Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp3676144pxv; Tue, 13 Jul 2021 00:47:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyjzW8d2q51VCrse3Qb9WXkLzxL1SssR/gqEMOBV1hWuNKPd5EcBRF22sQWSnSZ4Jp7rFJs X-Received: by 2002:a17:907:72ce:: with SMTP id du14mr4014501ejc.529.1626162468318; Tue, 13 Jul 2021 00:47:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626162468; cv=none; d=google.com; s=arc-20160816; b=Dwy6J0NJ5bPzQS91rBSR8JDIb24kGVBJ+jtzwDuXMIwiO5buhbG2xaq+8u5/eEvVsu o6yTkx55LlxbSXJXnizOAA+W0Hw/ssrkLJ97Gdu4Z4eF7mcXcK/SdZXFk+JQPhdViPm0 he2ges2KyEBwNyvr7/+E2haQxdki5r3yXYWA1ZuVFV0e5s09eFj+D40pbFKv7N7HDy7x mZbUSGK8v8J8WvQFDv8LQdAg8+7TaYXDeUtb2sfEa+b9IF7vItSqTEkgXyhY8UCS9q/n PjDYxoUTqLzxLsMWWQFZWy6j80UC/+UNu8rZTIQkB5svmwEFeQVHNUnivhT0+iWHE/fU 236A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:references:cc :to:from:subject:dkim-signature; bh=S2QgaeifWpJsHlA3PUAtp1Lof9N7j00FCY/hbO/PGaI=; b=F5+Z3J1Xn4JXZ91fiFif3kil+raxKiRtmlCXP2Z+7o4q0OxwyVTse+3diwph4wDBc1 h36r59vQ4kSOhIs74YawU6QC1xBaWTcKgmFEf46ZbX9MU/LNGNdsbcStSAHnAFr9BRn/ /KlD3Grr+IImdGU0FfXJwOVhQ7slZKGSygd8FEvtnA/L2HkDqqWZv6gkeiAONlsM2yR3 oCjzMKp9nO0r8cUmRNufAeY4u7a/fG9r0b3YG+l6ZBuFSSR6SSIEhcpWgIEJqqL3Ge0/ vVRD8D8eIJvijDfYyce66tmkysTV5LTJ1Sq7YFTUaXEkbcElmGkDvk3oA/yMmVO3IkBV DRNg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@virtuozzo.com header.s=relay header.b=EgJEJb+r; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=virtuozzo.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a12si20081703edr.3.2021.07.13.00.47.23; Tue, 13 Jul 2021 00:47:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@virtuozzo.com header.s=relay header.b=EgJEJb+r; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=virtuozzo.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234479AbhGMHtM (ORCPT + 99 others); Tue, 13 Jul 2021 03:49:12 -0400 Received: from relay.sw.ru ([185.231.240.75]:54260 "EHLO relay.sw.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234342AbhGMHtJ (ORCPT ); Tue, 13 Jul 2021 03:49:09 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=virtuozzo.com; s=relay; h=Content-Type:MIME-Version:Date:Message-ID:From: Subject; bh=S2QgaeifWpJsHlA3PUAtp1Lof9N7j00FCY/hbO/PGaI=; b=EgJEJb+r09iWh1OBB feiEeV/D+REGUFN0DOztEvNG72wKfV0UpVf3bKT8pco0QH6ZlX+r9XVL1QDfPZHpW+aNZ9EaGNpXT lwN8egs0Y/8kuj6rm53di01iBhF8KuJYTcecatIxD6XNzsFAdpok2p+qqREnEGH7qnmb0fH235aQE =; Received: from [10.93.0.56] by relay.sw.ru with esmtp (Exim 4.94.2) (envelope-from ) id 1m3D7Q-003my6-2D; Tue, 13 Jul 2021 10:46:16 +0300 Subject: Re: [PATCH IPV6 v3 1/1] ipv6: allocate enough headroom in ip6_finish_output2() From: Vasily Averin To: "David S. Miller" , Hideaki YOSHIFUJI , David Ahern , Jakub Kicinski , Eric Dumazet Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org References: <74e90fba-df9f-5078-13de-41df54d2b257@virtuozzo.com> <1b1efd52-dd34-2023-021c-c6c6df6fec5f@virtuozzo.com> Message-ID: Date: Tue, 13 Jul 2021 10:46:14 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: <1b1efd52-dd34-2023-021c-c6c6df6fec5f@virtuozzo.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org I've found 2 problems in this patch, and I'm going to resend new patch version soon. On 7/12/21 9:45 AM, Vasily Averin wrote: > index ff4f9eb..0efcb9b 100644 > --- a/net/ipv6/ip6_output.c > +++ b/net/ipv6/ip6_output.c > @@ -60,10 +60,38 @@ static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff * > { > struct dst_entry *dst = skb_dst(skb); > struct net_device *dev = dst->dev; > + unsigned int hh_len = LL_RESERVED_SPACE(dev); > + int delta = hh_len - skb_headroom(skb); > const struct in6_addr *nexthop; > struct neighbour *neigh; > int ret; > > + /* Be paranoid, rather than too clever. */ > + if (unlikely(delta > 0) && dev->header_ops) { > + /* pskb_expand_head() might crash, if skb is shared */ > + if (skb_shared(skb)) { > + struct sk_buff *nskb = skb_clone(skb, GFP_ATOMIC); > + > + if (likely(nskb)) { > + if (skb->sk) > + skb_set_owner_w(skb, skb->sk); need to assign sk not to skb but to nskb > + consume_skb(skb); > + } else { > + kfree_skb(skb); It is quite strange to call consume_skb() on one case and kfree_skb() in another one. We know that original skb was shared so we should not call kfree_skb here. Btw I've noticed similar problem in few other cases: in pptp_xmit, pvc_xmit, ip_vs_prepare_tunneled_skb they call consume_skb() in case of success and kfree_skb on error path. It looks like potential bug for me. > + } > + skb = nskb; > + } > + if (skb && > + pskb_expand_head(skb, SKB_DATA_ALIGN(delta), 0, GFP_ATOMIC)) { > + kfree_skb(skb); > + skb = NULL; > + } > + if (!skb) { > + IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTDISCARDS); > + return -ENOMEM; > + } > + } > + > if (ipv6_addr_is_multicast(&ipv6_hdr(skb)->daddr)) { > struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); > >