Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3262138pxf; Mon, 5 Apr 2021 07:32:18 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyN9fUYwpfwdQvTB9rWVifyw7TuNEYmRDEDUMRyIy0vyZzJZhP0DThHDy2cSk8o3FxRzhGZ X-Received: by 2002:a17:906:590b:: with SMTP id h11mr16001720ejq.437.1617633138212; Mon, 05 Apr 2021 07:32:18 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617633138; cv=none; d=google.com; s=arc-20160816; b=bjU6Ag7rsWq3Ko8qeEInZuE/Rt63K1D+NTmWmEbDwUELkjC8+4o1GSxxQOIG2gE47B eX3YhS49Xl8pX4uoSI3KQ8M8uWlx1EUlyGNB1BzYlC2G+9s4Y0BCBy27lolfRHpNqdr7 M7KESb+g5/38qPnQakGORos4TruHJXBF39J94xCjfvcrLCsUBoumdl6TvyFjUV4WS/DL psccOAyDqx07Fc54xAWi/dpiwYlob5m6joHt/123GrLpmACpnxBS8V7dvEcoCthAgFmU an+JSdSIbrSehV4Bazga9ayPFNVHfADK5489rZmzpBn0N/KSqHe15V95F0lTSZJ68cXW KSBw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=EPPq6/YZqTvO6C8t+wX4/6WDXiCJajC2UfAF1OLuOyg=; b=VLPjOL340RB3TwJaJsi9usYRRTPvJH+hwOg/kZwbsRGlqHwwqgBikSuRxwvz2VchHu aRd7Qfs8UDl28YFF+DDh2Umbc/WuZoXQ5iN1P1LBCk6RXrPXC/zRzAXJ0bLa9X4ZYq7T TJCWhcHQgS5l8rATGWOngQnLNO/npBlT88+Q3C8ChTMh95cAyNRa37RcWHUEMfin3jB8 iaYH9IO2/BDizAfFpD1VIUBsk7Bs0bGr+/46S64LiU54FbPPw3hKp4LLFFtvcDvyUZln 80kGVsfCTUzzFDEhj46Pvj3G9kV4ImySFV3P0d9dYnF6VmXgtRBvplPNH9NbXS40f6Jc MSmw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pTXEWT8G; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p13si14182761edt.516.2021.04.05.07.31.55; Mon, 05 Apr 2021 07:32:18 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=pTXEWT8G; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237709AbhDEJDg (ORCPT + 99 others); Mon, 5 Apr 2021 05:03:36 -0400 Received: from mail.kernel.org ([198.145.29.99]:43936 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237346AbhDEJCI (ORCPT ); Mon, 5 Apr 2021 05:02:08 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id A4F04613AC; Mon, 5 Apr 2021 09:01:42 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1617613303; bh=Gw7fn6xvqKTV6LbCBP5C7QjVISwl7qFN3emiHurn6Ks=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=pTXEWT8GdP5TucAyGyskeA+gnKPCPRWkJYhzYF4CVNNeylMdaT6gr57zto+USp8Ks +Ma7KLahzlsIE3brIHpLq7TRhCI0H2u9FaLN6cGrZFcidYgaz6CP41R2b0g/7ZSwiK 5+8tPdco6TGxZoQxts/Fn+qQs2cB7DZXKyh1ucxg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Doug Brown , "David S. Miller" , Sasha Levin Subject: [PATCH 4.19 26/56] appletalk: Fix skb allocation size in loopback case Date: Mon, 5 Apr 2021 10:53:57 +0200 Message-Id: <20210405085023.376835496@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210405085022.562176619@linuxfoundation.org> References: <20210405085022.562176619@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Doug Brown [ Upstream commit 39935dccb21c60f9bbf1bb72d22ab6fd14ae7705 ] If a DDP broadcast packet is sent out to a non-gateway target, it is also looped back. There is a potential for the loopback device to have a longer hardware header length than the original target route's device, which can result in the skb not being created with enough room for the loopback device's hardware header. This patch fixes the issue by determining that a loopback will be necessary prior to allocating the skb, and if so, ensuring the skb has enough room. This was discovered while testing a new driver that creates a LocalTalk network interface (LTALK_HLEN = 1). It caused an skb_under_panic. Signed-off-by: Doug Brown Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/appletalk/ddp.c | 33 +++++++++++++++++++++------------ 1 file changed, 21 insertions(+), 12 deletions(-) diff --git a/net/appletalk/ddp.c b/net/appletalk/ddp.c index 2880ac470379..20ec8e7f9423 100644 --- a/net/appletalk/ddp.c +++ b/net/appletalk/ddp.c @@ -1573,8 +1573,8 @@ static int atalk_sendmsg(struct socket *sock, struct msghdr *msg, size_t len) struct sk_buff *skb; struct net_device *dev; struct ddpehdr *ddp; - int size; - struct atalk_route *rt; + int size, hard_header_len; + struct atalk_route *rt, *rt_lo = NULL; int err; if (flags & ~(MSG_DONTWAIT|MSG_CMSG_COMPAT)) @@ -1637,7 +1637,22 @@ static int atalk_sendmsg(struct socket *sock, struct msghdr *msg, size_t len) SOCK_DEBUG(sk, "SK %p: Size needed %d, device %s\n", sk, size, dev->name); - size += dev->hard_header_len; + hard_header_len = dev->hard_header_len; + /* Leave room for loopback hardware header if necessary */ + if (usat->sat_addr.s_node == ATADDR_BCAST && + (dev->flags & IFF_LOOPBACK || !(rt->flags & RTF_GATEWAY))) { + struct atalk_addr at_lo; + + at_lo.s_node = 0; + at_lo.s_net = 0; + + rt_lo = atrtr_find(&at_lo); + + if (rt_lo && rt_lo->dev->hard_header_len > hard_header_len) + hard_header_len = rt_lo->dev->hard_header_len; + } + + size += hard_header_len; release_sock(sk); skb = sock_alloc_send_skb(sk, size, (flags & MSG_DONTWAIT), &err); lock_sock(sk); @@ -1645,7 +1660,7 @@ static int atalk_sendmsg(struct socket *sock, struct msghdr *msg, size_t len) goto out; skb_reserve(skb, ddp_dl->header_length); - skb_reserve(skb, dev->hard_header_len); + skb_reserve(skb, hard_header_len); skb->dev = dev; SOCK_DEBUG(sk, "SK %p: Begin build.\n", sk); @@ -1696,18 +1711,12 @@ static int atalk_sendmsg(struct socket *sock, struct msghdr *msg, size_t len) /* loop back */ skb_orphan(skb); if (ddp->deh_dnode == ATADDR_BCAST) { - struct atalk_addr at_lo; - - at_lo.s_node = 0; - at_lo.s_net = 0; - - rt = atrtr_find(&at_lo); - if (!rt) { + if (!rt_lo) { kfree_skb(skb); err = -ENETUNREACH; goto out; } - dev = rt->dev; + dev = rt_lo->dev; skb->dev = dev; } ddp_dl->request(ddp_dl, skb, dev->dev_addr); -- 2.30.1