* [PATCH v1 net 0/4] net: Support STP on bridge in non-root netns.
@ 2023-07-15 2:13 Kuniyuki Iwashima
2023-07-15 2:13 ` [PATCH v1 net 1/4] llc: Check netns in llc_dgram_match() Kuniyuki Iwashima
` (3 more replies)
0 siblings, 4 replies; 8+ messages in thread
From: Kuniyuki Iwashima @ 2023-07-15 2:13 UTC (permalink / raw)
To: David S. Miller, Eric Dumazet, Jakub Kicinski, Paolo Abeni,
Roopa Prabhu, Nikolay Aleksandrov
Cc: Eric W. Biederman, Harry Coin, Kuniyuki Iwashima,
Kuniyuki Iwashima, netdev
Currently, STP does not work in non-root netns as llc_rcv() drops
packets from non-root netns.
This series fixes it by making some protocol handlers netns-aware,
which are called from llc_rcv() as follows:
llc_rcv()
|
|- sap->rcv_func : registered by llc_sap_open()
|
| * functions : regsitered by register_8022_client()
| -> No in-kernel user call register_8022_client()
|
| * snap_rcv()
| |
| `- proto->rcvfunc() : registered by register_snap_client()
|
| * aarp_rcv() : drop packets from non-root netns
| * atalk_rcv() : drop packets from non-root netns
|
| * stp_pdu_rcv()
| |
| `- garp_protos[]->rcv() : registered by stp_proto_register()
|
| * garp_pdu_rcv() : netns-aware
| * br_stp_rcv() : netns-aware
|
|- llc_type_handlers[llc_pdu_type(skb) - 1]
|
| * llc_sap_handler() : NOT netns-aware (Patch 1)
| * llc_conn_handler() : NOT netns-aware (Patch 2)
|
`- llc_station_handler
* llc_station_rcv() : netns-aware
Patch 1 & 2 convert not-netns-aware functions and Patch 3 remove the
netns restriction in llc_rcv().
Note this series does not namespacify AF_LLC so that these patches
can be backported to stable tree (at least to 4.14.y) without conflicts.
Another series that adds netns support for AF_LLC will be targeted
to net-next later.
Kuniyuki Iwashima (4):
llc: Check netns in llc_dgram_match().
llc: Check netns in llc_estab_match() and llc_listener_match().
llc: Don't drop packet from non-root netns.
Revert "bridge: Add extack warning when enabling STP in netns."
include/net/llc_conn.h | 2 +-
net/bridge/br_stp_if.c | 3 ---
net/llc/af_llc.c | 2 +-
net/llc/llc_conn.c | 47 +++++++++++++++++++++++++-----------------
net/llc/llc_if.c | 2 +-
net/llc/llc_input.c | 3 ---
net/llc/llc_sap.c | 17 ++++++++-------
7 files changed, 41 insertions(+), 35 deletions(-)
--
2.30.2
^ permalink raw reply [flat|nested] 8+ messages in thread
* [PATCH v1 net 1/4] llc: Check netns in llc_dgram_match().
2023-07-15 2:13 [PATCH v1 net 0/4] net: Support STP on bridge in non-root netns Kuniyuki Iwashima
@ 2023-07-15 2:13 ` Kuniyuki Iwashima
2023-07-18 10:34 ` Paolo Abeni
2023-07-15 2:13 ` [PATCH v1 net 2/4] llc: Check netns in llc_estab_match() and llc_listener_match() Kuniyuki Iwashima
` (2 subsequent siblings)
3 siblings, 1 reply; 8+ messages in thread
From: Kuniyuki Iwashima @ 2023-07-15 2:13 UTC (permalink / raw)
To: David S. Miller, Eric Dumazet, Jakub Kicinski, Paolo Abeni,
Roopa Prabhu, Nikolay Aleksandrov
Cc: Eric W. Biederman, Harry Coin, Kuniyuki Iwashima,
Kuniyuki Iwashima, netdev
We will remove this restriction in llc_rcv() in the following patch,
which means that the protocol handler must be aware of netns.
if (!net_eq(dev_net(dev), &init_net))
goto drop;
llc_rcv() fetches llc_type_handlers[llc_pdu_type(skb) - 1] and calls it
if not NULL.
If the PDU type is LLC_DEST_SAP, llc_sap_handler() is called to pass skb
to corresponding sockets. Then, we must look up a proper socket in the
same netns with skb->dev.
