* [PATCH v1 net 0/4] net: Support STP on bridge in non-root netns.
@ 2023-07-15 2:13 Kuniyuki Iwashima
2023-07-15 2:13 ` [PATCH v1 net 1/4] llc: Check netns in llc_dgram_match() Kuniyuki Iwashima
` (3 more replies)
0 siblings, 4 replies; 8+ messages in thread
From: Kuniyuki Iwashima @ 2023-07-15 2:13 UTC (permalink / raw)
To: David S. Miller, Eric Dumazet, Jakub Kicinski, Paolo Abeni,
Roopa Prabhu, Nikolay Aleksandrov
Cc: Eric W. Biederman, Harry Coin, Kuniyuki Iwashima,
Kuniyuki Iwashima, netdev
Currently, STP does not work in non-root netns as llc_rcv() drops
packets from non-root netns.
This series fixes it by making some protocol handlers netns-aware,
which are called from llc_rcv() as follows:
llc_rcv()
|
|- sap->rcv_func : registered by llc_sap_open()
|
| * functions : regsitered by register_8022_client()
| -> No in-kernel user call register_8022_client()
|
| * snap_rcv()
| |
| `- proto->rcvfunc() : registered by register_snap_client()
|
| * aarp_rcv() : drop packets from non-root netns
| * atalk_rcv() : drop packets from non-root netns
|
| * stp_pdu_rcv()
| |
| `- garp_protos[]->rcv() : registered by stp_proto_register()
|
| * garp_pdu_rcv() : netns-aware
| * br_stp_rcv() : netns-aware
|
|- llc_type_handlers[llc_pdu_type(skb) - 1]
|
| * llc_sap_handler() : NOT netns-aware (Patch 1)
| * llc_conn_handler() : NOT netns-aware (Patch 2)
|
`- llc_station_handler
* llc_station_rcv() : netns-aware
Patch 1 & 2 convert not-netns-aware functions and Patch 3 remove the
netns restriction in llc_rcv().
Note this series does not namespacify AF_LLC so that these patches
can be backported to stable tree (at least to 4.14.y) without conflicts.
Another series that adds netns support for AF_LLC will be targeted
to net-next later.
Kuniyuki Iwashima (4):
llc: Check netns in llc_dgram_match().
llc: Check netns in llc_estab_match() and llc_listener_match().
llc: Don't drop packet from non-root netns.
Revert "bridge: Add extack warning when enabling STP in netns."
include/net/llc_conn.h | 2 +-
net/bridge/br_stp_if.c | 3 ---
net/llc/af_llc.c | 2 +-
net/llc/llc_conn.c | 47 +++++++++++++++++++++++++-----------------
net/llc/llc_if.c | 2 +-
net/llc/llc_input.c | 3 ---
net/llc/llc_sap.c | 17 ++++++++-------
7 files changed, 41 insertions(+), 35 deletions(-)
--
2.30.2
^ permalink raw reply [flat|nested] 8+ messages in thread* [PATCH v1 net 1/4] llc: Check netns in llc_dgram_match(). 2023-07-15 2:13 [PATCH v1 net 0/4] net: Support STP on bridge in non-root netns Kuniyuki Iwashima @ 2023-07-15 2:13 ` Kuniyuki Iwashima 2023-07-18 10:34 ` Paolo Abeni 2023-07-15 2:13 ` [PATCH v1 net 2/4] llc: Check netns in llc_estab_match() and llc_listener_match() Kuniyuki Iwashima ` (2 subsequent siblings) 3 siblings, 1 reply; 8+ messages in thread From: Kuniyuki Iwashima @ 2023-07-15 2:13 UTC (permalink / raw) To: David S. Miller, Eric Dumazet, Jakub Kicinski, Paolo Abeni, Roopa Prabhu, Nikolay Aleksandrov Cc: Eric W. Biederman, Harry Coin, Kuniyuki Iwashima, Kuniyuki Iwashima, netdev We will remove this restriction in llc_rcv() in the following patch, which means that the protocol handler must be aware of netns. if (!net_eq(dev_net(dev), &init_net)) goto drop; llc_rcv() fetches llc_type_handlers[llc_pdu_type(skb) - 1] and calls it if not NULL. If the PDU type is LLC_DEST_SAP, llc_sap_handler() is called to pass skb to corresponding sockets. Then, we must look up a proper socket in the same netns with skb->dev. If the destination is a multicast address, llc_sap_handler() calls llc_sap_mcast(). It calculates a hash based on DSAP and skb->dev->ifindex, iterates on a socket list, and calls llc_mcast_match() to check if the socket is the correct destination. Then, llc_mcast_match() checks if skb->dev matches with llc_sk(sk)->dev. So, we need not check netns here. OTOH, if the destination is a unicast address, llc_sap_handler() calls llc_lookup_dgram() to look up a socket, but it does not check the netns. Therefore, we need to add netns check in llc_lookup_dgram(). Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com> --- net/llc/llc_sap.c | 17 ++++++++++------- 1 file changed, 10 insertions(+), 7 deletions(-) diff --git a/net/llc/llc_sap.c b/net/llc/llc_sap.c index 6805ce43a055..5c83fca3acd5 100644 --- a/net/llc/llc_sap.c +++ b/net/llc/llc_sap.c @@ -294,13 +294,15 @@ static void llc_sap_rcv(struct llc_sap *sap, struct sk_buff *skb, static inline bool llc_dgram_match(const struct llc_sap *sap, const struct llc_addr *laddr, - const struct sock *sk) + const struct sock *sk, + const struct net *net) { struct llc_sock *llc = llc_sk(sk); return sk->sk_type == SOCK_DGRAM && - llc->laddr.lsap == laddr->lsap && - ether_addr_equal(llc->laddr.mac, laddr->mac); + net_eq(sock_net(sk), net) && + llc->laddr.lsap == laddr->lsap && + ether_addr_equal(llc->laddr.mac, laddr->mac); } /** @@ -312,7 +314,8 @@ static inline bool llc_dgram_match(const struct llc_sap *sap, * mac, and local sap. Returns pointer for socket found, %NULL otherwise. */ static struct sock *llc_lookup_dgram(struct llc_sap *sap, - const struct llc_addr *laddr) + const struct llc_addr *laddr, + const struct net *net) { struct sock *rc; struct hlist_nulls_node *node; @@ -322,12 +325,12 @@ static struct sock *llc_lookup_dgram(struct llc_sap *sap, rcu_read_lock_bh(); again: sk_nulls_for_each_rcu(rc, node, laddr_hb) { - if (llc_dgram_match(sap, laddr, rc)) { + if (llc_dgram_match(sap, laddr, rc, net)) { /* Extra checks required by SLAB_TYPESAFE_BY_RCU */ if (unlikely(!refcount_inc_not_zero(&rc->sk_refcnt))) goto again; if (unlikely(llc_sk(rc)->sap != sap || - !llc_dgram_match(sap, laddr, rc))) { + !llc_dgram_match(sap, laddr, rc, net))) { sock_put(rc); continue; } @@ -429,7 +432,7 @@ void llc_sap_handler(struct llc_sap *sap, struct sk_buff *skb) llc_sap_mcast(sap, &laddr, skb); kfree_skb(skb); } else { - struct sock *sk = llc_lookup_dgram(sap, &laddr); + struct sock *sk = llc_lookup_dgram(sap, &laddr, dev_net(skb->dev)); if (sk) { llc_sap_rcv(sap, skb, sk); sock_put(sk); -- 2.30.2 ^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: [PATCH v1 net 1/4] llc: Check netns in llc_dgram_match(). 2023-07-15 2:13 ` [PATCH v1 net 1/4] llc: Check netns in llc_dgram_match() Kuniyuki Iwashima @ 2023-07-18 10:34 ` Paolo Abeni 2023-07-18 17:24 ` Kuniyuki Iwashima 0 siblings, 1 reply; 8+ messages in thread From: Paolo Abeni @ 2023-07-18 10:34 UTC (permalink / raw) To: Kuniyuki Iwashima, David S. Miller, Eric Dumazet, Jakub Kicinski, Roopa Prabhu, Nikolay Aleksandrov Cc: Eric W. Biederman, Harry Coin, Kuniyuki Iwashima, netdev Hi, the series LGTM, I have only a couple of (very) minor nit, see below... On Fri, 2023-07-14 at 19:13 -0700, Kuniyuki Iwashima wrote: > We will remove this restriction in llc_rcv() in the following patch, s/following patch/soon/, as the following patch will not do that ;) > which means that the protocol handler must be aware of netns. > > if (!net_eq(dev_net(dev), &init_net)) > goto drop; > > llc_rcv() fetches llc_type_handlers[llc_pdu_type(skb) - 1] and calls it > if not NULL. > > If the PDU type is LLC_DEST_SAP, llc_sap_handler() is called to pass skb > to corresponding sockets. Then, we must look up a proper socket in the > same netns with skb->dev. > > If the destination is a multicast address, llc_sap_handler() calls > llc_sap_mcast(). It calculates a hash based on DSAP and skb->dev->ifindex, > iterates on a socket list, and calls llc_mcast_match() to check if the > socket is the correct destination. Then, llc_mcast_match() checks if > skb->dev matches with llc_sk(sk)->dev. So, we need not check netns here. > > OTOH, if the destination is a unicast address, llc_sap_handler() calls > llc_lookup_dgram() to look up a socket, but it does not check the netns. > > Therefore, we need to add netns check in llc_lookup_dgram(). > > Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com> > --- > net/llc/llc_sap.c | 17 ++++++++++------- > 1 file changed, 10 insertions(+), 7 deletions(-) > > diff --git a/net/llc/llc_sap.c b/net/llc/llc_sap.c > index 6805ce43a055..5c83fca3acd5 100644 > --- a/net/llc/llc_sap.c > +++ b/net/llc/llc_sap.c > @@ -294,13 +294,15 @@ static void llc_sap_rcv(struct llc_sap *sap, struct sk_buff *skb, > > static inline bool llc_dgram_match(const struct llc_sap *sap, > const struct llc_addr *laddr, > - const struct sock *sk) > + const struct sock *sk, > + const struct net *net) > { > struct llc_sock *llc = llc_sk(sk); > > return sk->sk_type == SOCK_DGRAM && > - llc->laddr.lsap == laddr->lsap && > - ether_addr_equal(llc->laddr.mac, laddr->mac); > + net_eq(sock_net(sk), net) && > + llc->laddr.lsap == laddr->lsap && > + ether_addr_equal(llc->laddr.mac, laddr->mac); > } > > /** > @@ -312,7 +314,8 @@ static inline bool llc_dgram_match(const struct llc_sap *sap, > * mac, and local sap. Returns pointer for socket found, %NULL otherwise. > */ As this function has doxygen documentation, you should additionally document the 'net' argument. Thanks, Paolo ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH v1 net 1/4] llc: Check netns in llc_dgram_match(). 2023-07-18 10:34 ` Paolo Abeni @ 2023-07-18 17:24 ` Kuniyuki Iwashima 0 siblings, 0 replies; 8+ messages in thread From: Kuniyuki Iwashima @ 2023-07-18 17:24 UTC (permalink / raw) To: pabeni Cc: davem, ebiederm, edumazet, hcoin, kuba, kuni1840, kuniyu, netdev, razor, roopa From: Paolo Abeni <pabeni@redhat.com> Date: Tue, 18 Jul 2023 12:34:47 +0200 > Hi, > > the series LGTM, I have only a couple of (very) minor nit, see below... > > On Fri, 2023-07-14 at 19:13 -0700, Kuniyuki Iwashima wrote: > > We will remove this restriction in llc_rcv() in the following patch, > > s/following patch/soon/, as the following patch will not do that ;) Exactly, will fix :) > > > which means that the protocol handler must be aware of netns. > > > > if (!net_eq(dev_net(dev), &init_net)) > > goto drop; > > > > llc_rcv() fetches llc_type_handlers[llc_pdu_type(skb) - 1] and calls it > > if not NULL. > > > > If the PDU type is LLC_DEST_SAP, llc_sap_handler() is called to pass skb > > to corresponding sockets. Then, we must look up a proper socket in the > > same netns with skb->dev. > > > > If the destination is a multicast address, llc_sap_handler() calls > > llc_sap_mcast(). It