3I/ NK1Ofx+qygiXQQo/g0/rPcUJBuFhYml8qk/euTvWySQJ6Oj8F6xjJypc02DNcnoA1BBZ X9LmJtFB8R8jplFJT/mKnj/kKAi7B71vJcJr7KWcquZiSgT4QvHCkJfY/und709FOoG+ DgKnOoXUTDdgpxbhpujV424CMB+TtlTrQ9TXWtF60dSws3YxUVIRuAGu3yBGzPsWmnWH Y/p6XKECUyCneuleUufip3Z5MNEuuiD3l1FZy0kcxhzjDm/MzBaNcCc4ADijst6SnuVo lbNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=gxvCHcT5pcUsCKYOWwxEpkiOBezfjBgb+WsKBV5YwOU=; b=QBFHVgF5pDbNarsCAIq+KfUW8Kyd+UJOZCy3hzaJp95W9G3TR4YHpKWNykI2ZDt6zC ZDirIW2SmivDPqACPvJ8h8XiRe8mCF7C7TTk4JZvO0JU39wUQ0lbZLuq+I8Q1mvorEdy KAP2A2C94zKZZt4B2aYZtfFH3JdTjlPi1A/oLXsWyxN0SwLngmmrlH1ZdSccVNCrKpRA OblX3cALJK9TlW/4OvcTLb56tMw2e1ltbsLUHZYAsnsW5oVaavcAUdMBRtHmgCQblTYo vjZkLWahuc8oxU3XhFfnqfgUYaynBahpGPnh3oXUTwgBbX6SW2Rt/5bRy7ZWr8jF7oCc tfsA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ntG4J+v0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e23si1323470otr.145.2019.12.11.07.21.22; Wed, 11 Dec 2019 07:21:35 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ntG4J+v0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732376AbfLKPUx (ORCPT + 99 others); Wed, 11 Dec 2019 10:20:53 -0500 Received: from mail.kernel.org ([198.145.29.99]:50500 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732383AbfLKPUu (ORCPT ); Wed, 11 Dec 2019 10:20:50 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 5E35B22B48; Wed, 11 Dec 2019 15:20:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1576077649; bh=PeYVoadsImi2LxPr0Kktv0Z4St0GaLqXgrkc7XGOcIg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ntG4J+v077pu4H7WnKYGw5XV6h+3eot8MA9h5il9t8pJirD9P3gYz0rn3jTbnc7Cz yZHOA1l6AqXZg5nQ2uhcTNmexlNnt3gKRAIhs10KCyW2Hltue2aj0IqTwODkM+2YBB LqD823ksRLF59qTuzTJv1EcaNCRs5Uk+XBhwXcg4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Xin Long , Marcelo Ricardo Leitner , "David S. Miller" , Sasha Levin Subject: [PATCH 4.19 119/243] sctp: increase sk_wmem_alloc when head->truesize is increased Date: Wed, 11 Dec 2019 16:04:41 +0100 Message-Id: <20191211150347.164875650@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20191211150339.185439726@linuxfoundation.org> References: <20191211150339.185439726@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Xin Long [ Upstream commit 0d32f17717e65e76cbdb248374dd162acdfe2fff ] I changed to count sk_wmem_alloc by skb truesize instead of 1 to fix the sk_wmem_alloc leak caused by later truesize's change in xfrm in Commit 02968ccf0125 ("sctp: count sk_wmem_alloc by skb truesize in sctp_packet_transmit"). But I should have also increased sk_wmem_alloc when head->truesize is increased in sctp_packet_gso_append() as xfrm does. Otherwise, sctp gso packet will cause sk_wmem_alloc underflow. Fixes: 02968ccf0125 ("sctp: count sk_wmem_alloc by skb truesize in sctp_packet_transmit") Signed-off-by: Xin Long Acked-by: Marcelo Ricardo Leitner Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/sctp/output.c | 1 + 1 file changed, 1 insertion(+) diff --git a/net/sctp/output.c b/net/sctp/output.c index b0e74a3e77ec5..025f48e14a91f 100644 --- a/net/sctp/output.c +++ b/net/sctp/output.c @@ -410,6 +410,7 @@ static void sctp_packet_gso_append(struct sk_buff *head, struct sk_buff *skb) head->truesize += skb->truesize; head->data_len += skb->len; head->len += skb->len; + refcount_add(skb->truesize, &head->sk->sk_wmem_alloc); __skb_header_release(skb); } -- 2.20.1