If the destination is a multicast address, llc_sap_handler() calls
llc_sap_mcast(). It calculates a hash based on DSAP and skb->dev->ifindex,
iterates on a socket list, and calls llc_mcast_match() to check if the
socket is the correct destination. Then, llc_mcast_match() checks if
skb->dev matches with llc_sk(sk)->dev. So, we need not check netns here.
OTOH, if the destination is a unicast address, llc_sap_handler() calls
llc_lookup_dgram() to look up a socket, but it does not check the netns.
Therefore, we need to add netns check in llc_lookup_dgram().
Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com>
---
net/llc/llc_sap.c | 17 ++++++++++-------
1 file changed, 10 insertions(+), 7 deletions(-)
diff --git a/net/llc/llc_sap.c b/net/llc/llc_sap.c
index 6805ce43a055..5c83fca3acd5 100644
--- a/net/llc/llc_sap.c
+++ b/net/llc/llc_sap.c
@@ -294,13 +294,15 @@ static void llc_sap_rcv(struct llc_sap *sap, struct sk_buff *skb,
static inline bool llc_dgram_match(const struct llc_sap *sap,
const struct llc_addr *laddr,
- const struct sock *sk)
+ const struct sock *sk,
+ const struct net *net)
{
struct llc_sock *llc = llc_sk(sk);
return sk->sk_type == SOCK_DGRAM &&
- llc->laddr.lsap == laddr->lsap &&
- ether_addr_equal(llc->laddr.mac, laddr->mac);
+ net_eq(sock_net(sk), net) &&
+ llc->laddr.lsap == laddr->lsap &&
+ ether_addr_equal(llc->laddr.mac, laddr->mac);
}
/**
@@ -312,7 +314,8 @@ static inline bool llc_dgram_match(const struct llc_sap *sap,
* mac, and local sap. Returns pointer for socket found, %NULL otherwise.
*/
static struct sock *llc_lookup_dgram(struct llc_sap *sap,
- const struct llc_addr *laddr)
+ const struct llc_addr *laddr,
+ const struct net *net)
{
struct sock *rc;
struct hlist_nulls_node *node;
@@ -322,12 +325,12 @@ static struct sock *llc_lookup_dgram(struct llc_sap *sap,
rcu_read_lock_bh();
again:
sk_nulls_for_each_rcu(rc, node, laddr_hb) {
- if (llc_dgram_match(sap, laddr, rc)) {
+ if (llc_dgram_match(sap, laddr, rc, net)) {
/* Extra checks required by SLAB_TYPESAFE_BY_RCU */
if (unlikely(!refcount_inc_not_zero(&rc->sk_refcnt)))
goto again;
if (unlikely(llc_sk(rc)->sap != sap ||
- !llc_dgram_match(sap, laddr, rc))) {
+ !llc_dgram_match(sap, laddr, rc, net))) {
sock_put(rc);
continue;
}
@@ -429,7 +432,7 @@ void llc_sap_handler(struct llc_sap *sap, struct sk_buff *skb)
llc_sap_mcast(sap, &laddr, skb);
kfree_skb(skb);
} else {
- struct sock *sk = llc_lookup_dgram(sap, &laddr);
+ struct sock *sk = llc_lookup_dgram(sap, &laddr, dev_net(skb->dev));
if (sk) {
llc_sap_rcv(sap, skb, sk);
sock_put(sk);
--
2.30.2
^ permalink raw reply related [flat|nested] 8+ messages in thread
* [PATCH v1 net 2/4] llc: Check netns in llc_estab_match() and llc_listener_match().
2023-07-15 2:13 [PATCH v1 net 0/4] net: Support STP on bridge in non-root netns Kuniyuki Iwashima
2023-07-15 2:13 ` [PATCH v1 net 1/4] llc: Check netns in llc_dgram_match() Kuniyuki Iwashima
@ 2023-07-15 2:13 ` Kuniyuki Iwashima
2023-07-18 10:38 ` Paolo Abeni
2023-07-15 2:13 ` [PATCH v1 net 3/4] llc: Don't drop packet from non-root netns Kuniyuki Iwashima
2023-07-15 2:13 ` [PATCH v1 net 4/4] Revert "bridge: Add extack warning when enabling STP in netns." Kuniyuki Iwashima
3 siblings, 1 reply; 8+ messages in thread
From: Kuniyuki Iwashima @ 2023-07-15 2:13 UTC (permalink / raw)
To: David S. Miller, Eric Dumazet, Jakub Kicinski, Paolo Abeni,
Roopa Prabhu, Nikolay Aleksandrov
Cc: Eric W. Biederman, Harry Coin, Kuniyuki Iwashima,
Kuniyuki Iwashima, netdev
We will remove this restriction in llc_rcv() in the following patch,
which means that the protocol handler must be aware of netns.
if (!net_eq(dev_net(dev), &init_net))
goto drop;
llc_rcv() fetches llc_type_handlers[llc_pdu_type(skb) - 1] and calls it
if not NULL.
