Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp3007406pxb; Mon, 18 Oct 2021 06:30:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzkbW57TSGx0/vtQn6W4PkjE6rvv9y2B3MfghRtWT957ouzh1kXUnlCVr9XOeFpRLcaPAoI X-Received: by 2002:a62:6206:0:b0:44c:bc1f:aa5a with SMTP id w6-20020a626206000000b0044cbc1faa5amr29175151pfb.5.1634563803911; Mon, 18 Oct 2021 06:30:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1634563803; cv=none; d=google.com; s=arc-20160816; b=ySF4gBztvM8QxbXKg5SfqvmhPIypaM563etzw4OtgeSduL/H7Qqp7jGM/4Qoze9F+J eo9P7TuK8Et3K9dpPBM55iRkKjFhijDwAkf5bWmZS3oZc2daqkQrvTowh2suFlu429g0 WS8fpsz3MO94S/DDZVbYnPEsB6XEoLyPjg2URsaydbX7Yege7RnFeciJS5fWz8JRVayQ IQjur1wPKyYBWzLfjnIP9w8cdMzdLqjqgA7GU4Oi/lBZ9LGYEpXDAtWHyQnwUxtkbYxI R2DGr2lvwV0yglMiwg0xPJ9yjYrEoRFfu2J8DoUlx75nwZZ+AwtrtsYf1tgdOSAHaedc sraA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=wy7uHrnZLVeXDJMA8rIlG9QrXNPUr+w1Yxd5ltOC6os=; b=iQvLU1S2NhZufT5fyx4LIcTsbjtw1YQQH1jCnfJUSIECr8aSf/eJiC7SO6+/pXhv5n F5ldTeCR09+JZruDBzRBKO1Vx8pOAAwHler6ykZy0EWaUmvolLSnB8d7I3cWHuB+z4dN qhkndWCMz/q1kWBU6OvSLv6/klGn87ipPIKApcOd6BGVhSmrkRz/xanTd3P+AUN+Mj3s 2W8G8uV+HrIjUzyzQ8HOlHPGTy5NtB7L3fIIr3deH+BIubcinBN6t5/HD09OwJoIkTkG WI1MI8Ni7zNkvY3aJnz1VJYlJGKqKRch4evLI8LzcZ01Be2e6lXs7/HpwCPRqvgLDEF2 HGmw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=y+m4En9q; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v185si14737686pgd.445.2021.10.18.06.29.50; Mon, 18 Oct 2021 06:30:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=y+m4En9q; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231836AbhJRN3e (ORCPT + 99 others); Mon, 18 Oct 2021 09:29:34 -0400 Received: from mail.kernel.org ([198.145.29.99]:41358 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231905AbhJRN3G (ORCPT ); Mon, 18 Oct 2021 09:29:06 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id C383961360; Mon, 18 Oct 2021 13:26:31 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1634563592; bh=yTXYksWALTOicAmW7Xp/4CmMRNVSYyCtVd2SaLSzTN4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=y+m4En9qjqr7SVdw+gKQauWwYb+wg9UMgSe+I8HIBsl8lhM8qBLAdkzoWiv6HWTP0 WaM2TyzecaBfQj8+t/lzLlh3H2F1vD7+RQT4HyTs9byCQ2MEgXPtnjd2IFj9MPIXYe ckcVlqHXjhOh8069hz1aesP5FhjWrOf4sLD2SaAg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Vlad Yasevich , Neil Horman , Eiichi Tsukata , Marcelo Ricardo Leitner , Marcelo Ricardo Leitner , Xin Long , Jakub Kicinski Subject: [PATCH 4.14 26/39] sctp: account stream padding length for reconf chunk Date: Mon, 18 Oct 2021 15:24:35 +0200 Message-Id: <20211018132326.282921923@linuxfoundation.org> X-Mailer: git-send-email 2.33.1 In-Reply-To: <20211018132325.426739023@linuxfoundation.org> References: <20211018132325.426739023@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eiichi Tsukata commit a2d859e3fc97e79d907761550dbc03ff1b36479c upstream. sctp_make_strreset_req() makes repeated calls to sctp_addto_chunk() which will automatically account for padding on each call. inreq and outreq are already 4 bytes aligned, but the payload is not and doing SCTP_PAD4(a + b) (which _sctp_make_chunk() did implicitly here) is different from SCTP_PAD4(a) + SCTP_PAD4(b) and not enough. It led to possible attempt to use more buffer than it was allocated and triggered a BUG_ON. Cc: Vlad Yasevich Cc: Neil Horman Cc: Greg KH Fixes: cc16f00f6529 ("sctp: add support for generating stream reconf ssn reset request chunk") Reported-by: Eiichi Tsukata Signed-off-by: Eiichi Tsukata Signed-off-by: Marcelo Ricardo Leitner Signed-off-by: Marcelo Ricardo Leitner Reviewed-by: Xin Long Link: https://lore.kernel.org/r/b97c1f8b0c7ff79ac4ed206fc2c49d3612e0850c.1634156849.git.mleitner@redhat.com Signed-off-by: Jakub Kicinski Signed-off-by: Greg Kroah-Hartman --- net/sctp/sm_make_chunk.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/net/sctp/sm_make_chunk.c +++ b/net/sctp/sm_make_chunk.c @@ -3623,7 +3623,7 @@ struct sctp_chunk *sctp_make_strreset_re outlen = (sizeof(outreq) + stream_len) * out; inlen = (sizeof(inreq) + stream_len) * in; - retval = sctp_make_reconf(asoc, outlen + inlen); + retval = sctp_make_reconf(asoc, SCTP_PAD4(outlen) + SCTP_PAD4(inlen)); if (!retval) return NULL;