* [PATCH ipsec,v2] xfrm: fix "disable_policy" on ipv4 early demux
@ 2022-10-09 19:16 Eyal Birger
2022-10-10 8:28 ` Nicolas Dichtel
2022-10-14 13:37 ` Steffen Klassert
0 siblings, 2 replies; 7+ messages in thread
From: Eyal Birger @ 2022-10-09 19:16 UTC (permalink / raw)
To: steffen.klassert
Cc: davem, yoshfuji, dsahern, edumazet, kuba, pabeni, netdev,
monil191989, nicolas.dichtel, stephen, Eyal Birger
The commit in the "Fixes" tag tried to avoid a case where policy check
is ignored due to dst caching in next hops.
However, when the traffic is locally consumed, the dst may be cached
in a local TCP or UDP socket as part of early demux. In this case the
"disable_policy" flag is not checked as ip_route_input_noref() was only
called before caching, and thus, packets after the initial packet in a
flow will be dropped if not matching policies.
Fix by checking the "disable_policy" flag also when a valid dst is
already available.
Link: https://bugzilla.kernel.org/show_bug.cgi?id=216557
Reported-by: Monil Patel <monil191989@gmail.com>
Fixes: e6175a2ed1f1 ("xfrm: fix "disable_policy" flag use when arriving from different devices")
Signed-off-by: Eyal Birger <eyal.birger@gmail.com>
----
v2: use dev instead of skb->dev
---
net/ipv4/ip_input.c | 5 +++++
1 file changed, 5 insertions(+)
diff --git a/net/ipv4/ip_input.c b/net/ipv4/ip_input.c
index 1b512390b3cf..e880ce77322a 100644
--- a/net/ipv4/ip_input.c
+++ b/net/ipv4/ip_input.c
@@ -366,6 +366,11 @@ static int ip_rcv_finish_core(struct net *net, struct sock *sk,
iph->tos, dev);
if (unlikely(err))
goto drop_error;
+ } else {
+ struct in_device *in_dev = __in_dev_get_rcu(dev);
+
+ if (in_dev && IN_DEV_ORCONF(in_dev, NOPOLICY))
+ IPCB(skb)->flags |= IPSKB_NOPOLICY;
}
#ifdef CONFIG_IP_ROUTE_CLASSID
--
2.34.1
^ permalink raw reply related [flat|nested] 7+ messages in thread* Re: [PATCH ipsec,v2] xfrm: fix "disable_policy" on ipv4 early demux
2022-10-09 19:16 [PATCH ipsec,v2] xfrm: fix "disable_policy" on ipv4 early demux Eyal Birger
@ 2022-10-10 8:28 ` Nicolas Dichtel
2022-10-10 10:29 ` Eyal Birger
2022-10-14 13:37 ` Steffen Klassert
1 sibling, 1 reply; 7+ messages in thread
From: Nicolas Dichtel @ 2022-10-10 8:28 UTC (permalink / raw)
To: Eyal Birger, steffen.klassert
Cc: davem, yoshfuji, dsahern, edumazet, kuba, pabeni, netdev,
monil191989, stephen
Le 09/10/2022 à 21:16, Eyal Birger a écrit :
> The commit in the "Fixes" tag tried to avoid a case where policy check
> is ignored due to dst caching in next hops.
>
> However, when the traffic is locally consumed, the dst may be cached
> in a local TCP or UDP socket as part of early demux. In this case the
> "disable_policy" flag is not checked as ip_route_input_noref() was only
> called before caching, and thus, packets after the initial packet in a
> flow will be dropped if not matching policies.
>
> Fix by checking the "disable_policy" flag also when a valid dst is
> already available.
>
> Link: https://bugzilla.kernel.org/show_bug.cgi?id=216557
> Reported-by: Monil Patel <monil191989@gmail.com>
> Fixes: e6175a2ed1f1 ("xfrm: fix "disable_policy" flag use when arriving from different devices")
> Signed-off-by: Eyal Birger <eyal.birger@gmail.com>
>
Is there the same problem with ipv6?
^ permalink raw reply [flat|nested] 7+ messages in thread* Re: [PATCH ipsec,v2] xfrm: fix "disable_policy" on ipv4 early demux
2022-10-10 8:28 ` Nicolas Dichtel
@ 2022-10-10 10:29 ` Eyal Birger
2022-10-10 12:19 ` Nicolas Dichtel
0 siblings, 1 reply; 7+ messages in thread
From: Eyal Birger @ 2022-10-10 10:29 UTC (permalink / raw)
To: nicolas.dichtel
Cc: steffen.klassert, davem, yoshfuji, dsahern, edumazet, kuba,
pabeni, netdev, monil191989, stephen
Hi Nicolas,
On Mon, Oct 10, 2022 at 11:28 AM Nicolas Dichtel
<nicolas.dichtel@6wind.com> wrote:
>
> Le 09/10/2022 à 21:16, Eyal Birger a écrit :
> > The commit in the "Fixes" tag tried to avoid a case where policy check
> > is ignored due to dst caching in next hops.