calculates a hash based on DSAP and skb->dev->ifindex, > > iterates on a socket list, and calls llc_mcast_match() to check if the > > socket is the correct destination. Then, llc_mcast_match() checks if > > skb->dev matches with llc_sk(sk)->dev. So, we need not check netns here. > > > > OTOH, if the destination is a unicast address, llc_sap_handler() calls > > llc_lookup_dgram() to look up a socket, but it does not check the netns. > > > > Therefore, we need to add netns check in llc_lookup_dgram(). > > > > Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com> > > --- > > net/llc/llc_sap.c | 17 ++++++++++------- > > 1 file changed, 10 insertions(+), 7 deletions(-) > > > > diff --git a/net/llc/llc_sap.c b/net/llc/llc_sap.c > > index 6805ce43a055..5c83fca3acd5 100644 > > --- a/net/llc/llc_sap.c > > +++ b/net/llc/llc_sap.c > > @@ -294,13 +294,15 @@ static void llc_sap_rcv(struct llc_sap *sap, struct sk_buff *skb, > > > > static inline bool llc_dgram_match(const struct llc_sap *sap, > > const struct llc_addr *laddr, > > - const struct sock *sk) > > + const struct sock *sk, > > + const struct net *net) > > { > > struct llc_sock *llc = llc_sk(sk); > > > > return sk->sk_type == SOCK_DGRAM && > > - llc->laddr.lsap == laddr->lsap && > > - ether_addr_equal(llc->laddr.mac, laddr->mac); > > + net_eq(sock_net(sk), net) && > > + llc->laddr.lsap == laddr->lsap && > > + ether_addr_equal(llc->laddr.mac, laddr->mac); > > } > > > > /** > > @@ -312,7 +314,8 @@ static inline bool llc_dgram_match(const struct llc_sap *sap, > > * mac, and local sap. Returns pointer for socket found, %NULL otherwise. > > */ > > As this function has doxygen documentation, you should additionally > document the 'net' argument. And will fix this and the same miss in patch 2. Thanks for catching this! > > Thanks, > > Paolo ^ permalink raw reply [flat|nested] 8+ messages in thread
* [PATCH v1 net 2/4] llc: Check netns in llc_estab_match() and llc_listener_match(). 2023-07-15 2:13 [PATCH v1 net 0/4] net: Support STP on bridge in non-root netns Kuniyuki Iwashima 2023-07-15 2:13 ` [PATCH v1 net 1/4] llc: Check netns in llc_dgram_match() Kuniyuki Iwashima @ 2023-07-15 2:13 ` Kuniyuki Iwashima 2023-07-18 10:38 ` Paolo Abeni 2023-07-15 2:13 ` [PATCH v1 net 3/4] llc: Don't drop packet from non-root netns Kuniyuki Iwashima 2023-07-15 2:13 ` [PATCH v1 net 4/4] Revert "bridge: Add extack warning when enabling STP in netns." Kuniyuki Iwashima 3 siblings, 1 reply; 8+ messages in thread From: Kuniyuki Iwashima @ 2023-07-15 2:13 UTC (permalink / raw) To: David S. Miller, Eric Dumazet, Jakub Kicinski, Paolo Abeni, Roopa Prabhu, Nikolay Aleksandrov Cc: Eric W. Biederman, Harry Coin, Kuniyuki Iwashima, Kuniyuki Iwashima, netdev We will remove this restriction in llc_rcv() in the following patch, which means that the protocol handler must be aware of netns. if (!net_eq(dev_net(dev), &init_net)) goto drop; llc_rcv() fetches llc_type_handlers[llc_pdu_type(skb) - 1] and calls it if not NULL. If the PDU type is LLC_DEST_CONN, llc_conn_handler() is called to pass skb to corresponding sockets. Then, we must look up a proper socket in the same netns with skb->dev. llc_conn_handler() calls __llc_lookup() to look up a established or litening socket by __llc_lookup_established() and llc_lookup_listener(). Both functions iterate on a list and call llc_estab_match() or llc_listener_match() to check if the socket is the correct destination. However, these functions do not check netns. Also, bind() and connect() call llc_establish_connection(), which finally calls __llc_lookup_established(), to check if there is a conflicting socket. Let's test netns in llc_estab_match() and llc_listener_match(). Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com> --- include/net/llc_conn.h | 2 +- net/llc/af_llc.c | 2 +- net/llc/llc_conn.c | 47 +++++++++++++++++++++++++----------------- net/llc/llc_if.c | 2 +- 4 files changed, 31 insertions(+), 22 deletions(-) diff --git a/include/net/llc_conn.h b/include/net/llc_conn.h index 2c1ea3414640..374411b3066c 100644 --- a/include/net/llc_conn.h +++ b/include/net/llc_conn.h @@ -111,7 +111,7 @@ void llc_conn_resend_i_pdu_as_cmd(struct sock *sk, u8 nr, u8 first_p_bit); void llc_conn_resend_i_pdu_as_rsp(struct sock *sk, u8 nr, u8 first_f_bit); int llc_conn_remove_acked_pdus(struct sock *conn, u8 nr, u16 *how_many_unacked); struct sock *llc_lookup_established(struct llc_sap *sap, struct llc_addr *daddr, - struct llc_addr *laddr); + struct llc_addr *laddr, const struct net *net); void llc_sap_add_socket(struct llc_sap *sap, struct sock *sk); void llc_sap_remove_socket(struct llc_sap *sap, struct sock *sk); diff --git a/net/llc/af_llc.c b/net/llc/af_llc.c index 57c35c960b2c..9b06c380866b 100644 --- a/net/llc/af_llc.c +++ b/net/llc/af_llc.c @@ -402,7 +402,7 @@ static int llc_ui_bind(struct socket *sock, struct sockaddr *uaddr, int addrlen) memcpy(laddr.mac, addr->sllc_mac, IFHWADDRLEN); laddr.lsap = addr->sllc_sap; rc = -EADDRINUSE; /* mac + sap clash. */ - ask = llc_lookup_established(sap, &daddr, &laddr); + ask = llc_lookup_established(sap, &daddr, &laddr, &init_net); if (ask) { sock_put(ask); goto out_put; diff --git a/net/llc/llc_conn.c b/net/llc/llc_conn.c index 912aa9bd5e29..6371c1b903d4 100644 --- a/net/llc/llc_conn.c +++ b/net/llc/llc_conn.c @@ -453,11 +453,13 @@ static int llc_exec_conn_trans_actions(struct sock *sk, static inline bool llc_estab_match(const struct llc_sap *sap, const struct llc_addr *daddr, const struct llc_addr *laddr, - const struct sock *sk) + const struct sock *sk, + const struct net *net) { struct llc_sock *llc = llc_sk(sk); - return llc->laddr.lsap == laddr->lsap && + return net_eq(sock_net(sk), net) && + llc->laddr.lsap == laddr->lsap && llc->daddr.lsap == daddr->lsap && ether_addr_equal(llc->laddr.mac, laddr->mac) && ether_addr_equal(llc->daddr.mac, daddr->mac); @@ -476,7 +478,8 @@ static inline bool llc_estab_match(const struct llc_sap *sap, */ static struct sock *__llc_lookup_established(struct llc_sap *sap, struct llc_addr *daddr, - struct llc_addr *laddr) + struct llc_addr *laddr, + const struct net *net) { struct sock *rc; struct hlist_nulls_node *node; @@ -486,12 +489,12 @@ static struct sock *__llc_lookup_established(struct llc_sap *sap, rcu_read_lock(); again: sk_nulls_for_each_rcu(rc, node, laddr_hb) { - if (llc_estab_match(sap, daddr, laddr, rc)) { + if (llc_estab_match(sap, daddr, laddr, rc, net)) { /* Extra checks required by SLAB_TYPESAFE_BY_RCU */ if (unlikely(!refcount_inc_not_zero(&rc->sk_refcnt))) goto again; if (unlikely(llc_sk(rc)->sap != sap || - !llc_estab_match(sap, daddr, laddr, rc))) { + !llc_estab_match(sap, daddr, laddr, rc, net))) { sock_put(rc); continue; } @@ -513,29 +516,33 @@ static struct sock *__llc_lookup_established(struct llc_sap *sap, struct sock *llc_lookup_established(struct