From: Sebastian Poehn <sebastian.poehn@gmail.com>
To: David Miller <davem@davemloft.net>
Cc: eric.dumazet@gmail.com, sebastian.poehn@gmail.com,
Yanjun.Zhu@windriver.com, netdev@vger.kernel.org, fw@strlen.de
Subject: Re: [PATCH] ip_forward: Drop frames with attached skb->sk
Date: Wed, 15 Apr 2015 09:32:32 +0200 [thread overview]
Message-ID: <1429083152.6812.29.camel@googlemail.com> (raw)
In-Reply-To: <20150414.142300.2298282114892493676.davem@davemloft.net>
On Tue, 2015-04-14 at 14:23 -0400, David Miller wrote:
> From: Eric Dumazet <eric.dumazet@gmail.com>
> Date: Tue, 14 Apr 2015 04:54:47 -0700
>
> > On Tue, 2015-04-14 at 08:40 +0200, Sebastian Poehn wrote:
> >> On Tue, 2015-04-14 at 14:33 +0800, yzhu1 wrote:
> >> > On 04/14/2015 01:52 PM, Sebastian Poehn wrote:
> >> > > Initial discussion was:
> >> > > [FYI] xfrm: Don't lookup sk_policy for timewait sockets
> >> > >
> >> > > Forwarded frames should not have a socket attached. Especially
> >> > > tw sockets will lead to panics later-on in the stack.
> >> > >
> >> > > This was observed with TPROXY assigning a tw socket and broken
> >> > > policy routing (misconfigured). As a result frame enters
> >> > > forwarding path instead of input. We cannot solve this in
> >> > > TPROXY as it cannot know that policy routing is broken.
> >> > >
> >> > > Signed-off-by: Sebastian Poehn <sebastian.poehn@gmail.com>
> >> > > ---
> >> > > diff --git a/net/ipv4/ip_forward.c b/net/ipv4/ip_forward.c
> >> > > index 939992c..2fc3b3e 100644
> >> > > --- a/net/ipv4/ip_forward.c
> >> > > +++ b/net/ipv4/ip_forward.c
> >> > > @@ -82,6 +82,10 @@ int ip_forward(struct sk_buff *skb)
> >> > > if (skb->pkt_type != PACKET_HOST)
> >> > > goto drop;
> >> > >
> >> > > + /* this should happen neither */
> >> > Sorry. "neither" should be "either"?
> >>
> >> /* that should never happen */
> >> if (skb->pkt_type != PACKET_HOST)
> >> goto drop;
> >>
> >> /* this should happen neither */
> >> if (unlikely(skb->sk))
> >> goto drop;
> >>
> >> Both of them should never happen.
> >
> > I do not feel the comment is useful in this form.
> >
> > I would prefer explicit TPROXY reference, maybe using this :
> >
> > #if IS_ENABLED(CONFIG_NETFILTER_XT_TARGET_TPROXY)
> > if (skb->sk)
> > goto drop;
> > #endif
> >
> > changelog will precisely describes the problem for the curious readers.
>
> I suspect we really want this test unconditionally, because we are not able
> to safely operate past this point if skb->sk is NULL regardless of what made
> it that way.
>
> At least, I'll sleep more soundly at night :)
I will send out a v2 patch like that when merge window has closed.
---
goto drop;
+ if (unlikely(skb->sk))
+ goto drop;
+
if (skb_warn_if_lro(skb))
goto drop;
---
prev parent reply other threads:[~2015-04-15 7:32 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-04-14 5:52 [PATCH] ip_forward: Drop frames with attached skb->sk Sebastian Poehn
2015-04-14 6:07 ` Stephen Hemminger
2015-04-14 6:18 ` Sebastian Poehn
2015-04-14 16:50 ` David Miller
2015-04-14 6:33 ` yzhu1
2015-04-14 6:40 ` Sebastian Poehn
2015-04-14 11:54 ` Eric Dumazet
2015-04-14 18:23 ` David Miller
2015-04-15 7:32 ` Sebastian Poehn [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1429083152.6812.29.camel@googlemail.com \
--to=sebastian.poehn@gmail.com \
--cc=Yanjun.Zhu@windriver.com \
--cc=davem@davemloft.net \
--cc=eric.dumazet@gmail.com \
--cc=fw@strlen.de \
--cc=netdev@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).