> >
> > However, when the traffic is locally consumed, the dst may be cached
> > in a local TCP or UDP socket as part of early demux. In this case the
> > "disable_policy" flag is not checked as ip_route_input_noref() was only
> > called before caching, and thus, packets after the initial packet in a
> > flow will be dropped if not matching policies.
> >
> > Fix by checking the "disable_policy" flag also when a valid dst is
> > already available.
> >
> > Link: https://bugzilla.kernel.org/show_bug.cgi?id=216557
> > Reported-by: Monil Patel <monil191989@gmail.com>
> > Fixes: e6175a2ed1f1 ("xfrm: fix "disable_policy" flag use when arriving from different devices")
> > Signed-off-by: Eyal Birger <eyal.birger@gmail.com>
> >
>
> Is there the same problem with ipv6?
The issue is specific to IPv4 as the original fix was only relevant
to IPv4.
I also tested a similar scenario using IPv6 addresses and did not see
a problem.
Thanks!
Eyal.
^ permalink raw reply [flat|nested] 7+ messages in thread* Re: [PATCH ipsec,v2] xfrm: fix "disable_policy" on ipv4 early demux
2022-10-10 10:29 ` Eyal Birger
@ 2022-10-10 12:19 ` Nicolas Dichtel
2022-10-10 12:52 ` Eyal Birger
0 siblings, 1 reply; 7+ messages in thread
From: Nicolas Dichtel @ 2022-10-10 12:19 UTC (permalink / raw)
To: Eyal Birger
Cc: steffen.klassert, davem, yoshfuji, dsahern, edumazet, kuba,
pabeni, netdev, monil191989, stephen
Le 10/10/2022 à 12:29, Eyal Birger a écrit :
> Hi Nicolas,
>
> On Mon, Oct 10, 2022 at 11:28 AM Nicolas Dichtel
> <nicolas.dichtel@6wind.com> wrote:
>>
>> Le 09/10/2022 à 21:16, Eyal Birger a écrit :
>>> The commit in the "Fixes" tag tried to avoid a case where policy check
>>> is ignored due to dst caching in next hops.
>>>
>>> However, when the traffic is locally consumed, the dst may be cached
>>> in a local TCP or UDP socket as part of early demux. In this case the
>>> "disable_policy" flag is not checked as ip_route_input_noref() was only
>>> called before caching, and thus, packets after the initial packet in a
>>> flow will be dropped if not matching policies.
>>>
>>> Fix by checking the "disable_policy" flag also when a valid dst is
>>> already available.
>>>
>>> Link: https://bugzilla.kernel.org/show_bug.cgi?id=216557
>>> Reported-by: Monil Patel <monil191989@gmail.com>
>>> Fixes: e6175a2ed1f1 ("xfrm: fix "disable_policy" flag use when arriving from different devices")
>>> Signed-off-by: Eyal Birger <eyal.birger@gmail.com>
>>>
>>
>> Is there the same problem with ipv6?
>
> The issue is specific to IPv4 as the original fix was only relevant
> to IPv4.
>
> I also tested a similar scenario using IPv6 addresses and did not see
> a problem.
Thanks. Is it possible to write a selftest with this scenario?
Regards,
Nicolas
^ permalink raw reply [flat|nested] 7+ messages in thread* Re: [PATCH ipsec,v2] xfrm: fix "disable_policy" on ipv4 early demux
2022-10-10 12:19 ` Nicolas Dichtel
@ 2022-10-10 12:52 ` Eyal Birger
2022-10-10 13:15 ` Nicolas Dichtel
0 siblings, 1 reply; 7+ messages in thread
From: Eyal Birger @ 2022-10-10 12:52 UTC (permalink / raw)
To: nicolas.dichtel
Cc: steffen.klassert, davem, yoshfuji, dsahern, edumazet, kuba,
pabeni, netdev, monil191989, stephen
On Mon, Oct 10, 2022 at 3:19 PM Nicolas Dichtel
<nicolas.dichtel@6wind.com> wrote:
>
> Le 10/10/2022 à 12:29, Eyal Birger a écrit :
> > Hi Nicolas,
> >
> > On Mon, Oct 10, 2022 at 11:28 AM Nicolas Dichtel
> > <nicolas.dichtel@6wind.com> wrote:
> >>
> >> Le 09/10/2022 à 21:16, Eyal Birger a écrit :
> >>> The commit in the "Fixes" tag tried to avoid a case where policy check
> >>> is ignored due to dst caching in next hops.