llc_sap *sap, struct llc_addr *daddr, - struct llc_addr *laddr) + struct llc_addr *laddr, + const struct net *net) { struct sock *sk; local_bh_disable(); - sk = __llc_lookup_established(sap, daddr, laddr); + sk = __llc_lookup_established(sap, daddr, laddr, net); local_bh_enable(); return sk; } static inline bool llc_listener_match(const struct llc_sap *sap, const struct llc_addr *laddr, - const struct sock *sk) + const struct sock *sk, + const struct net *net) { struct llc_sock *llc = llc_sk(sk); - return sk->sk_type == SOCK_STREAM && sk->sk_state == TCP_LISTEN && + return net_eq(sock_net(sk), net) && + sk->sk_type == SOCK_STREAM && sk->sk_state == TCP_LISTEN && llc->laddr.lsap == laddr->lsap && ether_addr_equal(llc->laddr.mac, laddr->mac); } static struct sock *__llc_lookup_listener(struct llc_sap *sap, - struct llc_addr *laddr) + struct llc_addr *laddr, + const struct net *net) { struct sock *rc; struct hlist_nulls_node *node; @@ -545,12 +552,12 @@ static struct sock *__llc_lookup_listener(struct llc_sap *sap, rcu_read_lock(); again: sk_nulls_for_each_rcu(rc, node, laddr_hb) { - if (llc_listener_match(sap, laddr, rc)) { + if (llc_listener_match(sap, laddr, rc, net)) { /* Extra checks required by SLAB_TYPESAFE_BY_RCU */ if (unlikely(!refcount_inc_not_zero(&rc->sk_refcnt))) goto again; if (unlikely(llc_sk(rc)->sap != sap || - !llc_listener_match(sap, laddr, rc))) { + !llc_listener_match(sap, laddr, rc, net))) { sock_put(rc); continue; } @@ -581,24 +588,26 @@ static struct sock *__llc_lookup_listener(struct llc_sap *sap, * Caller has to make sure local_bh is disabled. */ static struct sock *llc_lookup_listener(struct llc_sap *sap, - struct llc_addr *laddr) + struct llc_addr *laddr, + const struct net *net) { + struct sock *rc = __llc_lookup_listener(sap, laddr, net); static struct llc_addr null_addr; - struct sock *rc = __llc_lookup_listener(sap, laddr); if (!rc) - rc = __llc_lookup_listener(sap, &null_addr); + rc = __llc_lookup_listener(sap, &null_addr, net); return rc; } static struct sock *__llc_lookup(struct llc_sap *sap, struct llc_addr *daddr, - struct llc_addr *laddr) + struct llc_addr *laddr, + const struct net *net) { - struct sock *sk = __llc_lookup_established(sap, daddr, laddr); + struct sock *sk = __llc_lookup_established(sap, daddr, laddr, net); - return sk ? : llc_lookup_listener(sap, laddr); + return sk ? : llc_lookup_listener(sap, laddr, net); } /** @@ -776,7 +785,7 @@ void llc_conn_handler(struct llc_sap *sap, struct sk_buff *skb) llc_pdu_decode_da(skb, daddr.mac); llc_pdu_decode_dsap(skb, &daddr.lsap); - sk = __llc_lookup(sap, &saddr, &daddr); + sk = __llc_lookup(sap, &saddr, &daddr, dev_net(skb->dev)); if (!sk) goto drop; diff --git a/net/llc/llc_if.c b/net/llc/llc_if.c index dde9bf08a593..58a5f419adc6 100644 --- a/net/llc/llc_if.c +++ b/net/llc/llc_if.c @@ -92,7 +92,7 @@ int llc_establish_connection(struct sock *sk, const u8 *lmac, u8 *dmac, u8 dsap) daddr.lsap = dsap; memcpy(daddr.mac, dmac, sizeof(daddr.mac)); memcpy(laddr.mac, lmac, sizeof(laddr.mac)); - existing = llc_lookup_established(llc->sap, &daddr, &laddr); + existing = llc_lookup_established(llc->sap, &daddr, &laddr, sock_net(sk)); if (existing) { if (existing->sk_state == TCP_ESTABLISHED) { sk = existing; -- 2.30.2 ^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: [PATCH v1 net 2/4] llc: Check netns in llc_estab_match() and llc_listener_match(). 