Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3353413pxf; Mon, 5 Apr 2021 09:48:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz9rteTZurKmUhr+caYBISU4umFzkRWRa9P5il+5nNoi4zQgpr+Q41XU+sJLeC/aStPdP/W X-Received: by 2002:a05:6402:4a:: with SMTP id f10mr32251344edu.85.1617641290282; Mon, 05 Apr 2021 09:48:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617641290; cv=none; d=google.com; s=arc-20160816; b=erOw6QJy7xHUdOxxkeksz6gJaCHdIbdlowLOQiNWzYE7alz70GKy0cpW1hR6K00jey 0+mz4ozUrm8P8BUmbVx9+AX0xTsFl0wpQTjLAySjujaT9boPSVuoosQbP2ee8UPI1asW v5JGXA6p1zujcCKzCYI7iQ2TBhnu7LLYuuU26+70GhmAarM+J1LNKLoTfFqjOwGRhFwd KsRUM4a7eBBUCR+1R0mEn9e4HgngdO/qQ35WAB05KvLnmvE8BX2ikno6+B2VIqeGd+6L SPaFnRVcwLqYegCQsjKojcVGunYR/DlMWHzswJkbQSez/yDQirm3H8csRsCWqh241Xda KjiQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=8WqkDv+1Na8JwFXuvV77mT7Pc9ksxbdgHF6yWxm9F9Q=; b=bSemQGt0lAtZVg7TA3Q84CcnQwDDzz33KmQ6lD83NJd64NjFmsTGC3+byaea8akxjy o6yNhbu/1fhCsg1ymLPOE/IyGJHpF/Ui8+U5M7bFRIEd5uM6UPfIAjgpFlP5P8yGCMpH rO7LGnGe9OQOcYkJriQEI6QEL0PzQr1MfO7SWHz5+ToWnMLtDY6clCUH6ZiPiqboOwrZ xmyvKLGnEfTqO4AF8qm5o5rk3q5kK3KLaBJK5K0NGkugqvW2P3uc0Tw8nHR9JNZFmRK7 w7PpoXB4Uabr2g1R+MeO1AR7UtRYh26XhTNCGXdEv2oe7VG5qEPO/Xs42ZxCiy/U/NEM +KVA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=QV7Kf3WX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h20si13211686edb.417.2021.04.05.09.47.46; Mon, 05 Apr 2021 09:48:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=QV7Kf3WX; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239813AbhDEJRt (ORCPT + 99 others); Mon, 5 Apr 2021 05:17:49 -0400 Received: from mail.kernel.org ([198.145.29.99]:33914 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239677AbhDEJOI (ORCPT ); Mon, 5 Apr 2021 05:14:08 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 30B4261002; Mon, 5 Apr 2021 09:14:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1617614042; bh=ZSrdWFiSIH5aePo1/X0Kj2L2Z3fiHDk0mpjR7keKoD0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=QV7Kf3WXfNmK7dQAx5E1D948bX6V2TKDXTH9tzk9Ge56njuGC614MBsvqFRkyA+P6 hjVh+6j9suXhiI7zc7fe7n8DgC0ayaNq6M7YRi0yoLGY/+/4rlC35ZC/ln050UQyB4 tgJXR6vbuOja6RhcOYHzftyh0OLpRJ1PtQ5aHx7E= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Doug Brown , "David S. Miller" , Sasha Levin Subject: [PATCH 5.11 061/152] appletalk: Fix skb allocation size in loopback case Date: Mon, 5 Apr 2021 10:53:30 +0200 Message-Id: <20210405085036.263440616@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210405085034.233917714@linuxfoundation.org> References: <20210405085034.233917714@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Doug Brown [ Upstream commit 39935dccb21c60f9bbf1bb72d22ab6fd14ae7705 ] If a DDP broadcast packet is sent out to a non-gateway target, it is also looped back. There is a potential for the loopback device to have a longer hardware header length than the original target route's device, which can result in the skb not being created with enough room for the loopback device's hardware header. This patch fixes the issue by determining that a loopback will be necessary prior to allocating the skb, and if so, ensuring the skb has enough room. This was discovered while testing a new driver that creates a LocalTalk network interface (LTALK_HLEN = 1). It caused an skb_under_panic. Signed-off-by: Doug Brown Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/appletalk/ddp.c | 33 +++++++++++++++++++++------------ 1 file changed, 21 insertions(+), 12 deletions(-) diff --git a/net/appletalk/ddp.c b/net/appletalk/ddp.c index ca1a0d07a087..ebda397fa95a 100644 --- a/net/appletalk/ddp.c +++ b/net/appletalk/ddp.c @@ -1577,8 +1577,8 @@ static int atalk_sendmsg(struct socket *sock, struct msghdr *msg, size_t len) struct sk_buff *skb; struct net_device *dev; struct ddpehdr *ddp; - int size; - struct atalk_route *rt; + int size, hard_header_len; + struct atalk_route *rt, *rt_lo = NULL; int err; if (flags & ~(MSG_DONTWAIT|MSG_CMSG_COMPAT)) @@ -1641,7 +1641,22 @@ static int atalk_sendmsg(struct socket *sock, struct msghdr *msg, size_t len) SOCK_DEBUG(sk, "SK %p: Size needed %d, device %s\n", sk, size, dev->name); - size += dev->hard_header_len; + hard_header_len = dev->hard_header_len; + /* Leave room for loopback hardware header if necessary */ + if (usat->sat_addr.s_node == ATADDR_BCAST && + (dev->flags & IFF_LOOPBACK || !(rt->flags & RTF_GATEWAY))) { + struct atalk_addr at_lo; + + at_lo.s_node = 0; + at_lo.s_net = 0; + + rt_lo = atrtr_find(&at_lo); + + if (rt_lo && rt_lo->dev->hard_header_len > hard_header_len) + hard_header_len = rt_lo->dev->hard_header_len; + } + + size += hard_header_len; release_sock(sk); skb = sock_alloc_send_skb(sk, size, (flags & MSG_DONTWAIT), &err); lock_sock(sk); @@ -1649,7 +1664,7 @@ static int atalk_sendmsg(struct socket *sock, struct msghdr *msg, size_t len) goto out; skb_reserve(skb, ddp_dl->header_length); - skb_reserve(skb, dev->hard_header_len); + skb_reserve(skb, hard_header_len); skb->dev = dev; SOCK_DEBUG(sk, "SK %p: Begin build.\n", sk); @@ -1700,18 +1715,12 @@ static int atalk_sendmsg(struct socket *sock, struct msghdr *msg, size_t len) /* loop back */ skb_orphan(skb); if (ddp->deh_dnode == ATADDR_BCAST) { - struct atalk_addr at_lo; - - at_lo.s_node = 0; - at_lo.s_net = 0; - - rt = atrtr_find(&at_lo); - if (!rt) { + if (!rt_lo) { kfree_skb(skb); err = -ENETUNREACH; goto out; } - dev = rt->dev; + dev = rt_lo->dev; skb->dev = dev; } ddp_dl->request(ddp_dl, skb, dev->dev_addr); -- 2.30.1