Received: by 2002:ac0:a679:0:0:0:0:0 with SMTP id p54csp550679imp; Thu, 21 Feb 2019 06:41:18 -0800 (PST) X-Google-Smtp-Source: AHgI3IZiY+xEFsh2Wp/yaV+2gXBUKzOoZoSBjT8TCnLvDIHFRqZgzsMKFt4/HFUApxFE3s10pTW7 X-Received: by 2002:a17:902:8485:: with SMTP id c5mr12728893plo.67.1550760078285; Thu, 21 Feb 2019 06:41:18 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550760078; cv=none; d=google.com; s=arc-20160816; b=m3vXwz1fYgmJyHBZoqjXjCdcKmO8/o7wwYNj4V4yuhpDDkvOT8a+PHdrDong2CCP/+ mnV0NgtqdaPL3H4mnNwp/WQFJ76KVTDMhMKTn6OhRfBsNDZKGVMd0mKGAhFY0+QvTDXy 8rTXH6JDrT0u4nKtaVtYv02BhdMvFE8wLAkf4AiqD8F1B6I5RxNO5QKGLO+43Ck7aSde nC79/VPHIAoV0B5T/9O5LZwNt4EGcf1GmKP6AD9LKv6m29nLRuEcBEEBSSsMXaC5xBS8 r8eOUhVbbc+1gJ5+JDD2poQHiGsTBm12e1LeFkK0ZtsJ6cfs3ykbsKPKmQRPQZTPrVx2 m1Mg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=PvKGZg0WcxNg4fDF5wU5/01ZNET78K4+G9wdhO2PkDc=; b=I5pyycqZen8hdUMuB/HdRE5JLOQzDdPXbqC7wXRDv8aJ4nSnqEf8Vf7BUX+e1xxBzv g6HYDxZYjrMgxIr1choxC6mAXAIcjquJPdX/GAmiH9plFBFBpNvwS2kL5/3uqyzTsUQs zSxRXOjG7vTbPQeFW0u1uH2FP4wgiVN2+mcDv9wGysyVRLoWZc2ZHBorkpFyBMkywh+T FCghOylFtOkj61ynmB04aCUck7yaUcgY/UfS72/5nLXYcE2HtOuyHIVQibQbLQvct8gu ZnbO1KybFXR89r/ClEhD/UmkBzy/XXa7W/Xb5gNWBurDyzwFIKXTPBvluPCxNhTmWQ25 LTPg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kjCc6b9f; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z72si3485667pgd.296.2019.02.21.06.41.02; Thu, 21 Feb 2019 06:41:18 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=kjCc6b9f; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728146AbfBUOi3 (ORCPT + 99 others); Thu, 21 Feb 2019 09:38:29 -0500 Received: from mail.kernel.org ([198.145.29.99]:60146 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728017AbfBUOiY (ORCPT ); Thu, 21 Feb 2019 09:38:24 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id C5B1E20838; Thu, 21 Feb 2019 14:38:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550759904; bh=uv7b01cQorbXz+7St115iDa50UqJ7D85Lji5byVFoQ0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=kjCc6b9fWuT15P8oFMpiKWMXqT6Y3HQmR4qD8R0FzJEntPiYxptVhDjCUSH05iGp8 vbpBUoXlS0iF8UtNKAMPudev60vRKOuTgOZfvt/9iCHD/vvQAbh1RqjwNAbohuHk7Y 2eJeiQzgJvi9enjrvgq9fbeGF/9o9Kl+aUeNkCA0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Zhiqiang Liu , Wenhao Zhang , "David S. Miller" , Sasha Levin Subject: [PATCH 4.9 01/20] net: fix IPv6 prefix route residue Date: Thu, 21 Feb 2019 15:35:39 +0100 Message-Id: <20190221125242.327470052@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190221125242.153179182@linuxfoundation.org> References: <20190221125242.153179182@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit e75913c93f7cd5f338ab373c34c93a655bd309cb ] Follow those steps: # ip addr add 2001:123::1/32 dev eth0 # ip addr add 2001:123:456::2/64 dev eth0 # ip addr del 2001:123::1/32 dev eth0 # ip addr del 2001:123:456::2/64 dev eth0 and then prefix route of 2001:123::1/32 will still exist. This is because ipv6_prefix_equal in check_cleanup_prefix_route func does not check whether two IPv6 addresses have the same prefix length. If the prefix of one address starts with another shorter address prefix, even though their prefix lengths are different, the return value of ipv6_prefix_equal is true. Here I add a check of whether two addresses have the same prefix to decide whether their prefixes are equal. Fixes: 5b84efecb7d9 ("ipv6 addrconf: don't cleanup prefix route for IFA_F_NOPREFIXROUTE") Signed-off-by: Zhiqiang Liu Reported-by: Wenhao Zhang Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/ipv6/addrconf.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/net/ipv6/addrconf.c b/net/ipv6/addrconf.c index 8f79f0414bc3f..4ce7f91951510 100644 --- a/net/ipv6/addrconf.c +++ b/net/ipv6/addrconf.c @@ -1074,7 +1074,8 @@ check_cleanup_prefix_route(struct inet6_ifaddr *ifp, unsigned long *expires) list_for_each_entry(ifa, &idev->addr_list, if_list) { if (ifa == ifp) continue; - if (!ipv6_prefix_equal(&ifa->addr, &ifp->addr, + if (ifa->prefix_len != ifp->prefix_len || + !ipv6_prefix_equal(&ifa->addr, &ifp->addr, ifp->prefix_len)) continue; if (ifa->flags & (IFA_F_PERMANENT | IFA_F_NOPREFIXROUTE)) -- 2.19.1