2023-07-15 2:13 ` [PATCH v1 net 2/4] llc: Check netns in llc_estab_match() and llc_listener_match() Kuniyuki Iwashima @ 2023-07-18 10:38 ` Paolo Abeni 0 siblings, 0 replies; 8+ messages in thread From: Paolo Abeni @ 2023-07-18 10:38 UTC (permalink / raw) To: Kuniyuki Iwashima, David S. Miller, Eric Dumazet, Jakub Kicinski, Roopa Prabhu, Nikolay Aleksandrov Cc: Eric W. Biederman, Harry Coin, Kuniyuki Iwashima, netdev On Fri, 2023-07-14 at 19:13 -0700, Kuniyuki Iwashima wrote: > @@ -476,7 +478,8 @@ static inline bool llc_estab_match(const struct llc_sap *sap, > */ > static struct sock *__llc_lookup_established(struct llc_sap *sap, > struct llc_addr *daddr, > - struct llc_addr *laddr) > + struct llc_addr *laddr, > + const struct net *net) You should add 'net' to the doxygen documentation. > { > struct sock *rc; > struct hlist_nulls_node *node; [...] > @@ -581,24 +588,26 @@ static struct sock *__llc_lookup_listener(struct llc_sap *sap, > * Caller has to make sure local_bh is disabled. > */ > static struct sock *llc_lookup_listener(struct llc_sap *sap, > - struct llc_addr *laddr) > + struct llc_addr *laddr, > + const struct net *net) Same here. Thanks! Paolo ^ permalink raw reply [flat|nested] 8+ messages in thread
* [PATCH v1 net 3/4] llc: Don't drop packet from non-root netns. 2023-07-15 2:13 [PATCH v1 net 0/4] net: Support STP on bridge in non-root netns Kuniyuki Iwashima 2023-07-15 2:13 ` [PATCH v1 net 1/4] llc: Check netns in llc_dgram_match() Kuniyuki Iwashima 2023-07-15 2:13 ` [PATCH v1 net 2/4] llc: Check netns in llc_estab_match() and llc_listener_match() Kuniyuki Iwashima @ 2023-07-15 2:13 ` Kuniyuki Iwashima 2023-07-15 2:13 ` [PATCH v1 net 4/4] Revert "bridge: Add extack warning when enabling STP in netns." Kuniyuki Iwashima 3 siblings, 0 replies; 8+ messages in thread From: Kuniyuki Iwashima @ 2023-07-15 2:13 UTC (permalink / raw) To: David S. Miller, Eric Dumazet, Jakub Kicinski, Paolo Abeni, Roopa Prabhu, Nikolay Aleksandrov Cc: Eric W. Biederman, Harry Coin, Kuniyuki Iwashima, Kuniyuki Iwashima, netdev Now these upper layer protocol handlers can be called from llc_rcv() as sap->rcv_func(), which is registered by llc_sap_open(). * function which is passed to register_8022_client() -> no in-kernel user calls register_8022_client(). * snap_rcv() `- proto->rcvfunc() : registered by register_snap_client() -> aarp_rcv() and atalk_rcv() drop packets from non-root netns * stp_pdu_rcv() `- garp_protos[]->rcv() : registered by stp_proto_register() -> garp_pdu_rcv() and br_stp_rcv() are netns-aware So, we can safely remove the netns restriction in llc_rcv(). Fixes: e730c15519d0 ("[NET]: Make packet reception network namespace safe") Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com> --- net/llc/llc_input.c | 3 --- 1 file changed, 3 deletions(-) diff --git a/net/llc/llc_input.c b/net/llc/llc_input.c index c309b72a5877..7cac441862e2 100644 --- a/net/llc/llc_input.c +++ b/net/llc/llc_input.c @@ -163,9 +163,6 @@ int llc_rcv(struct sk_buff *skb, struct net_device *dev, void (*sta_handler)(struct sk_buff *skb); void (*sap_handler)(struct llc_sap *sap, struct sk_buff *skb); - if (!net_eq(dev_net(dev), &init_net)) - goto drop; - /* * When the interface is in promisc. mode, drop all the crap that it * receives, do not try to analyse it. -- 2.30.2 ^ permalink raw reply related [flat|nested] 8+ messages in thread
