Skip to content

Commit d657f5c

Browse files
committed
Merge branch 'vrf-fix-source-address-selection-with-route-leak'
Nicolas Dichtel says: ==================== vrf: fix source address selection with route leak For patch 1 and 2, I didn't find the exact commit that introduced this bug, but I suspect it has been here since the first version. I arbitrarily choose one. ==================== Link: https://patch.msgid.link/[email protected] Signed-off-by: Jakub Kicinski <[email protected]>
2 parents f67a90a + 3936718 commit d657f5c

File tree

6 files changed

+120
-12
lines changed

6 files changed

+120
-12
lines changed

include/net/ip6_route.h

Lines changed: 14 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -127,18 +127,26 @@ void rt6_age_exceptions(struct fib6_info *f6i, struct fib6_gc_args *gc_args,
127127

128128
static inline int ip6_route_get_saddr(struct net *net, struct fib6_info *f6i,
129129
const struct in6_addr *daddr,
130-
unsigned int prefs,
130+
unsigned int prefs, int l3mdev_index,
131131
struct in6_addr *saddr)
132132
{
133+
struct net_device *l3mdev;
134+
struct net_device *dev;
135+
bool same_vrf;
133136
int err = 0;
134137

135-
if (f6i && f6i->fib6_prefsrc.plen) {
138+
rcu_read_lock();
139+
140+
l3mdev = dev_get_by_index_rcu(net, l3mdev_index);
141+
if (!f6i || !f6i->fib6_prefsrc.plen || l3mdev)
142+
dev = f6i ? fib6_info_nh_dev(f6i) : NULL;
143+
same_vrf = !l3mdev || l3mdev_master_dev_rcu(dev) == l3mdev;
144+
if (f6i && f6i->fib6_prefsrc.plen && same_vrf)
136145
*saddr = f6i->fib6_prefsrc.addr;
137-
} else {
138-
struct net_device *dev = f6i ? fib6_info_nh_dev(f6i) : NULL;
146+
else
147+
err = ipv6_dev_get_saddr(net, same_vrf ? dev : l3mdev, daddr, prefs, saddr);
139148

140-
err = ipv6_dev_get_saddr(net, dev, daddr, prefs, saddr);
141-
}
149+
rcu_read_unlock();
142150

143151
return err;
144152
}

net/ipv4/fib_semantics.c

Lines changed: 11 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2270,6 +2270,15 @@ void fib_select_path(struct net *net, struct fib_result *res,
22702270
fib_select_default(fl4, res);
22712271

22722272
check_saddr:
2273-
if (!fl4->saddr)
2274-
fl4->saddr = fib_result_prefsrc(net, res);
2273+
if (!fl4->saddr) {
2274+
struct net_device *l3mdev;
2275+
2276+
l3mdev = dev_get_by_index_rcu(net, fl4->flowi4_l3mdev);
2277+
2278+
if (!l3mdev ||
2279+
l3mdev_master_dev_rcu(FIB_RES_DEV(*res)) == l3mdev)
2280+
fl4->saddr = fib_result_prefsrc(net, res);
2281+
else
2282+
fl4->saddr = inet_select_addr(l3mdev, 0, RT_SCOPE_LINK);
2283+
}
22752284
}

net/ipv6/addrconf.c

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1873,7 +1873,8 @@ int ipv6_dev_get_saddr(struct net *net, const struct net_device *dst_dev,
18731873
master, &dst,
18741874
scores, hiscore_idx);
18751875

1876-
if (scores[hiscore_idx].ifa)
1876+
if (scores[hiscore_idx].ifa &&
1877+
scores[hiscore_idx].scopedist >= 0)
18771878
goto out;
18781879
}
18791880

net/ipv6/ip6_output.c

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1124,6 +1124,7 @@ static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk,
11241124
from = rt ? rcu_dereference(rt->from) : NULL;
11251125
err = ip6_route_get_saddr(net, from, &fl6->daddr,
11261126
sk ? READ_ONCE(inet6_sk(sk)->srcprefs) : 0,
1127+
fl6->flowi6_l3mdev,
11271128
&fl6->saddr);
11281129
rcu_read_unlock();
11291130

net/ipv6/route.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5689,7 +5689,7 @@ static int rt6_fill_node(struct net *net, struct sk_buff *skb,
56895689
goto nla_put_failure;
56905690
} else if (dest) {
56915691
struct in6_addr saddr_buf;
5692-
if (ip6_route_get_saddr(net, rt, dest, 0, &saddr_buf) == 0 &&
5692+
if (ip6_route_get_saddr(net, rt, dest, 0, 0, &saddr_buf) == 0 &&
56935693
nla_put_in6_addr(skb, RTA_PREFSRC, &saddr_buf))
56945694
goto nla_put_failure;
56955695
}

tools/testing/selftests/net/vrf_route_leaking.sh

Lines changed: 91 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -59,6 +59,7 @@
5959
# while it is forwarded between different vrfs.
6060

6161
source lib.sh
62+
PATH=$PWD:$PWD/tools/testing/selftests/net:$PATH
6263
VERBOSE=0
6364
PAUSE_ON_FAIL=no
6465
DEFAULT_TTYPE=sym
@@ -533,6 +534,86 @@ ipv6_ping_frag_asym()
533534
ipv6_ping_frag asym
534535
}
535536

