lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 3 Aug 2012 14:27:51 +0800 From: Jun Zhao <mypopydev@...il.com> To: "David S. Miller" <davem@...emloft.net>, Alexey Kuznetsov <kuznet@....inr.ac.ru>, James Morris <jmorris@...ei.org>, Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>, Patrick McHardy <kaber@...sh.net> Cc: netdev@...r.kernel.org, mypopydev@...il.com Subject: [PATCH v2 1/1] ipv6 : ip6mr.c : Fix can't match the IPv6 multicast packets with input net device in netfilter FORWARD chain. Current kernel change the skb's net device with output device before netfilter FORWARD chain, that will lead to can't match the IPv6 multicast packets with input net device in netfilter FORWARD chain. the test case for reproduce this issue as follow: IPv6 multicast udp stream from eth0(input device) to eth1(output device) Dst Addr: Port {ff03::4}:6789 ---> Router +---------------------------+ -------> | [eth0] --FORWARD--> [eth1]| -------> +---------------------------+ ip6tables -I FORWARD -p udp -i eth0 -o eth1 --dst ff03::4 -j ACCEPT [first rules ] ip6tables -A FORWARD -p udp -i eth1 -o eth1 --dst ff03::4 -j ACCEPT [second rules] Before fix this issue, it will match the second rules not the first rules. you can used command "ip6tables -L -vnx" to check the match result. Signed-off-by: Jun Zhao <mypopydev@...il.com> --- net/ipv6/ip6mr.c | 4 +++- 1 files changed, 3 insertions(+), 1 deletions(-) diff --git a/net/ipv6/ip6mr.c b/net/ipv6/ip6mr.c index 4532973..b099dfb 100644 --- a/net/ipv6/ip6mr.c +++ b/net/ipv6/ip6mr.c @@ -1901,6 +1901,7 @@ static int ip6mr_forward2(struct net *net, struct mr6_table *mrt, struct ipv6hdr *ipv6h; struct mif_device *vif = &mrt->vif6_table[vifi]; struct net_device *dev; + struct net_device *indev; struct dst_entry *dst; struct flowi6 fl6; @@ -1946,6 +1947,7 @@ static int ip6mr_forward2(struct net *net, struct mr6_table *mrt, * result in receiving multiple packets. */ dev = vif->dev; + indev = skb->dev; skb->dev = dev; vif->pkt_out++; vif->bytes_out += skb->len; @@ -1960,7 +1962,7 @@ static int ip6mr_forward2(struct net *net, struct mr6_table *mrt, IP6CB(skb)->flags |= IP6SKB_FORWARDED; - return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD, skb, skb->dev, dev, + return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD, skb, indev, dev, ip6mr_forward2_finish); out_free: -- 1.7.2.5 -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists