[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20250311141238.19862-4-justin.iurman@uliege.be>
Date: Tue, 11 Mar 2025 15:12:34 +0100
From: Justin Iurman <justin.iurman@...ege.be>
To: netdev@...r.kernel.org
Cc: davem@...emloft.net,
dsahern@...nel.org,
edumazet@...gle.com,
kuba@...nel.org,
pabeni@...hat.com,
horms@...nel.org,
justin.iurman@...ege.be,
David Lebrun <dlebrun@...gle.com>,
Andrea Mayer <andrea.mayer@...roma2.it>,
Stefano Salsano <stefano.salsano@...roma2.it>,
Ahmed Abdelsalam <ahabdels.dev@...il.com>,
Ido Schimmel <idosch@...dia.com>
Subject: [PATCH net 3/7] net: ipv6: seg6: fix lwtunnel_input/output loop
Fix the lwtunnel_input() and lwtunnel_output() reentry loop in
seg6_iptunnel when the destination is the same after transformation.
Some configurations leading to this may be considered pathological, but
we don't want the kernel to crash even for these ones. The logic in this
patch is a bit different from others of this series due to how we deal
with nf hooks.
Fixes: 6c8702c60b88 ("ipv6: sr: add support for SRH encapsulation and injection with lwtunnels")
Cc: David Lebrun <dlebrun@...gle.com>
Cc: Andrea Mayer <andrea.mayer@...roma2.it>
Cc: Stefano Salsano <stefano.salsano@...roma2.it>
Cc: Ahmed Abdelsalam <ahabdels.dev@...il.com>
Cc: Ido Schimmel <idosch@...dia.com>
Signed-off-by: Justin Iurman <justin.iurman@...ege.be>
---
net/ipv6/seg6_iptunnel.c | 37 +++++++++++++++++++++++++++++++------
1 file changed, 31 insertions(+), 6 deletions(-)
diff --git a/net/ipv6/seg6_iptunnel.c b/net/ipv6/seg6_iptunnel.c
index 51583461ae29..a6fce54acfbe 100644
--- a/net/ipv6/seg6_iptunnel.c
+++ b/net/ipv6/seg6_iptunnel.c
@@ -467,9 +467,16 @@ static int seg6_input_finish(struct net *net, struct sock *sk,
return dst_input(skb);
}
+static int seg6_input_redirect_finish(struct net *net, struct sock *sk,
+ struct sk_buff *skb)
+{
+ return skb_dst(skb)->lwtstate->orig_input(skb);
+}
+
static int seg6_input_core(struct net *net, struct sock *sk,
struct sk_buff *skb)
{
+ int (*in_func)(struct net *net, struct sock *sk, struct sk_buff *skb);
struct dst_entry *orig_dst = skb_dst(skb);
struct dst_entry *dst = NULL;
struct lwtunnel_state *lwtst;
@@ -515,12 +522,20 @@ static int seg6_input_core(struct net *net, struct sock *sk,
skb_dst_set(skb, dst);
}
+ /* avoid lwtunnel_input() reentry loop when destination is the same
+ * after transformation
+ */
+ if (lwtst == dst->lwtstate)
+ in_func = seg6_input_redirect_finish;
+ else
+ in_func = seg6_input_finish;
+
if (static_branch_unlikely(&nf_hooks_lwtunnel_enabled))
return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT,
dev_net(skb->dev), NULL, skb, NULL,
- skb_dst(skb)->dev, seg6_input_finish);
+ skb_dst(skb)->dev, in_func);
- return seg6_input_finish(dev_net(skb->dev), NULL, skb);
+ return in_func(dev_net(skb->dev), NULL, skb);
drop:
kfree_skb(skb);
return err;
@@ -554,6 +569,7 @@ static int seg6_input(struct sk_buff *skb)
static int seg6_output_core(struct net *net, struct sock *sk,
struct sk_buff *skb)
{
+ int (*out_func)(struct net *net, struct sock *sk, struct sk_buff *skb);
struct dst_entry *orig_dst = skb_dst(skb);
struct dst_entry *dst = NULL;
struct seg6_lwt *slwt;
@@ -598,14 +614,23 @@ static int seg6_output_core(struct net *net, struct sock *sk,
goto drop;
}
- skb_dst_drop(skb);
- skb_dst_set(skb, dst);
+ /* avoid lwtunnel_output() reentry loop when destination is the same
+ * after transformation
+ */
+ if (orig_dst->lwtstate == dst->lwtstate) {
+ dst_release(dst);
+ out_func = orig_dst->lwtstate->orig_output;
+ } else {
+ skb_dst_drop(skb);
+ skb_dst_set(skb, dst);
+ out_func = dst_output;
+ }
if (static_branch_unlikely(&nf_hooks_lwtunnel_enabled))
return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT, net, sk, skb,
- NULL, skb_dst(skb)->dev, dst_output);
+ NULL, skb_dst(skb)->dev, out_func);
- return dst_output(net, sk, skb);
+ return out_func(net, sk, skb);
drop:
dst_release(dst);
kfree_skb(skb);
--
2.34.1
Powered by blists - more mailing lists