Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp158508ybz; Thu, 23 Apr 2020 20:52:36 -0700 (PDT) X-Google-Smtp-Source: APiQypIpWnXv/FJdoJdaQ4ksdn4+PKfwBRfY6q3f/MLib6ObYIsVtkqVwO85zr0J6xbOV6a9xLEe X-Received: by 2002:aa7:d3cb:: with SMTP id o11mr5337714edr.194.1587700356616; Thu, 23 Apr 2020 20:52:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587700356; cv=none; d=google.com; s=arc-20160816; b=tdiN0MtVw5BhZlugK0r/XSCqwDM/817aGyTjjil9JsEnyvMgE5B0anMV/9+peBSm/G Hoz0tm9Xd+fibTd7KA282K+BSHoaLLG7tuUEhMBXz+pGJYBPzYJ41djEu5blVvCps3/C kZXHyHmDDlRClnGd5IKcO5l5SN0Ft2cJBMmjZ1wEBmRSvieL3yy+75cE0a2Pqz5D9TJ0 H3EkkNtMbXeGz5vhqXYmASLo2pa9mtEpY9bKO1NszgOBUiRIyMCqg7Ta5yCICXcD/buQ l1Pit95RJc2eHULnQyswtkJl9xmh6qGcFEThtUTkCdoLFnrCIFX0Fp/xJrnoYtduKl7Y dJQA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:cc:references:to :subject; bh=JXJcYPBLFqJMIVGl2Fh6wCRan0Hl7irbVvsqT3MS1Yo=; b=YbCa1iQFBjAvc1SZ2I9AnmQeBSW5E7KJw6gZvy8tledPHJNCnYKVy0995rB1f3EHIR S8nJTsx0nL9XHn8dpVe1quHnSYN6iV3mAUa1FjMxogAI17vFJ3NelSLqrmRZypSHfIAL g1N9XG85OJwUmxe2EGjIvcxqgPdOmMoo02ABgXcEOexP87721uYDpZFIiWZ2hnTLuLQ0 fKvklemk/ZO7CTE2La5XqPpTs8/dvkFv0deJsK8IqdRSzNKXeEJjh1q0FEp80r1VsREg MYJDNnLfTpXzcbkZcdiQ1bpBLHH6kHb+1g2um+VIKsrVEeeU+tV86jqllyaanEQ7t4Ip ORFQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l9si2496189ejc.237.2020.04.23.20.52.12; Thu, 23 Apr 2020 20:52:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726472AbgDXDsa (ORCPT + 99 others); Thu, 23 Apr 2020 23:48:30 -0400 Received: from szxga04-in.huawei.com ([45.249.212.190]:2892 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725823AbgDXDs3 (ORCPT ); Thu, 23 Apr 2020 23:48:29 -0400 Received: from DGGEMS402-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id DF85C2F4996050ACE8C5; Fri, 24 Apr 2020 11:48:26 +0800 (CST) Received: from [127.0.0.1] (10.166.215.154) by DGGEMS402-HUB.china.huawei.com (10.3.19.202) with Microsoft SMTP Server id 14.3.487.0; Fri, 24 Apr 2020 11:48:25 +0800 Subject: Re: [PATCH] xfrm: policy: Only use mark as policy lookup key To: Xin Long References: <20200421143149.45108-1-yuehaibing@huawei.com> <20200422093344.GY13121@gauss3.secunet.de> <1650fd55-dd70-f687-88b6-d32a04245915@huawei.com> <02a56d2c-8d27-f53a-d9e3-c25bd03677c8@huawei.com> CC: Steffen Klassert , Herbert Xu , davem , , network dev , LKML , Jamal Hadi Salim From: Yuehaibing Message-ID: Date: Fri, 24 Apr 2020 11:48:24 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.166.215.154] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020/4/23 17:43, Xin Long wrote: > On Thu, Apr 23, 2020 at 4:41 PM Yuehaibing wrote: >> >> On 2020/4/23 14:37, Xin Long wrote: >>> On Thu, Apr 23, 2020 at 10:26 AM Yuehaibing wrote: >>>> >>>> On 2020/4/22 23:41, Xin Long wrote: >>>>> On Wed, Apr 22, 2020 at 8:18 PM Yuehaibing wrote: >>>>>> >>>>>> On 2020/4/22 17:33, Steffen Klassert wrote: >>>>>>> On Tue, Apr 21, 2020 at 10:31:49PM +0800, YueHaibing wrote: >>>>>>>> While update xfrm policy as follow: >>>>>>>> >>>>>>>> ip -6 xfrm policy update src fd00::1/128 dst fd00::2/128 dir in \ >>>>>>>> priority 1 mark 0 mask 0x10 >>>>>>>> ip -6 xfrm