Received: by 2002:a6b:500f:0:0:0:0:0 with SMTP id e15csp291240iob; Wed, 11 May 2022 14:40:42 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxgYqPi0PJFsJWk9GrP1HQh5RiG1zvwBNMRxDK3n8C5hL6ZrEAdx//NaG742s0nFTKZTtUW X-Received: by 2002:a17:907:d05:b0:6f4:3729:8e36 with SMTP id gn5-20020a1709070d0500b006f437298e36mr26398780ejc.475.1652305242439; Wed, 11 May 2022 14:40:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1652305242; cv=none; d=google.com; s=arc-20160816; b=J/qz5QlDo7KMtBWhrfV8FAj5cRnQGoIALjALB/RgcyEAd+yA94Ls+eCvlDr5//KXn7 j5XZPA0V5ylc6sQGT7Mb9lgeqDGpyggIYaGhYtwG3ctXr7hwb6Fo6lu3i+FwBtuZxE9Z hi3iuXXk/jXSX38SytYf8lF5dTAuoxZIrbriJaIQHAELVbpqY+GAEdlwh5qk2S06/lLJ HMyfzQ6FQmmf0hsRx0QF4OrkOKmWggwhoOLX3kYWokCQq4WsdD0pGFw96u7j7pguhBlh UC8hsNlvrDyW9K2J64pZKOqpBers+bheyM5cy9vNrwmJCdjB6npwQYDgubHPdVIgC3/+ 1P4Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=Iu3nGceG+R1aRB+jKuo52yyQ8Q5pIQ2v5uq//T57oek=; b=ApuaKoNxzFEpV0UxuZQo9O654Qnf8sYMeL22WvWMhi64AbU1TyRSnVXwcoZAzx8qQf +xoi+68YFuzOhTQsDBS7YbRA5m4Ld4zAmMllkg8Lf7cVXAsfGTpkOiPt2NH7pRRqJWNO 5lB05d38fKsHHIYAUJfLkA7gJhSSgIYMoZkck2OLlWzjl0VeQTdP2ucPBRFZcM/x+6wU Tq6o+iFLmwm4s+KGgETdAA7F5+kAkrgOYgH0zdtmEqg9MdkLkkpplPJuV52Vw0nTnd/W R+Tq6UvVfbJeWwd/KInZcd1yeL5VGhJYa7K30k2T3oRUQfB9RBdEdM3QQ1/k3fwLjF/U ecZg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f8-20020a170906048800b006f40efd4b88si3308851eja.812.2022.05.11.14.40.16; Wed, 11 May 2022 14:40:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S245183AbiEKOys (ORCPT + 99 others); Wed, 11 May 2022 10:54:48 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53296 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238322AbiEKOyq (ORCPT ); Wed, 11 May 2022 10:54:46 -0400 Received: from metis.ext.pengutronix.de (metis.ext.pengutronix.de [IPv6:2001:67c:670:201:290:27ff:fe1d:cc33]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 52A44209B6B for ; Wed, 11 May 2022 07:54:43 -0700 (PDT) Received: from gallifrey.ext.pengutronix.de ([2001:67c:670:201:5054:ff:fe8d:eefb] helo=bjornoya.blackshift.org) by metis.ext.pengutronix.de with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1nonjb-0004hJ-8l; Wed, 11 May 2022 16:54:39 +0200 Received: from pengutronix.de (unknown [IPv6:2a01:4f8:1c1c:29e9:22:41ff:fe00:1400]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) (Authenticated sender: mkl-all@blackshift.org) by smtp.blackshift.org (Postfix) with ESMTPSA id 0DC5C7BE0D; Wed, 11 May 2022 14:54:38 +0000 (UTC) Date: Wed, 11 May 2022 16:54:37 +0200 From: Marc Kleine-Budde To: Oliver Hartkopp Cc: Oleksij Rempel , Wolfgang Grandegger , Devid Antonio Filoni , kernel@pengutronix.de, linux-can@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, David Jander Subject: Re: [PATCH 1/1] can: skb: add and set local_origin flag Message-ID: <20220511145437.oezwkcprqiv5lfda@pengutronix.de> References: <20220511121913.2696181-1-o.rempel@pengutronix.de> <20220511132421.7o5a3po32l3w2wcr@pengutronix.de> <20220511143620.kphwgp2vhjyoecs5@pengutronix.de> <002d234f-a7d6-7b1a-72f4-157d7a283446@hartkopp.net> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="vyh5zz5idfblqisk" Content-Disposition: inline In-Reply-To: <002d234f-a7d6-7b1a-72f4-157d7a283446@hartkopp.net> X-SA-Exim-Connect-IP: 2001:67c:670:201:5054:ff:fe8d:eefb X-SA-Exim-Mail-From: mkl@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --vyh5zz5idfblqisk Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On 11.05.2022 16:50:06, Oliver Hartkopp wrote: >=20 >=20 > On 5/11/22 16:36, Marc Kleine-Budde wrote: > > On 11.05.2022 15:24:21, Marc Kleine-Budde wrote: > > > On 11.05.2022 14:38:32, Oliver Hartkopp wrote: > > > > IMO this patch does not work as intended. > > > >=20 > > > > You probably need to revisit every place where can_skb_reserve() is= used, > > > > e.g. in raw_sendmsg(). > > >=20 > > > And the loopback for devices that don't support IFF_ECHO: > > >=20 > > > | https://elixir.bootlin.com/linux/latest/source/net/can/af_can.c#L257 > >=20 > > BTW: There is a bug with interfaces that don't support IFF_ECHO. > >=20 > > Assume an invalid CAN frame is passed to can_send() on an interface that > > doesn't support IFF_ECHO. The above mentioned code does happily generate > > an echo frame and it's send, even if the driver drops it, due to > > can_dropped_invalid_skb(dev, skb). > >=20 > > The echoed back CAN frame is treated in raw_rcv() as if the headroom is= valid: > >=20 > > | https://elixir.bootlin.com/linux/v5.17.6/source/net/can/raw.c#L138 > >=20 > > But as far as I can see the can_skb_headroom_valid() check never has > > been done. What about this patch? > >=20 > > index 1fb49d51b25d..fda4807ad165 100644 > > --- a/net/can/af_can.c > > +++ b/net/can/af_can.c > > @@ -255,6 +255,9 @@ int can_send(struct sk_buff *skb, int loop) > > */ > > if (!(skb->dev->flags & IFF_ECHO)) { > > + if (can_dropped_invalid_skb(dev, skb)) > > + return -EINVAL; > > + >=20 > Good point! >=20 > But please check the rest of the code. > You need 'goto inval_skb;' instead of the return ;-) Why? To free the skb? That's what can_dropped_invalid_skb() does, too: | https://elixir.bootlin.com/linux/v5.17.6/source/include/linux/can/skb.h#L= 130 Marc --=20 Pengutronix e.K. | Marc Kleine-Budde | Embedded Linux | https://www.pengutronix.de | Vertretung West/Dortmund | Phone: +49-231-2826-924 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 | --vyh5zz5idfblqisk Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQEzBAABCgAdFiEEBsvAIBsPu6mG7thcrX5LkNig010FAmJ7zioACgkQrX5LkNig 012WlwgArROLPgtUfP+HtShqIokTztQc8dLjiIYQFXgtmhtezGcgbl16AC+H3PHt V5jAyFvWWtgB43ckZHOouRPWzt6ZfkGodr30p2svwBJaYG5DXzqI5jzJtaJToMhY alvKFCii+g+Bx26r1RCl/3r/+JcoYBFQeZx3HmrhMcekmN0RMYx44Fl2A26YFowC WfrK/tVp37vxSll/HGEs88EQ5FkhVswBgwbdLRWgV+5DoygvufYn3kuxlSN568+j ChLjzbk24hZ8EQp3oOveLUgDm5CymM8wub2av8tJAzdBwoHeJ2SY5L3M6w+T3WnA jrO7jfTDEbnDUY8QhvsefTYIgTHuWw== =kJDD -----END PGP SIGNATURE----- --vyh5zz5idfblqisk--