Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp1678643pxu; Sun, 6 Dec 2020 03:47:52 -0800 (PST) X-Google-Smtp-Source: ABdhPJxS4D7o2DZoGqE4kQBO3C+F7MHCKmwRtjFtCdH8gktWEXOqgYVY4j87kjYMTLutzpr4BpIC X-Received: by 2002:a17:906:48c1:: with SMTP id d1mr14725524ejt.123.1607255271951; Sun, 06 Dec 2020 03:47:51 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1607255271; cv=none; d=google.com; s=arc-20160816; b=NGjftu6yFO2FtqXJCzjbBWGFFol/C8VD+3Tu1TylD/MBA2IuXGA/506NMp87pansCf JM29w+swXnZ6qw6N72RD/9/stU8e7gvtRhuXU7Zcff+k+CJzy1O2b1By1dKLf7v0JVFK tA69GlmUG3ZIPsOGLqg2nylDqad4K3C+cf0CMYB3WX36G9ntnDcIA/+Ky6TegHPR4r83 a1XMsWHAoJCQjjdIVMUDfYtQMZ0De5rnFJvKCxz3X1eHipjvQv+ZSJhdImdTxnTsM8UU jaEBM6fqXO5/c14QhLdnW7Hv9X2c0CdkSI/bmkgbbZz0y8B46XMbd6BSy5fujIQih76d OQ2g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from; bh=sjQ1vZikQ6VTxCnXlm58+rUr2guYs2O2dDVa9+watX4=; b=afL0ZWPwLDY2a1n6O4EeNg6vHVsqagTbz2/tJ9/OoZRuu9Z/DxoDXgC+U7Q5cse6Vk xUgO9bdz1dsZFsabFbBk1vidkBYaWXPFXQU3AgaAOGBE66piuxZcKzRiCY45GT/+Jqlg yCwLuFPxi+A2qDKdPx0dXlcSjAby2slDoO37AhOXyj6gFboSfhBl7yUVHdqLoi6Y5YIN Agq1eD49e0vbg/G7WJeuiob4/qStlUUeVMRBq/7W22BRJ/aYl6jPLw3jHKIJ6yqorqR9 f+XUWt2WsPEHNp1E3nZ0vjWfB6UgnGM4hU/9PHJykUHz8GYaXlnMteHTSLKLbfXunZvy Zc9g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a23si6624882edn.292.2020.12.06.03.47.29; Sun, 06 Dec 2020 03:47:51 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729595AbgLFLpv (ORCPT + 99 others); Sun, 6 Dec 2020 06:45:51 -0500 Received: from mail.kernel.org ([198.145.29.99]:46206 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727936AbgLFLpt (ORCPT ); Sun, 6 Dec 2020 06:45:49 -0500 From: Greg Kroah-Hartman Authentication-Results: mail.kernel.org; dkim=permerror (bad message/signature format) To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Eyal Birger , "Jason A. Donenfeld" , Willem de Bruijn , Jakub Kicinski Subject: [PATCH 5.9 15/46] net/packet: fix packet receive on L3 devices without visible hard header Date: Sun, 6 Dec 2020 12:17:23 +0100 Message-Id: <20201206111557.197220214@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201206111556.455533723@linuxfoundation.org> References: <20201206111556.455533723@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eyal Birger [ Upstream commit d549699048b4b5c22dd710455bcdb76966e55aa3 ] In the patchset merged by commit b9fcf0a0d826 ("Merge branch 'support-AF_PACKET-for-layer-3-devices'") L3 devices which did not have header_ops were given one for the purpose of protocol parsing on af_packet transmit path. That change made af_packet receive path regard these devices as having a visible L3 header and therefore aligned incoming skb->data to point to the skb's mac_header. Some devices, such as ipip, xfrmi, and others, do not reset their mac_header prior to ingress and therefore their incoming packets became malformed. Ideally these devices would reset their mac headers, or af_packet would be able to rely on dev->hard_header_len being 0 for such cases, but it seems this is not the case. Fix by changing af_packet RX ll visibility criteria to include the existence of a '.create()' header operation, which is used when creating a device hard header - via dev_hard_header() - by upper layers, and does not exist in these L3 devices. As this predicate may be useful in other situations, add it as a common dev_has_header() helper in netdevice.h. Fixes: b9fcf0a0d826 ("Merge branch 'support-AF_PACKET-for-layer-3-devices'") Signed-off-by: Eyal Birger Acked-by: Jason A. Donenfeld Acked-by: Willem de Bruijn Link: https://lore.kernel.org/r/20201121062817.3178900-1-eyal.birger@gmail.com Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- include/linux/netdevice.h | 5 +++++ net/packet/af_packet.c | 38 +++++++++++++++++++++----------------- 2 files changed, 26 insertions(+), 17 deletions(-) --- a/include/linux/netdevice.h +++ b/include/linux/netdevice.h @@ -3103,6 +3103,11 @@ static inline bool dev_validate_header(c return false; } +static inline bool dev_has_header(const struct net_device *dev) +{ + return dev->header_ops && dev->header_ops->create; +} + typedef int gifconf_func_t(struct net_device * dev, char __user * bufptr, int len, int size); int register_gifconf(unsigned int family, gifconf_func_t *gifconf); --- a/net/packet/af_packet.c +++ b/net/packet/af_packet.c @@ -93,38 +93,42 @@ /* Assumptions: - - if device has no dev->hard_header routine, it adds and removes ll header - inside itself. In this case ll header is invisible outside of device, - but higher levels still should reserve dev->hard_header_len. - Some devices are enough clever to reallocate skb, when header - will not fit to reserved space (tunnel), another ones are silly - (PPP). + - If the device has no dev->header_ops->create, there is no LL header + visible above the device. In this case, its hard_header_len should be 0. + The device may prepend its own header internally. In this case, its + needed_headroom should be set to the space needed for it to add its + internal header. + For example, a WiFi driver pretending to be an Ethernet driver should + set its hard_header_len to be the Ethernet header length, and set its + needed_headroom to be (the real WiFi header length - the fake Ethernet + header length). - packet socket receives packets with pulled ll header, so that SOCK_RAW should push it back. On receive: ----------- -Incoming, dev->hard_header!=NULL +Incoming, dev_has_header(dev) == true mac_header -> ll header data -> data -Outgoing, dev->hard_header!=NULL +Outgoing, dev_has_header(dev) == true mac_header -> ll header data -> ll header -Incoming, dev->hard_header==NULL - mac_header -> UNKNOWN position. It is very likely, that it points to ll - header. PPP makes it, that is wrong, because introduce - assymetry between rx and tx paths. +Incoming, dev_has_header(dev) == false + mac_header -> data + However drivers often make it point to the ll header. + This is incorrect because the ll header should be invisible to us. data -> data -Outgoing, dev->hard_header==NULL - mac_header -> data. ll header is still not built! +Outgoing, dev_has_header(dev) == false + mac_header -> data. ll header is invisible to us. data -> data Resume - If dev->hard_header==NULL we are unlikely to restore sensible ll header. + If dev_has_header(dev) == false we are unable to restore the ll header, + because it is invisible to us. On transmit: @@ -2066,7 +2070,7 @@ static int packet_rcv(struct sk_buff *sk skb->dev = dev; - if (dev->header_ops) { + if (dev_has_header(dev)) { /* The device has an explicit notion of ll header, * exported to higher levels. * @@ -2195,7 +2199,7 @@ static int tpacket_rcv(struct sk_buff *s if (!net_eq(dev_net(dev), sock_net(sk))) goto drop; - if (dev->header_ops) { + if (dev_has_header(dev)) { if (sk->sk_type != SOCK_DGRAM) skb_push(skb, skb->data - skb_mac_header(skb)); else if (skb->pkt_type == PACKET_OUTGOING) {