If the PDU type is LLC_DEST_CONN, llc_conn_handler() is called to pass
skb to corresponding sockets. Then, we must look up a proper socket in
the same netns with skb->dev.
llc_conn_handler() calls __llc_lookup() to look up a established or
litening socket by __llc_lookup_established() and llc_lookup_listener().
Both functions iterate on a list and call llc_estab_match() or
llc_listener_match() to check if the socket is the correct destination.
However, these functions do not check netns.
Also, bind() and connect() call llc_establish_connection(), which
finally calls __llc_lookup_established(), to check if there is a
conflicting socket.
Let's test netns in llc_estab_match() and llc_listener_match().
Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com>
---
include/net/llc_conn.h | 2 +-
net/llc/af_llc.c | 2 +-
net/llc/llc_conn.c | 47 +++++++++++++++++++++++++-----------------
net/llc/llc_if.c | 2 +-
4 files changed, 31 insertions(+), 22 deletions(-)
diff --git a/include/net/llc_conn.h b/include/net/llc_conn.h
index 2c1ea3414640..374411b3066c 100644
--- a/include/net/llc_conn.h
+++ b/include/net/llc_conn.h
@@ -111,7 +111,7 @@ void llc_conn_resend_i_pdu_as_cmd(struct sock *sk, u8 nr, u8 first_p_bit);
void llc_conn_resend_i_pdu_as_rsp(struct sock *sk, u8 nr, u8 first_f_bit);
int llc_conn_remove_acked_pdus(struct sock *conn, u8 nr, u16 *how_many_unacked);
struct sock *llc_lookup_established(struct llc_sap *sap, struct llc_addr *daddr,
- struct llc_addr *laddr);
+ struct llc_addr *laddr, const struct net *net);
void llc_sap_add_socket(struct llc_sap *sap, struct sock *sk);
void llc_sap_remove_socket(struct llc_sap *sap, struct sock *sk);
diff --git a/net/llc/af_llc.c b/net/llc/af_llc.c
index 57c35c960b2c..9b06c380866b 100644
--- a/net/llc/af_llc.c
+++ b/net/llc/af_llc.c
@@ -402,7 +402,7 @@ static int llc_ui_bind(struct socket *sock, struct sockaddr *uaddr, int addrlen)
memcpy(laddr.mac, addr->sllc_mac, IFHWADDRLEN);
laddr.lsap = addr->sllc_sap;
rc = -EADDRINUSE; /* mac + sap clash. */
- ask = llc_lookup_established(sap, &daddr, &laddr);
+ ask = llc_lookup_established(sap, &daddr, &laddr, &init_net);
if (ask) {
sock_put(ask);
goto out_put;
diff --git a/net/llc/llc_conn.c b/net/llc/llc_conn.c
index 912aa9bd5e29..6371c1b903d4 100644
--- a/net/llc/llc_conn.c
+++ b/net/llc/llc_conn.c
@@ -453,11 +453,13 @@ static int llc_exec_conn_trans_actions(struct sock *sk,
static inline bool llc_estab_match(const struct llc_sap *sap,
const struct llc_addr *daddr,
const struct llc_addr *laddr,
- const struct sock *sk)
+ const struct sock *sk,
+ const struct net *net)
{
struct llc_sock *llc = llc_sk(sk);
- return llc->laddr.lsap == laddr->lsap &&
+ return net_eq(sock_net(sk), net) &&
