lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <20230110191725.22675-2-admin@netgeek.ovh> Date: Tue, 10 Jan 2023 20:17:25 +0100 From: Hervé Boisse <admin@...geek.ovh> To: "David S. Miller" <davem@...emloft.net>, Eric Dumazet <edumazet@...gle.com>, Jakub Kicinski <kuba@...nel.org>, Paolo Abeni <pabeni@...hat.com> Cc: netdev@...r.kernel.org, linux-kernel@...r.kernel.org, Hervé Boisse <admin@...geek.ovh> Subject: [PATCH net 2/2] net/af_packet: fix tx skb network header on SOCK_RAW sockets over VLAN device When an application sends a packet on a SOCK_RAW socket over a VLAN device, there is a possibility that the skb network header is incorrectly set. The issue happens when the device used to send the packet is a VLAN device whose underlying device has no VLAN tx hardware offloading support. In that case, the VLAN driver reports a LL header size increased by 4 bytes to take into account the tag that will be added in software. However, the socket user has no clue about that and still provides a normal LL header without tag. This results in the network header of the skb being shifted 4 bytes too far in the packet. This shift makes tc classifiers fail as they point to incorrect data. Move network header right after underlying VLAN device LL header size without tag, regardless of hardware offloading support. That is, the expected LL header size from socket user. Signed-off-by: Hervé Boisse <admin@...geek.ovh> --- net/packet/af_packet.c | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/net/packet/af_packet.c b/net/packet/af_packet.c index c18274f65b17..be892fd498a6 100644 --- a/net/packet/af_packet.c +++ b/net/packet/af_packet.c @@ -1933,6 +1933,18 @@ static void packet_parse_headers(struct sk_buff *skb, struct socket *sock) skb->protocol = dev_parse_header_protocol(skb); } + /* VLAN device may report bigger LL header size due to reserved room for + * tag on devices without hardware offloading support + */ + if (is_vlan_dev(skb->dev) && + (sock->type == SOCK_RAW || sock->type == SOCK_PACKET)) { + struct net_device *real_dev = vlan_dev_real_dev(skb->dev); + + depth = real_dev->hard_header_len; + if (pskb_may_pull(skb, depth)) + skb_set_network_header(skb, depth); + } + /* Move network header to the right position for VLAN tagged packets */ if (likely(skb->dev->type == ARPHRD_ETHER) && eth_type_vlan(skb->protocol) && -- 2.38.2
Powered by blists - more mailing lists