Files
kernel_arpi/include/linux
Eric Dumazet b3ebd9830c net: be more gentle about silly gso requests coming from user
[ Upstream commit 7c6d2ecbda ]

Recent change in virtio_net_hdr_to_skb() broke some packetdrill tests.

When --mss=XXX option is set, packetdrill always provide gso_type & gso_size
for its inbound packets, regardless of packet size.

	if (packet->tcp && packet->mss) {
		if (packet->ipv4)
			gso.gso_type = VIRTIO_NET_HDR_GSO_TCPV4;
		else
			gso.gso_type = VIRTIO_NET_HDR_GSO_TCPV6;
		gso.gso_size = packet->mss;
	}

Since many other programs could do the same, relax virtio_net_hdr_to_skb()
to no longer return an error, but instead ignore gso settings.

This keeps Willem intent to make sure no malicious packet could
reach gso stack.

Note that TCP stack has a special logic in tcp_set_skb_tso_segs()
to clear gso_size for small packets.

Fixes: 6dd912f826 ("net: check untrusted gso_size at kernel entry")
Signed-off-by: Eric Dumazet <edumazet@google.com>
Cc: Willem de Bruijn <willemb@google.com>
Acked-by: Willem de Bruijn <willemb@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2020-06-10 20:24:55 +02:00
..
2019-09-17 10:27:46 -07:00
2020-02-19 19:53:09 +01:00
2019-09-16 09:56:27 -07:00
2020-02-11 04:35:52 -08:00
2019-09-05 19:52:33 -06:00
2020-05-20 08:20:29 +02:00
2020-03-25 08:25:58 +01:00
2019-09-05 11:40:54 +02:00
2019-10-02 06:36:50 -07:00
2019-09-07 04:28:05 -03:00
2019-12-13 08:42:53 +01:00
2019-09-02 11:43:54 +01:00
2019-09-05 12:32:05 +02:00
2019-12-13 08:43:18 +01:00
2020-05-02 08:48:50 +02:00
2020-03-18 07:17:46 +01:00
2020-04-17 10:50:12 +02:00
2020-04-02 15:11:00 +02:00
2019-10-31 14:01:40 -07:00
2019-09-25 17:51:41 -07:00
2019-09-07 21:42:25 +02:00
2019-10-02 10:06:45 +02:00
2020-05-20 08:20:29 +02:00
2020-04-02 15:11:00 +02:00