+ llc->laddr.lsap == laddr->lsap &&
llc->daddr.lsap == daddr->lsap &&
ether_addr_equal(llc->laddr.mac, laddr->mac) &&
ether_addr_equal(llc->daddr.mac, daddr->mac);
@@ -476,7 +478,8 @@ static inline bool llc_estab_match(const struct llc_sap *sap,
*/
static struct sock *__llc_lookup_established(struct llc_sap *sap,
struct llc_addr *daddr,
- struct llc_addr *laddr)
+ struct llc_addr *laddr,
+ const struct net *net)
{
struct sock *rc;
struct hlist_nulls_node *node;
@@ -486,12 +489,12 @@ static struct sock *__llc_lookup_established(struct llc_sap *sap,
rcu_read_lock();
again:
sk_nulls_for_each_rcu(rc, node, laddr_hb) {
- if (llc_estab_match(sap, daddr, laddr, rc)) {
+ if (llc_estab_match(sap, daddr, laddr, rc, net)) {
/* Extra checks required by SLAB_TYPESAFE_BY_RCU */
if (unlikely(!refcount_inc_not_zero(&rc->sk_refcnt)))
goto again;
if (unlikely(llc_sk(rc)->sap != sap ||
- !llc_estab_match(sap, daddr, laddr, rc))) {
+ !llc_estab_match(sap, daddr, laddr, rc, net))) {
sock_put(rc);
continue;
}
@@ -513,29 +516,33 @@ static struct sock *__llc_lookup_established(struct llc_sap *sap,
struct sock *llc_lookup_established(struct llc_sap *sap,
struct llc_addr *daddr,
- struct llc_addr *laddr)
+ struct llc_addr *laddr,
+ const struct net *net)
{
struct sock *sk;
local_bh_disable();
- sk = __llc_lookup_established(sap, daddr, laddr);
+ sk = __llc_lookup_established(sap, daddr, laddr, net);
local_bh_enable();
return sk;
}
static inline bool llc_listener_match(const struct llc_sap *sap,
const struct llc_addr *laddr,
- const struct sock *sk)
+ const struct sock *sk,
+ const struct net *net)
{
struct llc_sock *llc = llc_sk(sk);
- return sk->sk_type == SOCK_STREAM && sk->sk_state == TCP_LISTEN &&
+ return net_eq(sock_net(sk), net) &&
+ sk->sk_type == SOCK_STREAM && sk->sk_state == TCP_LISTEN &&
llc->laddr.lsap == laddr->lsap &&
ether_addr_equal(llc->laddr.mac, laddr->mac);
}
static struct sock *__llc_lookup_listener(struct llc_sap *sap,
- struct llc_addr *laddr)
+ struct llc_addr *laddr,
+ const struct net *net)
{
struct sock *rc;
struct hlist_nulls_node *node;
@@ -545,12 +552,12 @@ static struct sock *__llc_lookup_listener(struct llc_sap *sap,
rcu_read_lock();
again:
sk_nulls_for_each_rcu(rc, node, laddr_hb) {
- if (llc_listener_match(sap, laddr, rc)) {
+ if (llc_listener_match(sap, laddr, rc, net)) {
/* Extra checks required by SLAB_TYPESAFE_BY_RCU */
if (unlikely(!refcount_inc_not_zero(&rc->sk_refcnt)))
goto again;
if (unlikely(llc_sk(rc)->sap != sap ||
- !llc_listener_match(sap, laddr, rc))) {
+ !llc_listener_match(sap, laddr, rc, net))) {
sock_put(rc);
continue;
}
@@ -581,24 +588,26 @@ static struct sock *__llc_lookup_listener(struct llc_sap *sap,
* Caller has to make sure local_bh is disabled.
