kernel_samsung_a53x/net/core
Vasily Averin 273797e640 skb_expand_head() adjust skb->truesize incorrectly
commit 7f678def99d29c520418607509bb19c7fc96a6db upstream.

Christoph Paasch reports [1] about incorrect skb->truesize
after skb_expand_head() call in ip6_xmit.
This may happen because of two reasons:
- skb_set_owner_w() for newly cloned skb is called too early,
before pskb_expand_head() where truesize is adjusted for (!skb-sk) case.
- pskb_expand_head() does not adjust truesize in (skb->sk) case.
In this case sk->sk_wmem_alloc should be adjusted too.

[1] https://lkml.org/lkml/2021/8/20/1082

Fixes: f1260ff15a71 ("skbuff: introduce skb_expand_head()")
Fixes: 2d85a1b31dde ("ipv6: ip6_finish_output2: set sk into newly allocated nskb")
Reported-by: Christoph Paasch <christoph.paasch@gmail.com>
Signed-off-by: Vasily Averin <vvs@virtuozzo.com>
Reviewed-by: Eric Dumazet <edumazet@google.com>
Link: https://lore.kernel.org/r/644330dd-477e-0462-83bf-9f514c41edd1@virtuozzo.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2025-01-15 16:29:52 +01:00
..
bpf_sk_storage.c
datagram.c
datagram.h
dev.c Revert "net: avoid potential underflow in qdisc_pkt_len_init() with UFO" 2024-11-24 00:23:12 +01:00
dev_addr_lists.c
dev_ioctl.c
devlink.c
drop_monitor.c drop_monitor: replace spin_lock by raw_spin_lock 2024-11-19 14:19:06 +01:00
dst.c net: do not delay dst_entries_add() in dst_release() 2024-11-30 02:33:26 +01:00
dst_cache.c
failover.c
fib_notifier.c
fib_rules.c
filter.c bpf: Check negative offsets in __bpf_skb_min_len() 2025-01-15 16:29:48 +01:00
flow_dissector.c
flow_offload.c
gen_estimator.c
gen_stats.c
gro_cells.c
hwbm.c
link_watch.c Revert "net: linkwatch: use system_unbound_wq" 2024-11-24 00:23:55 +01:00
lwt_bpf.c
lwtunnel.c
Makefile
neighbour.c net/neighbor: clear error in case strict check is not set 2024-12-17 13:24:31 +01:00
net-procfs.c
net-sysfs.c Revert "ethtool: check device is present when getting link settings" 2024-11-24 00:23:49 +01:00
net-sysfs.h
net-traces.c
net_namespace.c netns: Make get_net_ns() handle zero refcount net 2024-11-19 14:19:08 +01:00
netclassid_cgroup.c bpf, cgroups: Fix cgroup v2 fallback on v1/v2 mixed mode 2024-11-23 23:20:59 +01:00
netevent.c
netpoll.c netpoll: Use rcu_access_pointer() in __netpoll_setup 2024-12-17 13:24:31 +01:00
netprio_cgroup.c bpf, cgroups: Fix cgroup v2 fallback on v1/v2 mixed mode 2024-11-23 23:20:59 +01:00
page_pool.c
pktgen.c
ptp_classifier.c
request_sock.c
rtnetlink.c rtnetlink: Correct nested IFLA_VF_VLAN_LIST attribute validation 2024-11-19 11:32:45 +01:00
scm.c Revert "io_uring/unix: drop usage of io_uring socket" 2024-11-19 09:11:51 +01:00
secure_seq.c
skbuff.c skb_expand_head() adjust skb->truesize incorrectly 2025-01-15 16:29:52 +01:00
skmsg.c bpf: fix recursive lock when verdict program return SK_PASS 2025-01-15 16:29:51 +01:00
sock.c ipv6: Fix data races around sk->sk_prot. 2024-11-19 14:19:35 +01:00
sock_diag.c sock_diag: annotate data-races around sock_diag_handlers[family] 2024-11-19 08:44:38 +01:00
sock_map.c bpf, sockmap: Fix update element with same 2025-01-02 17:00:49 +01:00
sock_reuseport.c
stream.c
sysctl_net_core.c Revert "Make more sysctl constants read-only" 2024-12-03 19:56:17 +01:00
timestamping.c
tso.c
utils.c
xdp.c xdp: fix invalid wait context of page_pool_destroy() 2024-11-23 23:20:08 +01:00