Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp635746pxb; Wed, 1 Sep 2021 06:54:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx+mFny2dzYd+jEAmCMwjKq4YWWUxC+z7W+q1h6NI3ij0TqtXxMKJj1wGsDBpLPp5Ut4VMd X-Received: by 2002:a17:906:2acc:: with SMTP id m12mr38561428eje.231.1630504472085; Wed, 01 Sep 2021 06:54:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1630504472; cv=none; d=google.com; s=arc-20160816; b=OkTFKqe8mbQ4aIMIcv8+zLgrHOB7xbn8um4JoJZ/gFarenILRXqAiTYbdAqQCX2DnK rE2+GWDW4tVu3KWw3QxzP3lekAoOsjjpJ28jNb1PHuMWpClWRGWRdVF2H5zap4pt7fGN zZLKgjXazOhfHJRbgtL5tyZCmwuCbcXzSfBu0+Aua++xjiJD3wtEJpzM+UVMqxmxwsji J71CYc3dUYut663z7R4CqOhQgABwL57VY1BG51Y734t5M1m2btLzfsh19emSjXlBGUHb ZaFdvXyu3MtaOhwzS4wn1/nMz2DcRygeoMvaOJ9ZZ82ADjRcOD5RmHwJzf63uSI+1KTX XdOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=HL4OFA3MyulAMIPvUGUruLFHSETz0LT5eYnBY3Ay/NM=; b=wZYtlgbPphOGbdpoFsP4+cD1HwETs/ZD2V1zenNLGxWd0IMcCzIzL/v+gc3P1FoJXd AvkqkTPetEmDqxYzr2bN90uQButRFVr3lv6oU0EDbCf9gd84Ya8Wqzv3ak8LR4Kho17o MiOsmmxuSB4eslu0TCcryLS8ak8H7YdSq1OWINNbCCd1yclUpDvNpBXJjDEalBHt7hFD wgbOhcopjFgMxXwI2mEyrC1daFvHoZzIvXSClEdjJTFvWvPyujeT+4jCgi7zoRTcURYK nruPpNAz3PrNXTB1fNbV8zJb6g6LRZ6IZlala4vs2siIEo65rV+NJItdGwiDfsmvdU/H o3Mg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=dXkyCrSn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id kq12si25020356ejb.265.2021.09.01.06.53.57; Wed, 01 Sep 2021 06:54:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=dXkyCrSn; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244666AbhIANsc (ORCPT + 99 others); Wed, 1 Sep 2021 09:48:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48366 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242520AbhIANsa (ORCPT ); Wed, 1 Sep 2021 09:48:30 -0400 Received: from mail-ej1-x62a.google.com (mail-ej1-x62a.google.com [IPv6:2a00:1450:4864:20::62a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9FA71C061575 for ; Wed, 1 Sep 2021 06:47:33 -0700 (PDT) Received: by mail-ej1-x62a.google.com with SMTP id x11so6965562ejv.0 for ; Wed, 01 Sep 2021 06:47:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=HL4OFA3MyulAMIPvUGUruLFHSETz0LT5eYnBY3Ay/NM=; b=dXkyCrSn/z6HZ7RjtOdmUd8AE0Z7EuzVJls9i7l9+DKh9OUWUKt793lE+6aWcUSL26 C1dS13gWklJJffogEk3a1BscjucXFf7UzQ0OECG1O/sgC+wVwYe7Cwg25mhiczm33nte zDpCADz4JflP8F99F28pu+puqin+I6wHmsRzFxETJbQsrmWS5jswORVvImd1KgCk8n7h 6s+v41K4Ns89KtqZnv0Y4WaOQB//GIGZWjaVCZLAN868DC8YtRU0qFif3l79GOqDKzYg 0VEUyOtMe3Mbop1WnZnv6e/nY2/Oi2+xyoB0xba8LCfMlYhKASU8q0+04RbPvSZzRy6v Hxog== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=HL4OFA3MyulAMIPvUGUruLFHSETz0LT5eYnBY3Ay/NM=; b=TD7Jrwdyy9nzO1WtpPLDZkz82GtB+2WpFtwx+m1Rg2oUe6Qryui4wEoNXXqV8Dagl+ oENa7QpwU8vKP9wcaQrSqI6a7SJvhBqFXSGS0KQ8YZpvKxr/WmRDau0Nra7ZTf0Z990b 2LEwuRWzY0H5qANmy2rXt5vUQHLQ+2DAScNla9t8OoNtdNwMLkcqLrYY7BvMPuZTw8cA tfWVDplm3eSyRju54+XGnhIqFF++kVsbF1mYZAUQoq3l2eI6T9SrkjzNrVuYU6FIgG/8 dmj8e4YAUK1sVVmwvpNKsuw84Qbez3z21hgQ572vceaj3EhhSSlhssH6N1sfhKt40c1u Uwkg== X-Gm-Message-State: AOAM53077/Fye0Brxb4jVr/5RZgMJGiWyeuYaKixZ/dm7SUVYBmvESOu D5107Uq1zFOx8zMCnZutYdIpyPuvFF7weQ== X-Received: by 2002:a17:906:f92:: with SMTP id q18mr38728605ejj.353.1630504052168; Wed, 01 Sep 2021 06:47:32 -0700 (PDT) Received: from mail-wr1-f42.google.com (mail-wr1-f42.google.com. [209.85.221.42]) by smtp.gmail.com with ESMTPSA id v10sm11390184edt.25.2021.09.01.06.47.26 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 01 Sep 2021 06:47:28 -0700 (PDT) Received: by mail-wr1-f42.google.com with SMTP id m9so4677746wrb.1 for ; Wed, 01 Sep 2021 06:47:26 -0700 (PDT) X-Received: by 2002:a5d:6cae:: with SMTP id a14mr36496238wra.275.1630504045833; Wed, 01 Sep 2021 06:47:25 -0700 (PDT) MIME-Version: 