*/
static struct sock *llc_lookup_listener(struct llc_sap *sap,
- struct llc_addr *laddr)
+ struct llc_addr *laddr,
+ const struct net *net)
{
+ struct sock *rc = __llc_lookup_listener(sap, laddr, net);
static struct llc_addr null_addr;
- struct sock *rc = __llc_lookup_listener(sap, laddr);
if (!rc)
- rc = __llc_lookup_listener(sap, &null_addr);
+ rc = __llc_lookup_listener(sap, &null_addr, net);
return rc;
}
static struct sock *__llc_lookup(struct llc_sap *sap,
struct llc_addr *daddr,
- struct llc_addr *laddr)
+ struct llc_addr *laddr,
+ const struct net *net)
{
- struct sock *sk = __llc_lookup_established(sap, daddr, laddr);
+ struct sock *sk = __llc_lookup_established(sap, daddr, laddr, net);
- return sk ? : llc_lookup_listener(sap, laddr);
+ return sk ? : llc_lookup_listener(sap, laddr, net);
}
/**
@@ -776,7 +785,7 @@ void llc_conn_handler(struct llc_sap *sap, struct sk_buff *skb)
llc_pdu_decode_da(skb, daddr.mac);
llc_pdu_decode_dsap(skb, &daddr.lsap);
- sk = __llc_lookup(sap, &saddr, &daddr);
+ sk = __llc_lookup(sap, &saddr, &daddr, dev_net(skb->dev));
if (!sk)
goto drop;
diff --git a/net/llc/llc_if.c b/net/llc/llc_if.c
index dde9bf08a593..58a5f419adc6 100644
--- a/net/llc/llc_if.c
+++ b/net/llc/llc_if.c
@@ -92,7 +92,7 @@ int llc_establish_connection(struct sock *sk, const u8 *lmac, u8 *dmac, u8 dsap)
daddr.lsap = dsap;
memcpy(daddr.mac, dmac, sizeof(daddr.mac));
memcpy(laddr.mac, lmac, sizeof(laddr.mac));
- existing = llc_lookup_established(llc->sap, &daddr, &laddr);
+ existing = llc_lookup_established(llc->sap, &daddr, &laddr, sock_net(sk));
if (existing) {
if (existing->sk_state == TCP_ESTABLISHED) {
sk = existing;
--
2.30.2
^ permalink raw reply related [flat|nested] 8+ messages in thread
* [PATCH v1 net 3/4] llc: Don't drop packet from non-root netns.
2023-07-15 2:13 [PATCH v1 net 0/4] net: Support STP on bridge in non-root netns Kuniyuki Iwashima
2023-07-15 2:13 ` [PATCH v1 net 1/4] llc: Check netns in llc_dgram_match() Kuniyuki Iwashima
2023-07-15 2:13 ` [PATCH v1 net 2/4] llc: Check netns in llc_estab_match() and llc_listener_match() Kuniyuki Iwashima
@ 2023-07-15 2:13 ` Kuniyuki Iwashima
2023-07-15 2:13 ` [PATCH v1 net 4/4] Revert "bridge: Add extack warning when enabling STP in netns." Kuniyuki Iwashima
3 siblings, 0 replies; 8+ messages in thread
From: Kuniyuki Iwashima @ 2023-07-15 2:13 UTC (permalink / raw)
To: David S. Miller, Eric Dumazet, Jakub Kicinski, Paolo Abeni,
Roopa Prabhu, Nikolay Aleksandrov
Cc: Eric W. Biederman, Harry Coin, Kuniyuki Iwashima,
Kuniyuki Iwashima, netdev
Now these upper layer protocol handlers can be called from llc_rcv()
as sap->rcv_func(), which is registered by llc_sap_open().
* function which is passed to register_8022_client()
-> no in-kernel user calls register_8022_client().
* snap_rcv()
`- proto->rcvfunc() : registered by register_snap_client()
-> aarp_rcv() and atalk_rcv() drop packets from non-root netns
* stp_pdu_rcv()
`- garp_protos[]->rcv() : registered by stp_proto_register()
-> garp_pdu_rcv() and br_stp_rcv() are netns-aware
So, we can safely remove the netns restriction in llc_rcv().
Fixes: e730c15519d0 ("[NET]: Make packet reception network namespace safe")
Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com>
---
net/llc/llc_input.c | 3 ---
1 file changed, 3 deletions(-)
diff --git a/net/llc/llc_input.c b/net/llc/llc_input.c
index c309b72a5877..7cac441862e2 100644
--- a/net/llc/llc_input.c
+++ b/net/llc/llc_input.c
@@ -163,9 +163,6 @@ int llc_rcv(struct sk_buff *skb, struct net_device *dev,
void (*sta_handler)(struct sk_buff *skb);
void (*sap_handler)(struct llc_sap *sap, struct sk_buff *skb);
- if (!net_eq(dev_net(dev), &init_net))
- goto drop;
-
/*
* When the interface is in promisc. mode, drop all the crap that it
* receives, do not try to analyse it.
--
2.30.2
^ permalink raw reply related [flat|nested] 8+ messages in thread
* [PATCH v1 net 4/4] Revert "bridge: Add extack warning when enabling STP in netns."
2023-07-15 2:13 [PATCH v1 net 0/4] net: Support STP on bridge in non-root netns Kuniyuki Iwashima
` (2 preceding siblings ...)