* [PATCH v1 net 4/4] Revert "bridge: Add extack warning when enabling STP in netns." 2023-07-15 2:13 [PATCH v1 net 0/4] net: Support STP on bridge in non-root netns Kuniyuki Iwashima ` (2 preceding siblings ...) 2023-07-15 2:13 ` [PATCH v1 net 3/4] llc: Don't drop packet from non-root netns Kuniyuki Iwashima @ 2023-07-15 2:13 ` Kuniyuki Iwashima 3 siblings, 0 replies; 8+ messages in thread From: Kuniyuki Iwashima @ 2023-07-15 2:13 UTC (permalink / raw) To: David S. Miller, Eric Dumazet, Jakub Kicinski, Paolo Abeni, Roopa Prabhu, Nikolay Aleksandrov Cc: Eric W. Biederman, Harry Coin, Kuniyuki Iwashima, Kuniyuki Iwashima, netdev This reverts commit 56a16035bb6effb37177867cea94c13a8382f745. Since the previous commit, STP works on bridge in netns. # unshare -n # ip link add br0 type bridge # ip link add veth0 type veth peer name veth1 # ip link set veth0 master br0 up [ 50.558135] br0: port 1(veth0) entered blocking state [ 50.558366] br0: port 1(veth0) entered disabled state [ 50.558798] veth0: entered allmulticast mode [ 50.564401] veth0: entered promiscuous mode # ip link set veth1 master br0 up [ 54.215487] br0: port 2(veth1) entered blocking state [ 54.215657] br0: port 2(veth1) entered disabled state [ 54.215848] veth1: entered allmulticast mode [ 54.219577] veth1: entered promiscuous mode # ip link set br0 type bridge stp_state 1 # ip link set br0 up [ 61.960726] br0: port 2(veth1) entered blocking state [ 61.961097] br0: port 2(veth1) entered listening state [ 61.961495] br0: port 1(veth0) entered blocking state [ 61.961653] br0: port 1(veth0) entered listening state [ 63.998835] br0: port 2(veth1) entered blocking state [ 77.437113] br0: port 1(veth0) entered learning state [ 86.653501] br0: received packet on veth0 with own address as source address (addr:6e:0f:e7:6f:5f:5f, vlan:0) [ 92.797095] br0: port 1(veth0) entered forwarding state [ 92.797398] br0: topology change detected, propagating Let's remove the warning. Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com> --- net/bridge/br_stp_if.c | 3 --- 1 file changed, 3 deletions(-) diff --git a/net/bridge/br_stp_if.c b/net/bridge/br_stp_if.c index b65962682771..75204d36d7f9 100644 --- a/net/bridge/br_stp_if.c +++ b/net/bridge/br_stp_if.c @@ -201,9 +201,6 @@ int br_stp_set_enabled(struct net_bridge *br, unsigned long val, { ASSERT_RTNL(); - if (!net_eq(dev_net(br->dev), &init_net)) - NL_SET_ERR_MSG_MOD(extack, "STP does not work in non-root netns"); - if (br_mrp_enabled(br)) { NL_SET_ERR_MSG_MOD(extack, "STP can't be enabled if MRP is already enabled"); -- 2.30.2 ^ permalink raw reply related [flat|nested] 8+ messages in thread
end of thread, other threads:[~2023-07-18 17:25 UTC | newest] Thread overview: 8+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2023-07-15 2:13 [PATCH v1 net 0/4] net: Support STP on bridge in non-root netns Kuniyuki Iwashima 2023-07-15 2:13 ` [PATCH v1 net 1/4] llc: Check netns in llc_dgram_match() Kuniyuki Iwashima 2023-07-18 10:34 ` Paolo Abeni 2023-07-18 17:24 ` Kuniyuki Iwashima 2023-07-15 2:13 ` [PATCH v1 net 2/4] llc: Check netns in llc_estab_match() and llc_listener_match() Kuniyuki Iwashima 2023-07-18 10:38 ` Paolo Abeni 2023-07-15 2:13 ` [PATCH v1 net 3/4] llc: Don't drop packet from non-root netns Kuniyuki Iwashima 2023-07-15 2:13 ` [PATCH v1 net 4/4] Revert "bridge: Add extack warning when enabling STP in netns." Kuniyuki Iwashima
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).