1.0 References: <20210819100447.00201b26@kicinski-fedora-pc1c0hjn.dhcp.thefacebook.com> <20210821071425.512834-1-chouhan.shreyansh630@gmail.com> In-Reply-To: From: Willem de Bruijn Date: Wed, 1 Sep 2021 09:46:48 -0400 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH 1/2 net] ip_gre: add validation for csum_start To: Ido Schimmel Cc: Willem de Bruijn , Shreyansh Chouhan , davem@davemloft.net, yoshfuji@linux-ipv6.org, dsahern@kernel.org, kuba@kernel.org, pshelar@nicira.com, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, syzbot+ff8e1b9f2f36481e2efc@syzkaller.appspotmail.com Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Sep 1, 2021 at 7:53 AM Ido Schimmel wrote: > > On Sat, Aug 21, 2021 at 09:41:14AM -0400, Willem de Bruijn wrote: > > On Sat, Aug 21, 2021 at 3:14 AM Shreyansh Chouhan > > wrote: > > > > > > Validate csum_start in gre_handle_offloads before we call _gre_xmit so > > > that we do not crash later when the csum_start value is used in the > > > lco_csum function call. > > > > > > This patch deals with ipv4 code. > > > > > > Fixes: c54419321455 ("GRE: Refactor GRE tunneling code.") > > > Reported-by: syzbot+ff8e1b9f2f36481e2efc@syzkaller.appspotmail.com > > > Signed-off-by: Shreyansh Chouhan > > > > Reviewed-by: Willem de Bruijn > > Hi Shreyansh, Willem, > > I bisected packet drops with a GRE tunnel to this patch. With the > following debug patch [1], I'm getting this output [2]. > > Tested with IPv4 underlay only, but I assume problem exists with ip6gre > as well. > > Thanks > > [1] > diff --git a/net/ipv4/ip_gre.c b/net/ipv4/ip_gre.c > index 177d26d8fb9c..cf4e13db030b 100644 > --- a/net/ipv4/ip_gre.c > +++ b/net/ipv4/ip_gre.c > @@ -473,8 +473,11 @@ static void __gre_xmit(struct sk_buff *skb, struct net_device *dev, > > static int gre_handle_offloads(struct sk_buff *skb, bool csum) > { > - if (csum && skb_checksum_start(skb) < skb->data) > + if (csum && skb_checksum_start(skb) < skb->data) { > + if (net_ratelimit()) > + skb_dump(KERN_WARNING, skb, false); > return -EINVAL; > + } > return iptunnel_handle_offloads(skb, csum ? SKB_GSO_GRE_CSUM : SKB_GSO_GRE); > } > > [2] > skb len=84 headroom=78 headlen=84 tailroom=15902 > mac=(78,0) net=(78,20) trans=98 > shinfo(txflags=0 nr_frags=0 gso(size=0 type=0 segs=0)) > csum(0x0 ip_summed=0 complete_sw=0 valid=0 level=0) > hash(0x0 sw=0 l4=0) proto=0x0800 pkttype=0 iif=32 > dev name=g1a feat=0x0x00000006401d5869 > skb linear: 00000000: 45 00 00 54 be 12 40 00 3f 01 f9 82 c0 00 02 01 > skb linear: 00000010: c0 00 02 12 08 00 fe ad 8c 39 00 01 7c 65 2f 61 > skb linear: 00000020: 00 00 00 00 f8 7d 0a 00 00 00 00 00 10 11 12 13 > skb linear: 00000030: 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f 20 21 22 23 > skb linear: 00000040: 24 25 26 27 28 29 2a 2b 2c 2d 2e 2f 30 31 32 33 > skb linear: 00000050: 34 35 36 37 Thanks for the detailed report, Ido. This is a gre tunnel device with csum/ocsum enabled, correct? How was this packet generated: does it come from the local stack or is it a custom packet injected from userspace, e.g., with a packet socket with vnet_hdr? The bug that this patch intended to protect against only occurs with ip_summed == CHECKSUM_PARTIAL (3): if (skb->ip_summed == CHECKSUM_PARTIAL) { *(__sum16 *)ptr = csum_fold(lco_csum(skb)); } else { skb->ip_summed = CHECKSUM_PARTIAL; skb->csum_start = skb_transport_header(skb) - skb->head; skb->csum_offset = sizeof(*greh); } So this packet would not hit that code anyway, as it has ip_summed CHECKSUM_NONE (0), which computes the offsets manually. Perhaps the check needs to be refined. But I'd like to also understand how to reproduce this / how common this false positive is.