2023-07-15 2:13 ` [PATCH v1 net 3/4] llc: Don't drop packet from non-root netns Kuniyuki Iwashima
@ 2023-07-15 2:13 ` Kuniyuki Iwashima
3 siblings, 0 replies; 8+ messages in thread
From: Kuniyuki Iwashima @ 2023-07-15 2:13 UTC (permalink / raw)
To: David S. Miller, Eric Dumazet, Jakub Kicinski, Paolo Abeni,
Roopa Prabhu, Nikolay Aleksandrov
Cc: Eric W. Biederman, Harry Coin, Kuniyuki Iwashima,
Kuniyuki Iwashima, netdev
This reverts commit 56a16035bb6effb37177867cea94c13a8382f745.
Since the previous commit, STP works on bridge in netns.
# unshare -n
# ip link add br0 type bridge
# ip link add veth0 type veth peer name veth1
# ip link set veth0 master br0 up
[ 50.558135] br0: port 1(veth0) entered blocking state
[ 50.558366] br0: port 1(veth0) entered disabled state
[ 50.558798] veth0: entered allmulticast mode
[ 50.564401] veth0: entered promiscuous mode
# ip link set veth1 master br0 up
[ 54.215487] br0: port 2(veth1) entered blocking state
[ 54.215657] br0: port 2(veth1) entered disabled state
[ 54.215848] veth1: entered allmulticast mode
[ 54.219577] veth1: entered promiscuous mode
# ip link set br0 type bridge stp_state 1
# ip link set br0 up
[ 61.960726] br0: port 2(veth1) entered blocking state
[ 61.961097] br0: port 2(veth1) entered listening state
[ 61.961495] br0: port 1(veth0) entered blocking state
[ 61.961653] br0: port 1(veth0) entered listening state
[ 63.998835] br0: port 2(veth1) entered blocking state
[ 77.437113] br0: port 1(veth0) entered learning state
[ 86.653501] br0: received packet on veth0 with own address as source address (addr:6e:0f:e7:6f:5f:5f, vlan:0)
[ 92.797095] br0: port 1(veth0) entered forwarding state
[ 92.797398] br0: topology change detected, propagating
Let's remove the warning.
Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com>
---
net/bridge/br_stp_if.c | 3 ---
1 file changed, 3 deletions(-)
diff --git a/net/bridge/br_stp_if.c b/net/bridge/br_stp_if.c
index b65962682771..75204d36d7f9 100644
--- a/net/bridge/br_stp_if.c
+++ b/net/bridge/br_stp_if.c
@@ -201,9 +201,6 @@ int br_stp_set_enabled(struct net_bridge *br, unsigned long val,
{
ASSERT_RTNL();
- if (!net_eq(dev_net(br->dev), &init_net))
- NL_SET_ERR_MSG_MOD(extack, "STP does not work in non-root netns");
-
if (br_mrp_enabled(br)) {
NL_SET_ERR_MSG_MOD(extack,
"STP can't be enabled if MRP is already enabled");
--
2.30.2
^ permalink raw reply related [flat|nested] 8+ messages in thread
* Re: [PATCH v1 net 1/4] llc: Check netns in llc_dgram_match().
2023-07-15 2:13 ` [PATCH v1 net 1/4] llc: Check netns in llc_dgram_match() Kuniyuki Iwashima
@ 2023-07-18 10:34 ` Paolo Abeni
2023-07-18 17:24 ` Kuniyuki Iwashima
0 siblings, 1 reply; 8+ messages in thread
From: Paolo Abeni @ 2023-07-18 10:34 UTC (permalink / raw)
To: Kuniyuki Iwashima, David S. Miller, Eric Dumazet, Jakub Kicinski,
Roopa Prabhu, Nikolay Aleksandrov
Cc: Eric W. Biederman, Harry Coin, Kuniyuki Iwashima, netdev
Hi,
the series LGTM, I have only a couple of (very) minor nit, see below...
On Fri, 2023-07-14 at 19:13 -0700, Kuniyuki Iwashima wrote:
> We will remove this restriction in llc_rcv() in the following patch,
s/following patch/soon/, as the following patch will not do that ;)
> which means that the protocol handler must be aware of netns.
>
> if (!net_eq(dev_net(dev), &init_net))
> goto drop;
>
> llc_rcv() fetches llc_type_handlers[llc_pdu_type(skb) - 1] and calls it
> if not NULL.
