aboutsummaryrefslogtreecommitdiffstats
path: root/net/packet
diff options
context:
space:
mode:
authorWillem de Bruijn <willemb@google.com>2014-11-19 13:10:16 -0500
committerDavid S. Miller <davem@davemloft.net>2014-11-21 14:43:07 -0500
commit9c7077622dd917457ced680a23b7f175769471d9 (patch)
tree8c162e5ef188298d9fce81c7d2a6fb216f2d0a5c /net/packet
parentdf6ce47091620d76bbe036d0af3dc1abad4576c1 (diff)
packet: make packet_snd fail on len smaller than l2 header
When sending packets out with PF_PACKET, SOCK_RAW, ensure that the packet is at least as long as the device's expected link layer header. This check already exists in tpacket_snd, but not in packet_snd. Also rate limit the warning in tpacket_snd. Signed-off-by: Willem de Bruijn <willemb@google.com> Acked-by: Eric Dumazet <edumazet@google.com> Acked-by: Daniel Borkmann <dborkman@redhat.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/packet')
-rw-r--r--net/packet/af_packet.c29
1 files changed, 21 insertions, 8 deletions
diff --git a/net/packet/af_packet.c b/net/packet/af_packet.c
index 4cd13d8de44b..58af58026dd2 100644
--- a/net/packet/af_packet.c
+++ b/net/packet/af_packet.c
@@ -2095,6 +2095,18 @@ static void tpacket_destruct_skb(struct sk_buff *skb)
2095 sock_wfree(skb); 2095 sock_wfree(skb);
2096} 2096}
2097 2097
2098static bool ll_header_truncated(const struct net_device *dev, int len)
2099{
2100 /* net device doesn't like empty head */
2101 if (unlikely(len <= dev->hard_header_len)) {
2102 net_warn_ratelimited("%s: packet size is too short (%d < %d)\n",
2103 current->comm, len, dev->hard_header_len);
2104 return true;
2105 }
2106
2107 return false;
2108}
2109
2098static int tpacket_fill_skb(struct packet_sock *po, struct sk_buff *skb, 2110static int tpacket_fill_skb(struct packet_sock *po, struct sk_buff *skb,
2099 void *frame, struct net_device *dev, int size_max, 2111 void *frame, struct net_device *dev, int size_max,
2100 __be16 proto, unsigned char *addr, int hlen) 2112 __be16 proto, unsigned char *addr, int hlen)
@@ -2170,12 +2182,8 @@ static int tpacket_fill_skb(struct packet_sock *po, struct sk_buff *skb,
2170 if (unlikely(err < 0)) 2182 if (unlikely(err < 0))
2171 return -EINVAL; 2183 return -EINVAL;
2172 } else if (dev->hard_header_len) { 2184 } else if (dev->hard_header_len) {
2173 /* net device doesn't like empty head */ 2185 if (ll_header_truncated(dev, tp_len))
2174 if (unlikely(tp_len <= dev->hard_header_len)) {
2175 pr_err("packet size is too short (%d < %d)\n",
2176 tp_len, dev->hard_header_len);
2177 return -EINVAL; 2186 return -EINVAL;
2178 }
2179 2187
2180 skb_push(skb, dev->hard_header_len); 2188 skb_push(skb, dev->hard_header_len);
2181 err = skb_store_bits(skb, 0, data, 2189 err = skb_store_bits(skb, 0, data,
@@ -2500,9 +2508,14 @@ static int packet_snd(struct socket *sock, struct msghdr *msg, size_t len)
2500 skb_set_network_header(skb, reserve); 2508 skb_set_network_header(skb, reserve);
2501 2509
2502 err = -EINVAL; 2510 err = -EINVAL;
2503 if (sock->type == SOCK_DGRAM && 2511 if (sock->type == SOCK_DGRAM) {
2504 (offset = dev_hard_header(skb, dev, ntohs(proto), addr, NULL, len)) < 0) 2512 offset = dev_hard_header(skb, dev, ntohs(proto), addr, NULL, len);
2505 goto out_free; 2513 if (unlikely(offset) < 0)
2514 goto out_free;
2515 } else {
2516 if (ll_header_truncated(dev, len))
2517 goto out_free;
2518 }
2506 2519
2507 /* Returns -EFAULT on error */ 2520 /* Returns -EFAULT on error */
2508 err = skb_copy_datagram_from_iovec(skb, offset, msg->msg_iov, 0, len); 2521 err = skb_copy_datagram_from_iovec(skb, offset, msg->msg_iov, 0, len);