[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <3d191a3c51bd564da8b0c3ffe1e9c90fa7bd4d7b.1466590952.git.pabeni@redhat.com>
Date: Wed, 22 Jun 2016 12:25:15 +0200
From: Paolo Abeni <pabeni@...hat.com>
To: netdev@...r.kernel.org
Cc: "David S. Miller" <davem@...emloft.net>,
Jiri Pirko <jiri@...lanox.com>,
Alexander Duyck <aduyck@...antis.com>,
Eric Dumazet <edumazet@...gle.com>,
Daniel Borkmann <daniel@...earbox.net>
Subject: [PATCH net] net: avoid vlan ptype specific match to be leaked on real device
Before the commit 0dfe17823945 ("net: vlan: goto another_round
instead of calling __netif_receive_skb"), on tagged skb ingress,
ptype specific protocol matches were delivered only to the
related vlan device, if any.
After said commit, jumping back to the 'another_round' label, allows
the later ptype specific check to match both orig_dev and skb->dev,
delivering the skb to both the vlan device and the underlying
device.
This cause i.e. packet sockets bound to a specific protocol type on
one of said devices to receive also frames really targeting the
other device.
This commit resets orig_dev before performing another round due to
vlan processing, allowing the skb to be delivered once again only
to the vlan specific ptypes.
Fixes: 0dfe17823945 ("net: vlan: goto another_round instead of calling __netif_receive_skb")
Reported-by: Ryan Liu <Ryan.Liu@...atel-lucent.com>
Reported-by: Cliff Chen <Cliff.Chen@...atel-lucent.com>
Signed-off-by: Paolo Abeni <pabeni@...hat.com>
---
net/core/dev.c | 9 +++++++--
1 file changed, 7 insertions(+), 2 deletions(-)
diff --git a/net/core/dev.c b/net/core/dev.c
index 904ff43..9d08dd6 100644
--- a/net/core/dev.c
+++ b/net/core/dev.c
@@ -4144,10 +4144,15 @@ ncls:
ret = deliver_skb(skb, pt_prev, orig_dev);
pt_prev = NULL;
}
- if (vlan_do_receive(&skb))
+ if (vlan_do_receive(&skb)) {
+ /* avoid delivering to ptype registered on
+ * vlan's underlying device only
+ */
+ orig_dev = skb->dev;
goto another_round;
- else if (unlikely(!skb))
+ } else if (unlikely(!skb)) {
goto out;
+ }
}
rx_handler = rcu_dereference(skb->dev->rx_handler);
--
1.8.3.1
Powered by blists - more mailing lists