>
> If the PDU type is LLC_DEST_SAP, llc_sap_handler() is called to pass skb
> to corresponding sockets. Then, we must look up a proper socket in the
> same netns with skb->dev.
>
> If the destination is a multicast address, llc_sap_handler() calls
> llc_sap_mcast(). It calculates a hash based on DSAP and skb->dev->ifindex,
> iterates on a socket list, and calls llc_mcast_match() to check if the
> socket is the correct destination. Then, llc_mcast_match() checks if
> skb->dev matches with llc_sk(sk)->dev. So, we need not check netns here.
>
> OTOH, if the destination is a unicast address, llc_sap_handler() calls
> llc_lookup_dgram() to look up a socket, but it does not check the netns.
>
> Therefore, we need to add netns check in llc_lookup_dgram().
>
> Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com>
> ---
> net/llc/llc_sap.c | 17 ++++++++++-------
> 1 file changed, 10 insertions(+), 7 deletions(-)
>
> diff --git a/net/llc/llc_sap.c b/net/llc/llc_sap.c
> index 6805ce43a055..5c83fca3acd5 100644
> --- a/net/llc/llc_sap.c
> +++ b/net/llc/llc_sap.c
> @@ -294,13 +294,15 @@ static void llc_sap_rcv(struct llc_sap *sap, struct sk_buff *skb,
>
> static inline bool llc_dgram_match(const struct llc_sap *sap,
> const struct llc_addr *laddr,
> - const struct sock *sk)
> + const struct sock *sk,
> + const struct net *net)
> {
> struct llc_sock *llc = llc_sk(sk);
>
> return sk->sk_type == SOCK_DGRAM &&
> - llc->laddr.lsap == laddr->lsap &&
> - ether_addr_equal(llc->laddr.mac, laddr->mac);
> + net_eq(sock_net(sk), net) &&
> + llc->laddr.lsap == laddr->lsap &&
> + ether_addr_equal(llc->laddr.mac, laddr->mac);
> }
>
> /**
> @@ -312,7 +314,8 @@ static inline bool llc_dgram_match(const struct llc_sap *sap,
> * mac, and local sap. Returns pointer for socket found, %NULL otherwise.
> */
As this function has doxygen documentation, you should additionally
document the 'net' argument.
Thanks,
Paolo
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH v1 net 2/4] llc: Check netns in llc_estab_match() and llc_listener_match().
2023-07-15 2:13 ` [PATCH v1 net 2/4] llc: Check netns in llc_estab_match() and llc_listener_match() Kuniyuki Iwashima
@ 2023-07-18 10:38 ` Paolo Abeni
0 siblings, 0 replies; 8+ messages in thread
From: Paolo Abeni @ 2023-07-18 10:38 UTC (permalink / raw)
To: Kuniyuki Iwashima, David S. Miller, Eric Dumazet, Jakub Kicinski,
Roopa Prabhu, Nikolay Aleksandrov
Cc: Eric W. Biederman, Harry Coin, Kuniyuki Iwashima, netdev
On Fri, 2023-07-14 at 19:13 -0700, Kuniyuki Iwashima wrote:
> @@ -476,7 +478,8 @@ static inline bool llc_estab_match(const struct llc_sap *sap,
> */
> static struct sock *__llc_lookup_established(struct llc_sap *sap,
> struct llc_addr *daddr,
> - struct llc_addr *laddr)
> + struct llc_addr *laddr,
> + const struct net *net)
You should add 'net' to the doxygen documentation.
> {
> struct sock *rc;
> struct hlist_nulls_node *node;
[...]
> @@ -581,24 +588,26 @@ static struct sock *__llc_lookup_listener(struct llc_sap *sap,
> * Caller has to make sure local_bh is disabled.
> */
> static struct sock *llc_lookup_listener(struct llc_sap *sap,
> - struct llc_addr *laddr)
> + struct llc_addr *laddr,
> + const struct net *net)
Same here.
Thanks!
Paolo
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [PATCH v1 net 1/4] llc: Check netns in llc_dgram_match().