537+
ipv4_ping_local()
538+
{
539+
log_section "IPv4 (sym route): VRF ICMP local error route lookup ping"
540+
541+
setup_sym
542+
543+
check_connectivity || return
544+
545+
run_cmd ip netns exec $r1 ip vrf exec blue ping -c1 -w1 ${H2_N2_IP}
546+
log_test $? 0 "VRF ICMP local IPv4"
547+
}
548+
549+
ipv4_tcp_local()
550+
{
551+
log_section "IPv4 (sym route): VRF tcp local connection"
552+
553+
setup_sym
554+
555+
check_connectivity || return
556+
557+
run_cmd nettest -s -O "$h2" -l ${H2_N2_IP} -I eth0 -3 eth0 &
558+
sleep 1
559+
run_cmd nettest -N "$r1" -d blue -r ${H2_N2_IP}
560+
log_test $? 0 "VRF tcp local connection IPv4"
561+
}
562+
563+
ipv4_udp_local()
564+
{
565+
log_section "IPv4 (sym route): VRF udp local connection"
566+
567+
setup_sym
568+
569+
check_connectivity || return
570+
571+
run_cmd nettest -s -D -O "$h2" -l ${H2_N2_IP} -I eth0 -3 eth0 &
572+
sleep 1
573+
run_cmd nettest -D -N "$r1" -d blue -r ${H2_N2_IP}
574+
log_test $? 0 "VRF udp local connection IPv4"
575+
}
576+
577+
ipv6_ping_local()
578+
{
579+
log_section "IPv6 (sym route): VRF ICMP local error route lookup ping"
580+
581+
setup_sym
582+
583+
check_connectivity6 || return
584+
585+
run_cmd ip netns exec $r1 ip vrf exec blue ${ping6} -c1 -w1 ${H2_N2_IP6}
586+
log_test $? 0 "VRF ICMP local IPv6"
587+
}
588+
589+
ipv6_tcp_local()
590+
{
591+
log_section "IPv6 (sym route): VRF tcp local connection"
592+
593+
setup_sym
594+
595+
check_connectivity6 || return
596+
597+
run_cmd nettest -s -6 -O "$h2" -l ${H2_N2_IP6} -I eth0 -3 eth0 &
598+
sleep 1
599+
run_cmd nettest -6 -N "$r1" -d blue -r ${H2_N2_IP6}
600+
log_test $? 0 "VRF tcp local connection IPv6"
601+
}
602+
603+
ipv6_udp_local()
604+
{
605+
log_section "IPv6 (sym route): VRF udp local connection"
606+
607+
setup_sym
608+
609+
check_connectivity6 || return
610+
611+
run_cmd nettest -s -6 -D -O "$h2" -l ${H2_N2_IP6} -I eth0 -3 eth0 &
612+
sleep 1
613+
run_cmd nettest -6 -D -N "$r1" -d blue -r ${H2_N2_IP6}
614+
log_test $? 0 "VRF udp local connection IPv6"
615+
}
616+
536617
################################################################################
537618
# usage
538619

@@ -555,8 +636,10 @@ EOF
555636
# Some systems don't have a ping6 binary anymore
556637
command -v ping6 > /dev/null 2>&1 && ping6=$(command -v ping6) || ping6=$(command -v ping)
557638

558-
TESTS_IPV4="ipv4_ping_ttl ipv4_traceroute ipv4_ping_frag ipv4_ping_ttl_asym ipv4_traceroute_asym"
559-
TESTS_IPV6="ipv6_ping_ttl ipv6_traceroute ipv6_ping_ttl_asym ipv6_traceroute_asym"
639+
TESTS_IPV4="ipv4_ping_ttl ipv4_traceroute ipv4_ping_frag ipv4_ping_local ipv4_tcp_local
640+
ipv4_udp_local ipv4_ping_ttl_asym ipv4_traceroute_asym"
641+
TESTS_IPV6="ipv6_ping_ttl ipv6_traceroute ipv6_ping_local ipv6_tcp_local ipv6_udp_local
642+
ipv6_ping_ttl_asym ipv6_traceroute_asym"
560643

561644
ret=0
562645
nsuccess=0
@@ -594,12 +677,18 @@ do
594677
ipv4_traceroute|traceroute) ipv4_traceroute;;&
595678
ipv4_traceroute_asym|traceroute) ipv4_traceroute_asym;;&
596679
ipv4_ping_frag|ping) ipv4_ping_frag;;&
680+
ipv4_ping_local|ping) ipv4_ping_local;;&
681+
ipv4_tcp_local) ipv4_tcp_local;;&
682+
ipv4_udp_local) ipv4_udp_local;;&
597683

598684
ipv6_ping_ttl|ping) ipv6_ping_ttl;;&
599685
ipv6_ping_ttl_asym|ping) ipv6_ping_ttl_asym;;&
600686
ipv6_traceroute|traceroute) ipv6_traceroute;;&
601687
ipv6_traceroute_asym|traceroute) ipv6_traceroute_asym;;&
602688
ipv6_ping_frag|ping) ipv6_ping_frag;;&
689+
ipv6_ping_local|ping) ipv6_ping_local;;&
690+
ipv6_tcp_local) ipv6_tcp_local;;&
691+
ipv6_udp_local) ipv6_udp_local;;&
603692

604693
# setup namespaces and config, but do not run any tests
605694
setup_sym|setup) setup_sym; exit 0;;

0 commit comments

Comments
 (0)