summaryrefslogtreecommitdiffstats
path: root/net/core
diff options
context:
space:
mode:
authorHeiner Kallweit <hkallweit1@gmail.com>2020-11-21 00:22:20 +0100
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2024-01-08 11:27:34 +0100
commite2be74aa42c66aa26cca41998c36df35d0c729c9 (patch)
tree472b14acedcb33ebd65d5ee05dd0dd26a7be8a43 /net/core
parentecc8805aad51368cecfdb0ec0f6ddeb2e4e1a1e5 (diff)
downloadlinux-stable-e2be74aa42c66aa26cca41998c36df35d0c729c9.tar.gz
linux-stable-e2be74aa42c66aa26cca41998c36df35d0c729c9.tar.bz2
linux-stable-e2be74aa42c66aa26cca41998c36df35d0c729c9.zip
net: warn if gso_type isn't set for a GSO SKB
[ Upstream commit 1d155dfdf50efc2b0793bce93c06d1a5b23d0877 ] In bug report [0] a warning in r8169 driver was reported that was caused by an invalid GSO SKB (gso_type was 0). See [1] for a discussion about this issue. Still the origin of the invalid GSO SKB isn't clear. It shouldn't be a network drivers task to check for invalid GSO SKB's. Also, even if issue [0] can be fixed, we can't be sure that a similar issue doesn't pop up again at another place. Therefore let gso_features_check() check for such invalid GSO SKB's. [0] https://bugzilla.kernel.org/show_bug.cgi?id=209423 [1] https://www.spinics.net/lists/netdev/msg690794.html Signed-off-by: Heiner Kallweit <hkallweit1@gmail.com> Link: https://lore.kernel.org/r/97c78d21-7f0b-d843-df17-3589f224d2cf@gmail.com Signed-off-by: Jakub Kicinski <kuba@kernel.org> Stable-dep-of: 24ab059d2ebd ("net: check dev->gso_max_size in gso_features_check()") Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'net/core')
-rw-r--r--net/core/dev.c5
1 files changed, 5 insertions, 0 deletions
diff --git a/net/core/dev.c b/net/core/dev.c
index 0f9214fb36e0..ea05db68aa95 100644
--- a/net/core/dev.c
+++ b/net/core/dev.c
@@ -3200,6 +3200,11 @@ static netdev_features_t gso_features_check(const struct sk_buff *skb,
if (gso_segs > dev->gso_max_segs)
return features & ~NETIF_F_GSO_MASK;
+ if (!skb_shinfo(skb)->gso_type) {
+ skb_warn_bad_offload(skb);
+ return features & ~NETIF_F_GSO_MASK;
+ }
+
/* Support for GSO partial features requires software
* intervention before we can actually process the packets
* so we need to strip support for any partial features now