2023-07-18 10:34 ` Paolo Abeni
@ 2023-07-18 17:24 ` Kuniyuki Iwashima
0 siblings, 0 replies; 8+ messages in thread
From: Kuniyuki Iwashima @ 2023-07-18 17:24 UTC (permalink / raw)
To: pabeni
Cc: davem, ebiederm, edumazet, hcoin, kuba, kuni1840, kuniyu, netdev,
razor, roopa
From: Paolo Abeni <pabeni@redhat.com>
Date: Tue, 18 Jul 2023 12:34:47 +0200
> Hi,
>
> the series LGTM, I have only a couple of (very) minor nit, see below...
>
> On Fri, 2023-07-14 at 19:13 -0700, Kuniyuki Iwashima wrote:
> > We will remove this restriction in llc_rcv() in the following patch,
>
> s/following patch/soon/, as the following patch will not do that ;)
Exactly, will fix :)
>
> > which means that the protocol handler must be aware of netns.
> >
> > if (!net_eq(dev_net(dev), &init_net))
> > goto drop;
> >
> > llc_rcv() fetches llc_type_handlers[llc_pdu_type(skb) - 1] and calls it
> > if not NULL.
> >
> > If the PDU type is LLC_DEST_SAP, llc_sap_handler() is called to pass skb
> > to corresponding sockets. Then, we must look up a proper socket in the
> > same netns with skb->dev.
> >
> > If the destination is a multicast address, llc_sap_handler() calls
> > llc_sap_mcast(). It calculates a hash based on DSAP and skb->dev->ifindex,
> > iterates on a socket list, and calls llc_mcast_match() to check if the
> > socket is the correct destination. Then, llc_mcast_match() checks if
> > skb->dev matches with llc_sk(sk)->dev. So, we need not check netns here.
> >
> > OTOH, if the destination is a unicast address, llc_sap_handler() calls
> > llc_lookup_dgram() to look up a socket, but it does not check the netns.
> >
> > Therefore, we need to add netns check in llc_lookup_dgram().
> >
> > Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com>
> > ---
> > net/llc/llc_sap.c | 17 ++++++++++-------
> > 1 file changed, 10 insertions(+), 7 deletions(-)
> >
> > diff --git a/net/llc/llc_sap.c b/net/llc/llc_sap.c
> > index 6805ce43a055..5c83fca3acd5 100644
> > --- a/net/llc/llc_sap.c
> > +++ b/net/llc/llc_sap.c
> > @@ -294,13 +294,15 @@ static void llc_sap_rcv(struct llc_sap *sap, struct sk_buff *skb,
> >
> > static inline bool llc_dgram_match(const struct llc_sap *sap,
> > const struct llc_addr *laddr,
> > - const struct sock *sk)
> > + const struct sock *sk,
> > + const struct net *net)
> > {
> > struct llc_sock *llc = llc_sk(sk);
> >
> > return sk->sk_type == SOCK_DGRAM &&
> > - llc->laddr.lsap == laddr->lsap &&
> > - ether_addr_equal(llc->laddr.mac, laddr->mac);
> > + net_eq(sock_net(sk), net) &&
> > + llc->laddr.lsap == laddr->lsap &&
> > + ether_addr_equal(llc->laddr.mac, laddr->mac);
> > }
> >
> > /**
> > @@ -312,7 +314,8 @@ static inline bool llc_dgram_match(const struct llc_sap *sap,
> > * mac, and local sap. Returns pointer for socket found, %NULL otherwise.
> > */
>
> As this function has doxygen documentation, you should additionally
> document the 'net' argument.
And will fix this and the same miss in patch 2.
Thanks for catching this!
>
> Thanks,
>
> Paolo
^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2023-07-18 17:25 UTC | newest]
Thread overview: 8+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-07-15 2:13 [PATCH v1 net 0/4] net: Support STP on bridge in non-root netns Kuniyuki Iwashima
2023-07-15 2:13 ` [PATCH v1 net 1/4] llc: Check netns in llc_dgram_match() Kuniyuki Iwashima
2023-07-18 10:34 ` Paolo Abeni
2023-07-18 17:24 ` Kuniyuki Iwashima
2023-07-15 2:13 ` [PATCH v1 net 2/4] llc: Check netns in llc_estab_match() and llc_listener_match() Kuniyuki Iwashima
2023-07-18 10:38 ` Paolo Abeni
2023-07-15 2:13 ` [PATCH v1 net 3/4] llc: Don't drop packet from non-root netns Kuniyuki Iwashima
2023-07-15 2:13 ` [PATCH v1 net 4/4] Revert "bridge: Add extack warning when enabling STP in netns." Kuniyuki Iwashima
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).