Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp3833352pxv; Tue, 13 Jul 2021 05:02:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwqGJbMvkqTbBI1MkUaI1SwdxY+KynngVvyLSYcT1ijMA89uOcH2E41Bjz/wIoBJ0HOTQ92 X-Received: by 2002:a05:6402:1bc6:: with SMTP id ch6mr4975894edb.267.1626177748623; Tue, 13 Jul 2021 05:02:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626177748; cv=none; d=google.com; s=arc-20160816; b=vWPLBBCcVJ3cod2kQEifybMoBKJFUA9byJXL8YDLNbcckV1Tv8e1erZPLfsF2Hyge7 6B9OYTFV49gZPDdP09RLfLbjL/kA5kLrxgkFowmH7LUaLxjDc3k0uZtWXO3B6xJwMps4 YewgGMJQgki6/7Ng6RdLEGPZ6jbgsrWmpzKwgJgDNCz/uLLZG6vUPgQMhk74mTZh9q6P CpMVUfNp2opMIotX62cHhSgexqDHf8KcRxMWrZFMAdNbWFEhPXGghbBjNXh1bgWZwofk Yk5PTsOgUbBuPaKrwsMP7hF/upEj6HTC6SZcLdvSOiTWNy3940TOFf12Z68FaXg9bIi/ foTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:references:cc :to:subject:from:dkim-signature; bh=XdVSeYsWM6gpkohRLdjfHrqyvOYT/lKERJYnjF+csFw=; b=sp/BHTNFqOGqodTX4cA6mARMv0OuvBfLx8MMynQFzT87GgPvgObmnHRstH4nsWwrwq 4ZjOmSaZMqA1MKGNvtfTRkgd/dmWNhWwa+BYV6+XD/7tMZ0JNxcdVRN18JH1mSiaEUBv d9NTwqhg17vdMerhZ5hoNSTdPbovhsDs31xKf+jBFC0Z/2mp39dUOQT/ld/HYv/lUAM7 jyVg+RZr/p3We0JysRWGTxLTJwhY992LbmIQ8sUZg2fnsW7FshzYIyDLMG9XHSyog2W5 22gLWI1ZtshkLrfSa4lt/Jbie7vP4Dkfb5JGeYt+ow9NFWIXMdVq3bKbJtTuXvf5RDIO a9rg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@virtuozzo.com header.s=relay header.b=yJ3he1Rb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=virtuozzo.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cw13si20142025ejc.195.2021.07.13.05.02.05; Tue, 13 Jul 2021 05:02:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@virtuozzo.com header.s=relay header.b=yJ3he1Rb; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=virtuozzo.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236027AbhGMMEB (ORCPT + 99 others); Tue, 13 Jul 2021 08:04:01 -0400 Received: from relay.sw.ru ([185.231.240.75]:54432 "EHLO relay.sw.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235797AbhGMMEB (ORCPT ); Tue, 13 Jul 2021 08:04:01 -0400 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=virtuozzo.com; s=relay; h=Content-Type:MIME-Version:Date:Message-ID:Subject :From; bh=XdVSeYsWM6gpkohRLdjfHrqyvOYT/lKERJYnjF+csFw=; b=yJ3he1RbKYdlrK/Y8YO rGj7smjCQp2KnyoyEWpCSveyvJhUjsoDrxlNA72QxeHxO+/nqRuZA1poxEwj/LY1I+N72D6ks+GNY YGHNv/FlKvRdunOeDJbbYcGjIe3n3TP9oeTjm9186KoReM/sVRtIKjOKeQY8UsYVVtUAGGIT8bk=; Received: from [10.93.0.56] by relay.sw.ru with esmtp (Exim 4.94.2) (envelope-from ) id 1m3H63-003pDM-9n; Tue, 13 Jul 2021 15:01:07 +0300 From: Vasily Averin Subject: [PATCH NET v4 0/1] ipv6: allocate enough headroom in ip6_finish_output2() To: "David S. Miller" , Hideaki YOSHIFUJI , David Ahern , Jakub Kicinski , Eric Dumazet Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org References: Message-ID: <8bad3fda-2f74-75d7-8461-e49a7e6fdbd9@virtuozzo.com> Date: Tue, 13 Jul 2021 15:01:06 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Recently Syzkaller found one more issue on RHEL7-based OpenVz kernels. During its investigation I've found that upstream is affected too. TEE target send sbk with small headroom into another interface which requires an increased headroom. ipv4 handles this problem in ip_finish_output2() and creates new skb with enough headroom, though ip6_finish_output2() lacks this logic. Suzkaller created C reproducer, it can be found in v1 cover-letter https://lkml.org/lkml/2021/7/7/467 v4 changes: fixed skb_set_owner_w() call: it should set sk on new nskb v3 changes: now I think it's better to separate bugfix itself and creation of new helper. now bugfix does not create new inline function. Unlike from v1 it creates new skb only when it is necessary, i.e. for shared skb only. In case of failure it updates IPSTATS_MIB_OUTDISCARDS counter Patch set with new helper will be sent separately. v2 changes: new helper was created and used in ip6_finish_output2 and in ip6_xmit() small refactoring in changed functions: commonly used dereferences was replaced by variables Vasily Averin (1): ipv6: allocate enough headroom in ip6_finish_output2() net/ipv6/ip6_output.c | 28 ++++++++++++++++++++++++++++ 1 file changed, 28 insertions(+) -- 1.8.3.1