policy update src fd00::1/128 dst fd00::2/128 dir in \ >>>>>>>> priority 2 mark 0 mask 0x00 >>>>>>>> ip -6 xfrm policy update src fd00::1/128 dst fd00::2/128 dir in \ >>>>>>>> priority 2 mark 0 mask 0x10 >>>>>>>> >>>>>>>> We get this warning: >>>>>>>> >>>>>>>> WARNING: CPU: 0 PID: 4808 at net/xfrm/xfrm_policy.c:1548 >>>>>>>> Kernel panic - not syncing: panic_on_warn set ... >>>>>>>> CPU: 0 PID: 4808 Comm: ip Not tainted 5.7.0-rc1+ #151 >>>>>>>> Call Trace: >>>>>>>> RIP: 0010:xfrm_policy_insert_list+0x153/0x1e0 >>>>>>>> xfrm_policy_inexact_insert+0x70/0x330 >>>>>>>> xfrm_policy_insert+0x1df/0x250 >>>>>>>> xfrm_add_policy+0xcc/0x190 [xfrm_user] >>>>>>>> xfrm_user_rcv_msg+0x1d1/0x1f0 [xfrm_user] >>>>>>>> netlink_rcv_skb+0x4c/0x120 >>>>>>>> xfrm_netlink_rcv+0x32/0x40 [xfrm_user] >>>>>>>> netlink_unicast+0x1b3/0x270 >>>>>>>> netlink_sendmsg+0x350/0x470 >>>>>>>> sock_sendmsg+0x4f/0x60 >>>>>>>> >>>>>>>> Policy C and policy A has the same mark.v and mark.m, so policy A is >>>>>>>> matched in first round lookup while updating C. However policy C and >>>>>>>> policy B has same mark and priority, which also leads to matched. So >>>>>>>> the WARN_ON is triggered. >>>>>>>> >>>>>>>> xfrm policy lookup should only be matched when the found policy has the >>>>>>>> same lookup keys (mark.v & mark.m) no matter priority. >>>>>>>> >>>>>>>> Fixes: 7cb8a93968e3 ("xfrm: Allow inserting policies with matching mark and different priorities") >>>>>>>> Signed-off-by: YueHaibing >>>>>>>> --- >>>>>>>> net/xfrm/xfrm_policy.c | 16 +++++----------- >>>>>>>> 1 file changed, 5 insertions(+), 11 deletions(-) >>>>>>>> >>>>>>>> diff --git a/net/xfrm/xfrm_policy.c b/net/xfrm/xfrm_policy.c >>>>>>>> index 297b2fd..67d0469 100644 >>>>>>>> --- a/net/xfrm/xfrm_policy.c >>>>>>>> +++ b/net/xfrm/xfrm_policy.c >>>>>>>> @@ -1436,13 +1436,7 @@ static void xfrm_policy_requeue(struct xfrm_policy *old, >>>>>>>> static bool xfrm_policy_mark_match(struct xfrm_policy *policy, >>>>>>>> struct xfrm_policy *pol) >>>>>>>> { >>>>>>>> - u32 mark = policy->mark.v & policy->mark.m; >>>>>>>> - >>>>>>>> - if (policy->mark.v == pol->mark.v && policy->mark.m == pol->mark.m) >>>>>>>> - return true; >>>>>>>> - >>>>>>>> - if ((mark & pol->mark.m) == pol->mark.v && >>>>>>>> - policy->priority == pol->priority) >>>>>>> >>>>>>> If you remove the priority check, you can't insert policies with matching >>>>>>> mark and different priorities anymore. This brings us back the old bug. >>>>>> >>>>>> Yes, this is true. >>>>>> >>>>>>> >>>>>>> I plan to apply the patch from Xin Long, this seems to be the right way >>>>>>> to address this problem. >>>>>> >>>>>> That still brings an issue, update like this: >>>>>> >>>>>> policy A (mark.v = 1, mark.m = 0, priority = 1) >>>>>> policy B (mark.v = 1, mark.m = 0, priority = 1) >>>>>> >>>>>> A and B will all in the list. >>>>> I think this is another issue even before: >>>>> 7cb8a93968e3 ("xfrm: Allow inserting policies with matching mark and >>>>> different priorities") >>>>> >>>>>> >>>>>> So should do this: >>>>>> >>>>>> static bool xfrm_policy_mark_match(struct xfrm_policy *policy, >>>>>> struct xfrm_policy *pol) >>>>>> { >>>>>> - u32 mark = policy->mark.v & policy->mark.m; >>>>>> - >>>>>> - if (policy->mark.v == pol->mark.v && policy->mark.m == pol->mark.m) >>>>>> - return true; >>>>>> - >>>>>> - if ((mark & pol->mark.m) == pol->mark.v && >>>>>> + if ((policy->mark.v & policy->mark.m) == (pol->mark.v & pol->mark.m) && >>>>>> policy->priority == pol->priority) >>>>>> return true; >>>>> "mark.v & mark.m" looks weird to me, it should be: >>>>> ((something & mark.m) == mark.v) >>>>> >>>>> So why should we just do this here?: >>>>> (policy->mark.v == pol->mark.v && policy->mark.m == pol->mark.m && >>>>> policy->priority == pol->priority) >>>> >>>> >>>> This leads to this issue: >>>> >>>> ip -6 xfrm policy add src fd00::1/128 dst fd00::2/128 dir in mark 0x00000001 mask 0x00000005 >>>> ip -6 xfrm policy add src fd00::1/128 dst fd00::2/128 dir in mark 0x00000001 mask 0x00000003 >>>> >>>> the two policies will be in list, which should not be allowed. >>> I think these are two different policies. >>> For instance: >>> mark = 0x1234567b will match the 1st one only. >>> mark = 0x1234567d will match the 2st one only >>> >>> So these should have been allowed, no? >> >> If mark = 0x12345671, it may match different policy depends on the order of inserting, >> >> ip xfrm policy update src 172.16.2.0/24 dst 172.16.1.0/24 dir in ptype main \ >> tmpl src 192.168.2.10 dst 192.168.1.20 proto esp mode tunnel mark 0x00000001 mask 0x00000005 >> >> ip xfrm policy update src 172.16.2.0/24 dst 172.16.1.0/24 dir in ptype main \ >> tmpl src 192.168.2.100 dst 192.168.1.100 proto esp mode beet mark 0x00000001 mask 0x00000003 >> >> In fact, your case should use different priority to match. > Sorry, but it does match your above policies now, like in xfrm_policy_match(), > when fl->flowi_mark == 0x1234567b: > > (fl->flowi_mark & pol->mark.m) != pol->mark.v > 0x1234567b & 0x00000005 == 0x00000001 > > and when fl->flowi_mark == 0x1234567d: > 0x1234567d & 0x00000003 == 0x00000001 > > am I missing something? when fl->flowi_mark == 0x12345671 0x12345671 & 0x00000005 == 0x00000001 0x12345671 & 0x00000003 == 0x00000001 This will match different policy depends on the order of policy inserting, it is not expected. > > >> >>> >>> I'm actually confused now. >>> does the mask work against its own value, or the other value? >>> as 'A == (mark.v&mark.m)' and '(A & mark.m) == mark.v' are different things. >>> >>> This can date back to Jamal's xfrm by MARK: >>> >>> https://lwn.net/Articles/375829/ >>> >>> where it does 'm->v & m->m' in xfrm_mark_get() and >>> 'policy->mark.v & policy->mark.m' in xfrm_policy_insert() while >>> it does '(A & pol->mark.m) == pol->mark.v' in other places. >>> >>> Now I'm thinking 'm->v & m->m' is meaningless, by which if we get >>> a value != m->v, it means this mark can never be matched by any. >>> >>> policy A (mark.v = 1, mark.m = 0, priority = 1) >>> policy B (mark.v = 1, mark.m = 0, priority = 1) >>> >>> So probably we should avoid this case by check m->v == (m->v & m->m) >>> when adding a new policy. >>> >>> wdyt? >>> >> > > . >