Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp1974208pxb; Fri, 5 Mar 2021 04:32:10 -0800 (PST) X-Google-Smtp-Source: ABdhPJysJzDhhLnzDIwNoyAnARIn43kJBbmU6UEs4YsJDC0Y9srDuOeQZK8iYB2qrrhySsG/gPtQ X-Received: by 2002:a17:906:565a:: with SMTP id v26mr2067649ejr.516.1614947530626; Fri, 05 Mar 2021 04:32:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614947530; cv=none; d=google.com; s=arc-20160816; b=krrtdA2nfPz71Ww3tnasF5q/W5WuVdYVi8sawh1Dw8qNhHIOQZkZ0zyUZfWqJkBd11 8+NEsGwfWlPu71tpyl2TPBDSZWJm4wqiMWpclrBm6lc/+X3rvpRPoPSxHDUsTL3F2ujV 7xQOpKNkfALqaWIaCmfDG0R0LGSNQr8MgncQkum0WthmUt8jsbwsHKWUnnD/5MjFTyLl 7uM7oRP8YKFWR6DDwCw5ghvkXZkTNPaBfBDp5Ov2P3M+SPv/i9WTEhRwpZXsCNqhQZ2x fCA881pJyrwhnTWoIhdd4dt7sQCkdAyqdQ9BvdU39pTjJGSJlclAsIT7M0uxlmlcre68 0+zQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=sdsAO3KFZnpC1x754qrASC1bcYWn1MmKFoYCrloEyIA=; b=drjioLTbj49VlESalJFtZBche+yyjUJPjoyHNqjjk4O8JNVZnoCkkXwREb/nqSQn7R T8nt1RuSIwAwKjUzj4acd+0t4gqfObaKmeO7uGOShg6PGZpdIDIiJj9lmBNBw2IL4PYz Io1ccVm5WswvRw3T8VU3TfHJqfwa/GW+znosoxXjigBM031OPZKxpEU1Cd8Z1S+MYCc9 AdtY58L/LdA3mjSKo5Fbx2x86LtcPtWuXT7xAKbr907AWvO8VjU1uAI435774Kbx9OvQ RNcZE0v8pXLSp6oMbWkcS79mzZJcJoxHCWtfsBnjou4rB9g4bq8LmSdMOvzB+5Xgm4u8 6T9w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Oy5yCZqX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n16si1139319ejr.507.2021.03.05.04.31.47; Fri, 05 Mar 2021 04:32:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Oy5yCZqX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232295AbhCEM36 (ORCPT + 99 others); Fri, 5 Mar 2021 07:29:58 -0500 Received: from mail.kernel.org ([198.145.29.99]:38524 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230272AbhCEM32 (ORCPT ); Fri, 5 Mar 2021 07:29:28 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id B6BA765004; Fri, 5 Mar 2021 12:29:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1614947368; bh=5aDedKZVvSe29sFYJ9x/T5C67ZydrxkJ9kxIEJU1DkY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Oy5yCZqX9RpGBXLuRbfAvy2WUZUKpZceosayh4lV5uAeqsLYoCsdHAbeMTNF4Z2pF Zs7OD4TEPQsc2tqkT9Tx42f6mXMgg9T0VkS9SqqNg4t4Fc/YNQ3Jhs9srfzghzukeX 6Ynw8y41fGGeCXaB7N/2iNOSLLkXo67XZF5ybd8Y= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Alexander Egorenkov , Julian Wiedmann , Willem de Bruijn , Jakub Kicinski Subject: [PATCH 5.10 013/102] net/af_iucv: remove WARN_ONCE on malformed RX packets Date: Fri, 5 Mar 2021 13:20:32 +0100 Message-Id: <20210305120903.924378353@linuxfoundation.org> X-Mailer: git-send-email 2.30.1 In-Reply-To: <20210305120903.276489876@linuxfoundation.org> References: <20210305120903.276489876@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alexander Egorenkov commit 27e9c1de529919d8dd7d072415d3bcae77709300 upstream. syzbot reported the following finding: AF_IUCV failed to receive skb, len=0 WARNING: CPU: 0 PID: 522 at net/iucv/af_iucv.c:2039 afiucv_hs_rcv+0x174/0x190 net/iucv/af_iucv.c:2039 CPU: 0 PID: 522 Comm: syz-executor091 Not tainted 5.10.0-rc1-syzkaller-07082-g55027a88ec9f #0 Hardware name: IBM 3906 M04 701 (KVM/Linux) Call Trace: [<00000000b87ea538>] afiucv_hs_rcv+0x178/0x190 net/iucv/af_iucv.c:2039 ([<00000000b87ea534>] afiucv_hs_rcv+0x174/0x190 net/iucv/af_iucv.c:2039) [<00000000b796533e>] __netif_receive_skb_one_core+0x13e/0x188 net/core/dev.c:5315 [<00000000b79653ce>] __netif_receive_skb+0x46/0x1c0 net/core/dev.c:5429 [<00000000b79655fe>] netif_receive_skb_internal+0xb6/0x220 net/core/dev.c:5534 [<00000000b796ac3a>] netif_receive_skb+0x42/0x318 net/core/dev.c:5593 [<00000000b6fd45f4>] tun_rx_batched.isra.0+0x6fc/0x860 drivers/net/tun.c:1485 [<00000000b6fddc4e>] tun_get_user+0x1c26/0x27f0 drivers/net/tun.c:1939 [<00000000b6fe0f00>] tun_chr_write_iter+0x158/0x248 drivers/net/tun.c:1968 [<00000000b4f22bfa>] call_write_iter include/linux/fs.h:1887 [inline] [<00000000b4f22bfa>] new_sync_write+0x442/0x648 fs/read_write.c:518 [<00000000b4f238fe>] vfs_write.part.0+0x36e/0x5d8 fs/read_write.c:605 [<00000000b4f2984e>] vfs_write+0x10e/0x148 fs/read_write.c:615 [<00000000b4f29d0e>] ksys_write+0x166/0x290 fs/read_write.c:658 [<00000000b8dc4ab4>] system_call+0xe0/0x28c arch/s390/kernel/entry.S:415 Last Breaking-Event-Address: [<00000000b8dc64d4>] __s390_indirect_jump_r14+0x0/0xc Malformed RX packets shouldn't generate any warnings because debugging info already flows to dropmon via the kfree_skb(). Signed-off-by: Alexander Egorenkov Reviewed-by: Julian Wiedmann Signed-off-by: Julian Wiedmann Acked-by: Willem de Bruijn Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- net/iucv/af_iucv.c | 1 - 1 file changed, 1 deletion(-) --- a/net/iucv/af_iucv.c +++ b/net/iucv/af_iucv.c @@ -2036,7 +2036,6 @@ static int afiucv_hs_rcv(struct sk_buff char nullstring[8]; if (!pskb_may_pull(skb, sizeof(*trans_hdr))) { - WARN_ONCE(1, "AF_IUCV failed to receive skb, len=%u", skb->len); kfree_skb(skb); return NET_RX_SUCCESS; }