From: Aaron Conole <aconole@redhat.com>
To: Ilya Maximets <i.maximets@ovn.org>
Cc: netdev@vger.kernel.org, "David S. Miller" <davem@davemloft.net>,
Eric Dumazet <edumazet@google.com>,
Jakub Kicinski <kuba@kernel.org>,
Paolo Abeni <pabeni@redhat.com>,
Simon Horman <horms@kernel.org>,
linux-kernel@vger.kernel.org, dev@openvswitch.org,
Eelco Chaudron <echaudro@redhat.com>, Willy Tarreau <w@1wt.eu>,
LePremierHomme <kwqcheii@proton.me>,
Junvy Yang <zhuque@tencent.com>
Subject: Re: [PATCH net] net: openvswitch: remove never-working support for setting nsh fields
Date: Wed, 12 Nov 2025 09:55:57 -0500 [thread overview]
Message-ID: <f7ty0obfgg2.fsf@redhat.com> (raw)
In-Reply-To: <20251112112246.95064-1-i.maximets@ovn.org> (Ilya Maximets's message of "Wed, 12 Nov 2025 12:14:03 +0100")
Ilya Maximets <i.maximets@ovn.org> writes:
> The validation of the set(nsh(...)) action is completely wrong.
> It runs through the nsh_key_put_from_nlattr() function that is the
> same function that validates NSH keys for the flow match and the
> push_nsh() action. However, the set(nsh(...)) has a very different
> memory layout. Nested attributes in there are doubled in size in
> case of the masked set(). That makes proper validation impossible.
>
> There is also confusion in the code between the 'masked' flag, that
> says that the nested attributes are doubled in size containing both
> the value and the mask, and the 'is_mask' that says that the value
> we're parsing is the mask. This is causing kernel crash on trying to
> write into mask part of the match with SW_FLOW_KEY_PUT() during
> validation, while validate_nsh() doesn't allocate any memory for it:
>
> BUG: kernel NULL pointer dereference, address: 0000000000000018
> #PF: supervisor read access in kernel mode
> #PF: error_code(0x0000) - not-present page
> PGD 1c2383067 P4D 1c2383067 PUD 20b703067 PMD 0
> Oops: Oops: 0000 [#1] SMP NOPTI
> CPU: 8 UID: 0 Kdump: loaded Not tainted 6.17.0-rc4+ #107 PREEMPT(voluntary)
> RIP: 0010:nsh_key_put_from_nlattr+0x19d/0x610 [openvswitch]
> Call Trace:
> <TASK>
> validate_nsh+0x60/0x90 [openvswitch]
> validate_set.constprop.0+0x270/0x3c0 [openvswitch]
> __ovs_nla_copy_actions+0x477/0x860 [openvswitch]
> ovs_nla_copy_actions+0x8d/0x100 [openvswitch]
> ovs_packet_cmd_execute+0x1cc/0x310 [openvswitch]
> genl_family_rcv_msg_doit+0xdb/0x130
> genl_family_rcv_msg+0x14b/0x220
> genl_rcv_msg+0x47/0xa0
> netlink_rcv_skb+0x53/0x100
> genl_rcv+0x24/0x40
> netlink_unicast+0x280/0x3b0
> netlink_sendmsg+0x1f7/0x430
> ____sys_sendmsg+0x36b/0x3a0
> ___sys_sendmsg+0x87/0xd0
> __sys_sendmsg+0x6d/0xd0
> do_syscall_64+0x7b/0x2c0
> entry_SYSCALL_64_after_hwframe+0x76/0x7e
>
> The third issue with this process is that while trying to convert
> the non-masked set into masked one, validate_set() copies and doubles
> the size of the OVS_KEY_ATTR_NSH as if it didn't have any nested
> attributes. It should be copying each nested attribute and doubling
> them in size independently. And the process must be properly reversed
> during the conversion back from masked to a non-masked variant during
> the flow dump.
>
> In the end, the only two outcomes of trying to use this action are
> either validation failure or a kernel crash. And if somehow someone
> manages to install a flow with such an action, it will most definitely
> not do what it is supposed to, since all the keys and the masks are
> mixed up.
>
> Fixing all the issues is a complex task as it requires re-writing
> most of the validation code.
>
> Given that and the fact that this functionality never worked since
> introduction, let's just remove it altogether. It's better to
> re-introduce it later with a proper implementation instead of trying
> to fix it in stable releases.
>
> Fixes: b2d0f5d5dc53 ("openvswitch: enable NSH support")
> Reported-by: Junvy Yang <zhuque@tencent.com>
> Signed-off-by: Ilya Maximets <i.maximets@ovn.org>
> ---
Thanks, this makes sense to me. As you noted, the "fix" (I don't really
know if it is the right word since the functionality never worked) is
quite complex, and still might not be 'good enough' to not have further
issues. It makes more sense not to try and support something that never
worked to begin with - especially since even in the userspace side we
never really did a set(nsh()) thing (because it doesn't exist as
functionality).
Reviewed-by: Aaron Conole <aconole@redhat.com>
next prev parent reply other threads:[~2025-11-12 14:56 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-11-12 11:14 [PATCH net] net: openvswitch: remove never-working support for setting nsh fields Ilya Maximets
2025-11-12 13:28 ` Eelco Chaudron
2025-11-12 14:55 ` Aaron Conole [this message]
2025-11-12 15:02 ` Ilya Maximets
2025-11-15 2:20 ` patchwork-bot+netdevbpf
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=f7ty0obfgg2.fsf@redhat.com \
--to=aconole@redhat.com \
--cc=davem@davemloft.net \
--cc=dev@openvswitch.org \
--cc=echaudro@redhat.com \
--cc=edumazet@google.com \
--cc=horms@kernel.org \
--cc=i.maximets@ovn.org \
--cc=kuba@kernel.org \
--cc=kwqcheii@proton.me \
--cc=linux-kernel@vger.kernel.org \
--cc=netdev@vger.kernel.org \
--cc=pabeni@redhat.com \
--cc=w@1wt.eu \
--cc=zhuque@tencent.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox