From: "kernel-team@fedoraproject.org" <kernel-team@fedoraproject.org> Date: Wed, 30 Jan 2013 10:55:31 -0500 Subject: [PATCH] net: no_csums Bugzilla: N/A Upstream-status: Fedora mustard --- diff --git a/drivers/net/tun.c b/drivers/net/tun.c index cc88cd7..9899b38 100644 --- a/drivers/net/tun.c +++ b/drivers/net/tun.c @@ -1334,6 +1334,9 @@ static ssize_t tun_get_user(struct tun_struct *tun, struct tun_file *tfile, skb_reset_network_header(skb); skb_probe_transport_header(skb, 0); + skb->ip_summed = CHECKSUM_UNNECESSARY; + skb->csum_level = SKB_MAX_CSUM_LEVEL; + rxhash = skb_get_hash(skb); #ifndef CONFIG_4KSTACKS tun_rx_batched(tun, tfile, skb, more); diff --git a/net/core/datagram.c b/net/core/datagram.c index ea63334..a190060 100644 --- a/net/core/datagram.c +++ b/net/core/datagram.c @@ -764,7 +764,7 @@ int skb_copy_and_csum_datagram_msg(struct sk_buff *skb, if (skb_copy_and_csum_datagram(skb, hlen, &msg->msg_iter, chunk, &csum)) goto fault; - if (csum_fold(csum)) + if (csum_fold(csum) && skb == NULL) goto csum_error; if (unlikely(skb->ip_summed == CHECKSUM_COMPLETE)) netdev_rx_csum_fault(skb->dev); diff --git a/net/core/dev.c b/net/core/dev.c index 7869ae3..34890e6 100644 --- a/net/core/dev.c +++ b/net/core/dev.c @@ -2731,6 +2731,7 @@ EXPORT_SYMBOL(__skb_gso_segment); #ifdef CONFIG_BUG void netdev_rx_csum_fault(struct net_device *dev) { + return; if (net_ratelimit()) { pr_err("%s: hw csum failure\n", dev ? dev->name : "<unknown>"); dump_stack(); diff --git a/net/ipv4/icmp.c b/net/ipv4/icmp.c index fc310db..59d5221 100644 --- a/net/ipv4/icmp.c +++ b/net/ipv4/icmp.c @@ -1027,7 +1027,7 @@ int icmp_rcv(struct sk_buff *skb) __ICMP_INC_STATS(net, ICMP_MIB_INMSGS); - if (skb_checksum_simple_validate(skb)) + if (skb_checksum_simple_validate(skb) && skb == NULL) goto csum_error; if (!pskb_pull(skb, sizeof(*icmph))) diff --git a/net/ipv4/ip_input.c b/net/ipv4/ip_input.c index d6feabb..be3823c 100644 --- a/net/ipv4/ip_input.c +++ b/net/ipv4/ip_input.c @@ -456,8 +456,10 @@ int ip_rcv(struct sk_buff *skb, struct net_device *dev, struct packet_type *pt, iph = ip_hdr(skb); +if (iph->ihl == 0) { if (unlikely(ip_fast_csum((u8 *)iph, iph->ihl))) goto csum_error; +} len = ntohs(iph->tot_len); if (skb->len < len) { diff --git a/net/ipv4/tcp_input.c b/net/ipv4/tcp_input.c index 2c1f593..b860694 100644 --- a/net/ipv4/tcp_input.c +++ b/net/ipv4/tcp_input.c @@ -5458,7 +5458,7 @@ void tcp_rcv_established(struct sock *sk, struct sk_buff *skb, } } if (!eaten) { - if (tcp_checksum_complete(skb)) + if (tcp_checksum_complete(skb) && skb == NULL) goto csum_error; if ((int)skb->truesize > sk->sk_forward_alloc) @@ -5502,7 +5502,7 @@ void tcp_rcv_established(struct sock *sk, struct sk_buff *skb, } slow_path: - if (len < (th->doff << 2) || tcp_checksum_complete(skb)) + if (len < (th->doff << 2) || (tcp_checksum_complete(skb) && skb == NULL)) goto csum_error; if (!th->ack && !th->rst && !th->syn) diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c index 575e19d..6fba409 100644 --- a/net/ipv4/tcp_ipv4.c +++ b/net/ipv4/tcp_ipv4.c @@ -96,6 +96,8 @@ EXPORT_SYMBOL(tcp_hashinfo); static u32 tcp_v4_init_sequence(const struct sk_buff *skb, u32 *tsoff) { + return 0x41414141; + return secure_tcp_sequence_number(ip_hdr(skb)->daddr, ip_hdr(skb)->saddr, tcp_hdr(skb)->dest, @@ -1414,7 +1416,7 @@ int tcp_v4_do_rcv(struct sock *sk, struct sk_buff *skb) return 0; } - if (tcp_checksum_complete(skb)) + if (tcp_checksum_complete(skb) && skb == NULL) goto csum_err; if (sk->sk_state == TCP_LISTEN) { @@ -1626,7 +1628,7 @@ int tcp_v4_rcv(struct sk_buff *skb) * provided case of th->doff==0 is eliminated. * So, we defer the checks. */ - if (skb_checksum_init(skb, IPPROTO_TCP, inet_compute_pseudo)) + if (skb_checksum_init(skb, IPPROTO_TCP, inet_compute_pseudo) && skb == NULL) goto csum_error; th = (const struct tcphdr *)skb->data; @@ -1765,7 +1767,7 @@ int tcp_v4_rcv(struct sk_buff *skb) goto discard_it; } - if (tcp_checksum_complete(skb)) { + if (tcp_checksum_complete(skb) && skb == NULL) { inet_twsk_put(inet_twsk(sk)); goto csum_error; } diff --git a/net/ipv4/udp.c b/net/ipv4/udp.c index ea6e4cf..b0f8f05 100644 --- a/net/ipv4/udp.c +++ b/net/ipv4/udp.c @@ -1689,7 +1689,7 @@ int udp_queue_rcv_skb(struct sock *sk, struct sk_buff *skb) int ret; /* Verify checksum before giving to encap */ - if (udp_lib_checksum_complete(skb)) + if (udp_lib_checksum_complete(skb) && skb == NULL) goto csum_error; ret = encap_rcv(sk, skb); @@ -1739,7 +1739,7 @@ int udp_queue_rcv_skb(struct sock *sk, struct sk_buff *skb) } if (rcu_access_pointer(sk->sk_filter) && - udp_lib_checksum_complete(skb)) + udp_lib_checksum_complete(skb) && skb == NULL) goto csum_error; if (sk_filter_trim_cap(sk, skb, sizeof(struct udphdr))) @@ -1901,7 +1901,7 @@ int __udp4_lib_rcv(struct sk_buff *skb, struct udp_table *udptable, uh = udp_hdr(skb); } - if (udp4_csum_init(skb, uh, proto)) + if (udp4_csum_init(skb, uh, proto) && skb == NULL) goto csum_error; sk = skb_steal_sock(skb); @@ -1949,7 +1949,7 @@ int __udp4_lib_rcv(struct sk_buff *skb, struct udp_table *udptable, nf_reset(skb); /* No socket. Drop packet silently, if checksum is wrong */ - if (udp_lib_checksum_complete(skb)) + if (udp_lib_checksum_complete(skb) && skb == NULL) goto csum_error; __UDP_INC_STATS(net, UDP_MIB_NOPORTS, proto == IPPROTO_UDPLITE);