Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp47385iob; Wed, 11 May 2022 09:17:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxuTp7dP1wwavlZ6af9wPq0tzLjybhEXgAdFTM4eDrujnXMqzsDAGnoOZcIjs/gaXRV5PjH X-Received: by 2002:a17:902:8303:b0:15f:86f:70a with SMTP id bd3-20020a170902830300b0015f086f070amr17808190plb.5.1652285853116; Wed, 11 May 2022 09:17:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652285853; cv=none; d=google.com; s=arc-20160816; b=x3/Lf4EIcTo2U5estK71hQ5PeHkbBw/TID+kTtKphehfnyM0OnnGq+H2kguYjaJRsy dpvuSD+gbVop2UL6iJfhtht+kipjPh4f9wOWUfjs+o7KZZkJPtK7lM957Rq681rW+i6x XjQUU8ftMQjZSIv3pozpBmKqeAYxJBxpxuhzNbQnRn+yY8+dQUOz1pRxKuOyhAeX3pUR PHQZ3QZDIOvLZCrJT58wtyiKjnmcSaqn6lLaRC4UaQNw6Ghc29mbP8r9Fk7IwjafWBFn nmoODWjF3RW0y6x0/myfTNkJ+crOAHA5f4c8Y552/h+H3bPNevk0e+5d9x3J8qPgy0X1 AjuA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=8O2cVCTEJiG9Saz5teTiN4WXvdQwaPKShwXqV7miEQ0=; b=OGpQEKJumEh44IhXHgGcj6L99J2HDF1wSxaN48jyslaM1A7lHImE3RM5BtbzHeJ3WT KMt3mHrNYtGVIDm2QUA59LvGUVMTmrvep5sPUyt043/J2UVtq8sss352wSXUrUCZSsOa bsYTnV9lfybFzncO0ZTUTiAMN1YlM3auUmMY/5e4H347VW/zd7nh9E/ounPnvD4ZPrPA oq/zxkhNDcWTd8AFrP97bC6EQZGcVqtO3eP13OYhaZOhYIeVp8Aj146D5mp4TZ2eWVI/ wLORq70KuSMal/07kl7RNm5GWSyQtFD2/Wj5H5CVYMHUxlORucuf75EadsnNJG2HCZ+q 9Xag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@hartkopp.net header.s=strato-dkim-0002 header.b=YSLKyPN6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id q6-20020a17090a9f4600b001dc7b989160si205984pjv.130.2022.05.11.09.17.19; Wed, 11 May 2022 09:17:33 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@hartkopp.net header.s=strato-dkim-0002 header.b=YSLKyPN6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245081AbiEKOuY (ORCPT + 99 others); Wed, 11 May 2022 10:50:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35766 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S245089AbiEKOuR (ORCPT ); Wed, 11 May 2022 10:50:17 -0400 Received: from mo4-p01-ob.smtp.rzone.de (mo4-p01-ob.smtp.rzone.de [85.215.255.54]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BF9A819FF7E; Wed, 11 May 2022 07:50:10 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; t=1652280607; s=strato-dkim-0002; d=hartkopp.net; h=In-Reply-To:From:References:Cc:To:Subject:Date:Message-ID:Cc:Date: From:Subject:Sender; bh=8O2cVCTEJiG9Saz5teTiN4WXvdQwaPKShwXqV7miEQ0=; b=YSLKyPN6Sd0+VEfc2S2yHINv1+Ju8pKU/iEVr3u90zFzO0Doo5quDHDg7pg0zbS/Nu /XoO1exFah7ICoJgRWLicD9cmpbo4+eqDRK0Xl3iQc7xG69mpjR12SZZK5zF3jOiVFGT cxqsQt9zMkde8V049NT3mah45mkMjkhuS82wTIWbvVzdh5uMnTJkfwX281h5ZS2EvioR QDbWal9ysPSdaGdQuPCZGwh7E184uLto9rn2YymEe+4pDwd48XLqqtSkc1Y6TI8SDtEW oSXtEy7YjvSRMt2HxCJ5rrvLz4HbZBtTx2qKfj7hxmA111cj7UW7oD27MSqmgIfamjlY OakQ== Authentication-Results: strato.com; dkim=none X-RZG-AUTH: ":P2MHfkW8eP4Mre39l357AZT/I7AY/7nT2yrDxb8mjG14FZxedJy6qgO1qCHSa1GLptZHusx3hdBqPeOuh2koeKQvJnLjhchY2TXGXhEF98MlNg==" X-RZG-CLASS-ID: mo00 Received: from [IPV6:2a00:6020:1cff:5b00:9642:f755:5daa:777e] by smtp.strato.de (RZmta 47.42.2 AUTH) with ESMTPSA id 4544c9y4BEo7yaU (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256 bits)) (Client did not present a certificate); Wed, 11 May 2022 16:50:07 +0200 (CEST) Message-ID: <002d234f-a7d6-7b1a-72f4-157d7a283446@hartkopp.net> Date: Wed, 11 May 2022 16:50:06 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.8.1 Subject: Re: [PATCH 1/1] can: skb: add and set local_origin flag Content-Language: en-US To: Marc Kleine-Budde Cc: Oleksij Rempel , Wolfgang Grandegger , Devid Antonio Filoni , kernel@pengutronix.de, linux-can@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, David Jander References: <20220511121913.2696181-1-o.rempel@pengutronix.de> <20220511132421.7o5a3po32l3w2wcr@pengutronix.de> <20220511143620.kphwgp2vhjyoecs5@pengutronix.de> From: Oliver Hartkopp In-Reply-To: <20220511143620.kphwgp2vhjyoecs5@pengutronix.de> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_NONE, SPF_HELO_PASS,SPF_NONE,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/11/22 16:36, Marc Kleine-Budde wrote: > On 11.05.2022 15:24:21, Marc Kleine-Budde wrote: >> On 11.05.2022 14:38:32, Oliver Hartkopp wrote: >>> IMO this patch does not work as intended. >>> >>> You probably need to revisit every place where can_skb_reserve() is used, >>> e.g. in raw_sendmsg(). >> >> And the loopback for devices that don't support IFF_ECHO: >> >> | https://elixir.bootlin.com/linux/latest/source/net/can/af_can.c#L257 > > BTW: There is a bug with interfaces that don't support IFF_ECHO. > > Assume an invalid CAN frame is passed to can_send() on an interface that > doesn't support IFF_ECHO. The above mentioned code does happily generate > an echo frame and it's send, even if the driver drops it, due to > can_dropped_invalid_skb(dev, skb). > > The echoed back CAN frame is treated in raw_rcv() as if the headroom is valid: > > | https://elixir.bootlin.com/linux/v5.17.6/source/net/can/raw.c#L138 > > But as far as I can see the can_skb_headroom_valid() check never has > been done. What about this patch? > > index 1fb49d51b25d..fda4807ad165 100644 > --- a/net/can/af_can.c > +++ b/net/can/af_can.c > @@ -255,6 +255,9 @@ int can_send(struct sk_buff *skb, int loop) > */ > > if (!(skb->dev->flags & IFF_ECHO)) { > + if (can_dropped_invalid_skb(dev, skb)) > + return -EINVAL; > + Good point! But please check the rest of the code. You need 'goto inval_skb;' instead of the return ;-) Best, Oliver > /* If the interface is not capable to do loopback > * itself, we do it here. > */ > > Marc >