> >>>
> >>> However, when the traffic is locally consumed, the dst may be cached
> >>> in a local TCP or UDP socket as part of early demux. In this case the
> >>> "disable_policy" flag is not checked as ip_route_input_noref() was only
> >>> called before caching, and thus, packets after the initial packet in a
> >>> flow will be dropped if not matching policies.
> >>>
> >>> Fix by checking the "disable_policy" flag also when a valid dst is
> >>> already available.
> >>>
> >>> Link: https://bugzilla.kernel.org/show_bug.cgi?id=216557
> >>> Reported-by: Monil Patel <monil191989@gmail.com>
> >>> Fixes: e6175a2ed1f1 ("xfrm: fix "disable_policy" flag use when arriving from different devices")
> >>> Signed-off-by: Eyal Birger <eyal.birger@gmail.com>
> >>>
> >>
> >> Is there the same problem with ipv6?
> >
> > The issue is specific to IPv4 as the original fix was only relevant
> > to IPv4.
> >
> > I also tested a similar scenario using IPv6 addresses and did not see
> > a problem.
> Thanks. Is it possible to write a selftest with this scenario?
I can add one targeting ipsec-next.
Do you perhaps know which is the current preferred flavor for such selftests
for ipsec - C or bash?
Eyal.
^ permalink raw reply [flat|nested] 7+ messages in thread* Re: [PATCH ipsec,v2] xfrm: fix "disable_policy" on ipv4 early demux
2022-10-10 12:52 ` Eyal Birger
@ 2022-10-10 13:15 ` Nicolas Dichtel
0 siblings, 0 replies; 7+ messages in thread
From: Nicolas Dichtel @ 2022-10-10 13:15 UTC (permalink / raw)
To: Eyal Birger
Cc: steffen.klassert, davem, yoshfuji, dsahern, edumazet, kuba,
pabeni, netdev, monil191989, stephen
Le 10/10/2022 à 14:52, Eyal Birger a écrit :
[snip]
>> Thanks. Is it possible to write a selftest with this scenario?
>
> I can add one targeting ipsec-next.
>
> Do you perhaps know which is the current preferred flavor for such selftests
> for ipsec - C or bash?
I would say bash.
There are a lot of examples here:
https://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec-next.git/tree/tools/testing/selftests/net
Regards,
Nicolas
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH ipsec,v2] xfrm: fix "disable_policy" on ipv4 early demux
2022-10-09 19:16 [PATCH ipsec,v2] xfrm: fix "disable_policy" on ipv4 early demux Eyal Birger
2022-10-10 8:28 ` Nicolas Dichtel
@ 2022-10-14 13:37 ` Steffen Klassert
1 sibling, 0 replies; 7+ messages in thread
From: Steffen Klassert @ 2022-10-14 13:37 UTC (permalink / raw)
To: Eyal Birger
Cc: davem, yoshfuji, dsahern, edumazet, kuba, pabeni, netdev,
monil191989, nicolas.dichtel, stephen
On Sun, Oct 09, 2022 at 10:16:43PM +0300, Eyal Birger wrote:
> The commit in the "Fixes" tag tried to avoid a case where policy check
> is ignored due to dst caching in next hops.
>
> However, when the traffic is locally consumed, the dst may be cached
> in a local TCP or UDP socket as part of early demux. In this case the
> "disable_policy" flag is not checked as ip_route_input_noref() was only
> called before caching, and thus, packets after the initial packet in a
> flow will be dropped if not matching policies.
>
> Fix by checking the "disable_policy" flag also when a valid dst is
> already available.
>
> Link: https://bugzilla.kernel.org/show_bug.cgi?id=216557
> Reported-by: Monil Patel <monil191989@gmail.com>
> Fixes: e6175a2ed1f1 ("xfrm: fix "disable_policy" flag use when arriving from different devices")
> Signed-off-by: Eyal Birger <eyal.birger@gmail.com>
Applied, thanks Eyal!
^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2022-10-14 13:37 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2022-10-09 19:16 [PATCH ipsec,v2] xfrm: fix "disable_policy" on ipv4 early demux Eyal Birger
2022-10-10 8:28 ` Nicolas Dichtel
2022-10-10 10:29 ` Eyal Birger
2022-10-10 12:19 ` Nicolas Dichtel
2022-10-10 12:52 ` Eyal Birger
2022-10-10 13:15 ` Nicolas Dichtel
2022-10-14 13:37 ` Steffen Klassert
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).