From: Nicolas Dichtel <nicolas.dichtel@6wind.com>
To: Roman Kapl <code@rkapl.cz>, Xin Long <lucien.xin@gmail.com>
Cc: network dev <netdev@vger.kernel.org>,
"David S . Miller" <davem@davemloft.net>,
Jiri Benc <jbenc@redhat.com>,
Pablo Neira Ayuso <pablo@netfilter.org>,
Eric Dumazet <edumazet@google.com>,
David Ahern <dsahern@gmail.com>, Thomas Graf <tgraf@suug.ch>
Subject: Re: [PATCH] net: make sure skb_dst is valid before using
Date: Wed, 24 Jan 2018 16:37:56 +0100 [thread overview]
Message-ID: <d192a769-e910-7671-fab3-fa919a4dda0e@6wind.com> (raw)
In-Reply-To: <e16acbac-ca0e-c03f-0783-063d5180cd77@rkapl.cz>
Le 24/01/2018 à 10:49, Roman Kapl a écrit :
> On 01/24/2018 10:16 AM, Xin Long wrote:
>> On Wed, Jan 24, 2018 at 6:42 AM, Roman Kapl <code@rkapl.cz> wrote:
>>> Tunnel devices often use skb_dst(skb)->ops, but ops are not implemented
>>> for metadata tunnel destinations. Use skb_valid_dst to check if skb_dst
>>> is a real (non-metadata) destination.
>>>
>>> Such packets can easily be crafted using tc tunnel_key actions or BPF
>>> and will crash the tunnels, as observed at least with sit, geneve and
>>> vxlan. Some of these tunnels are also intended to be used with metadata
>>> destinations, so this represents a loss of functionality.
>>>
>>> There might be more places with similar patterns, but sometimes it is
>>> hard to tell if metadata dst packets can reach them, so this patch is
>>> not exhaustive.
>> This patch is trying to fix a lot of places, and there may be more.
>> But all because of the lack of .update_pmtu or .neigh_lookup.
>> (dst_link_failure is safe, btw)
>>
>> Not sure if it will be better to add .update_pmtu, .neigh_lookup and
>> even .redirect for md_dst_ops, but just leave them empty ?
>> like fake_dst_ops in br_nf.
> That's what I was suggesting in the original mail. However, it might have slight
> impact on performance. Also it was not done when metadata destinations were
> originally added, was there any good reason?
>> Let's see other's opinions.
> Exactly.
I would prefer a patch that test if the handler is available. It would prevent
to have this bug again in the future. But I don't have a strong opinion about this.
But it would be nice to send a patch quickly, before the 4.15 release, to fix
this crash.
Thank you,
Nicolas
next prev parent reply other threads:[~2018-01-24 15:38 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-01-23 22:42 [PATCH] net: make sure skb_dst is valid before using Roman Kapl
2018-01-24 9:16 ` Xin Long
2018-01-24 9:49 ` Roman Kapl
2018-01-24 15:37 ` Nicolas Dichtel [this message]
2018-01-25 16:25 ` David Miller
2018-01-25 18:03 ` [PATCH net] net: don't call update_pmtu unconditionally Nicolas Dichtel
2018-01-25 18:08 ` David Ahern
2018-01-25 21:28 ` David Miller
2018-01-25 23:10 ` Nicolas Dichtel
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=d192a769-e910-7671-fab3-fa919a4dda0e@6wind.com \
--to=nicolas.dichtel@6wind.com \
--cc=code@rkapl.cz \
--cc=davem@davemloft.net \
--cc=dsahern@gmail.com \
--cc=edumazet@google.com \
--cc=jbenc@redhat.com \
--cc=lucien.xin@gmail.com \
--cc=netdev@vger.kernel.org \
--cc=pablo@netfilter.org \
--cc=tgraf@suug.ch \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).