Netdev List
 help / color / mirror / Atom feed
From: Ilya Maximets <i.maximets@ovn.org>
To: Ren Wei <n05ec@lzu.edu.cn>, netdev@vger.kernel.org, dev@openvswitch.org
Cc: i.maximets@ovn.org, aconole@redhat.com, echaudro@redhat.com,
	davem@davemloft.net, edumazet@google.com, kuba@kernel.org,
	pabeni@redhat.com, horms@kernel.org, jbenc@redhat.com, e@erig.me,
	yi.y.yang@intel.com, yuantan098@gmail.com, yifanwucs@gmail.com,
	tomapufckgml@gmail.com, bird@lzu.edu.cn, ldy3087146292@gmail.com
Subject: Re: [PATCH net 1/1] openvswitch: reject oversized NSH MD2 metadata in push_nsh
Date: Thu, 7 May 2026 14:06:30 +0200	[thread overview]
Message-ID: <c81f54bd-db80-4977-978e-b34e420c477e@ovn.org> (raw)
In-Reply-To: <9c1f6c24-3641-4bef-aad7-8f276def50a8@ovn.org>

On 4/25/26 10:19 PM, Ilya Maximets wrote:
> On 4/25/26 6:40 PM, Ren Wei wrote:
>> From: Douya Le <ldy3087146292@gmail.com>
>>
>> The NSH header length is encoded in 4-byte words in a 6-bit field.
>> The current push_nsh validation only checks the MD2 payload against
>> NSH_CTX_HDRS_MAX_LEN, which still allows metadata sizes that cannot be
>> represented once the base header is included.
>>
>> Reject MD2 metadata lengths whose total NSH header size cannot be
>> encoded exactly in the NSH length field, whether because the field
>> would wrap or because the length is not a multiple of 4 bytes.
>>
>> Fixes: b2d0f5d5dc53 ("openvswitch: enable NSH support")
>> Cc: stable@kernel.org
>> Reported-by: Yuan Tan <yuantan098@gmail.com>
>> Reported-by: Yifan Wu <yifanwucs@gmail.com>
>> Reported-by: Juefei Pu <tomapufckgml@gmail.com>
>> Reported-by: Xin Liu <bird@lzu.edu.cn>
>> Tested-by: Douya Le <ldy3087146292@gmail.com>
>> Signed-off-by: Douya Le <ldy3087146292@gmail.com>
>> Signed-off-by: Ren Wei <n05ec@lzu.edu.cn>
>> ---
>>  net/openvswitch/flow_netlink.c | 8 +++++++-
>>  1 file changed, 7 insertions(+), 1 deletion(-)
>>
>> diff --git a/net/openvswitch/flow_netlink.c b/net/openvswitch/flow_netlink.c
>> index 13052408a132..8a1ae5309c2c 100644
>> --- a/net/openvswitch/flow_netlink.c
>> +++ b/net/openvswitch/flow_netlink.c
>> @@ -1432,7 +1432,13 @@ static int nsh_key_put_from_nlattr(const struct nlattr *attr,
>>  
>>  			has_md2 = true;
>>  			mdlen = nla_len(a);
>> -			if (mdlen > NSH_CTX_HDRS_MAX_LEN || mdlen <= 0) {
>> +			/* The NSH length field stores the total header size
>> +			 * in 4-byte words in 6 bits. Reject MD2 metadata
>> +			 * lengths that cannot be encoded exactly or would
>> +			 * make the length field wrap.
>> +			 */
>> +			if (mdlen <= 0 || !IS_ALIGNED(mdlen, 4) ||
>> +			    NSH_BASE_HDR_LEN + mdlen > (NSH_LEN_MASK << 2)) {
>>  				OVS_NLERR(
>>  				    log,
>>  				    "Invalid MD length %d for MD type %d",
> 
> I don't think the check is a problem here, the problem is that the constants
> are not correct.  We actually had them fixed in userspace, but looks like
> no-one ported the change to the kernel side:
>   https://patchwork.ozlabs.org/project/openvswitch/patch/1540503710-23597-1-git-send-email-pkusunyifeng@gmail.com/
> 
> Adjusting the macros should solve the potential overflow issue.  However,
> even if the value overflows the 6-bit length, it will just be truncated to
> a smaller value and nothing bad should happen in this case, as far as header
> push is concerned.  The context was wrong already, so pushing a truncated
> context doesn't make it more wrong.  But we should still fix the constants,
> so the checks make sense, of course.

I posted a fix for the macros here:
  https://lore.kernel.org/netdev/20260507120434.2962505-1-i.maximets@ovn.org/T/#u

> 
> The same for alignment, if the user provides an invalid header that is not
> multiple of 4, the code will just truncate it to the previous multiple of 4,
> which should not be a problem, as it wasn't correct in the first place.  We
> could add this check just to warn the user that they are doing something wrong,
> but not having it should not cause any real issues.
> 
> Note, the userpace change linked above did fix the real issue in userspace,
> but for the kernel side there seem to be no real memory related issues caused
> by the wrong constants.
> 
> Best regards, Ilya Maximets.


      reply	other threads:[~2026-05-07 12:06 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <cover.1776929256.git.ldy3087146292@gmail.com>
2026-04-25 16:40 ` [PATCH net 1/1] openvswitch: reject oversized NSH MD2 metadata in push_nsh Ren Wei
2026-04-25 20:19   ` Ilya Maximets
2026-05-07 12:06     ` Ilya Maximets [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=c81f54bd-db80-4977-978e-b34e420c477e@ovn.org \
    --to=i.maximets@ovn.org \
    --cc=aconole@redhat.com \
    --cc=bird@lzu.edu.cn \
    --cc=davem@davemloft.net \
    --cc=dev@openvswitch.org \
    --cc=e@erig.me \
    --cc=echaudro@redhat.com \
    --cc=edumazet@google.com \
    --cc=horms@kernel.org \
    --cc=jbenc@redhat.com \
    --cc=kuba@kernel.org \
    --cc=ldy3087146292@gmail.com \
    --cc=n05ec@lzu.edu.cn \
    --cc=netdev@vger.kernel.org \
    --cc=pabeni@redhat.com \
    --cc=tomapufckgml@gmail.com \
    --cc=yi.y.yang@intel.com \
    --cc=yifanwucs@gmail.com \
    --cc=yuantan098@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox