Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp920792pxb; Wed, 1 Sep 2021 12:43:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx19U+0xbaJGNxzO/mzIOu/pXIiYLzDWeKcq9r4c3gdTQQZ9VPDkiwRxMxOAe780rmgIVmp X-Received: by 2002:a50:9f29:: with SMTP id b38mr1291680edf.19.1630525390402; Wed, 01 Sep 2021 12:43:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1630525390; cv=none; d=google.com; s=arc-20160816; b=LVKxp0iaEBjkokKI3PW+ca4k5+8uQ5JEYU0dFB4+7uu2JDkhGAw8b75o39SLJYRjMc LBXlOTolmwJ1Y7UdpA3C5RRoIp6K0DB7pw+1S0A8kzy3YfjLJSCgTX7gYVxIirRM6MND 3HiWRjrUQmlpctTUYDNrmKomca80iFg5mHy7LV9tcSKkBdw9y2Mje29kEMUZSuy78mvq FKb4AYKewAlNB6FArnDwI7Vt2PKI+JdwJONgykV15JwmiGdMXeDkr9l+0PcdMG4rNhUd qL+ylnF1VL+JAhOy4XygYcJOqaqfZPnFoGdOsopyKNo0jEzdUA4zw3VfIN8cusGn3MjT XJLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=TlZnNRrQ10WNaVz/v8pnoSUvl7nLpYrvfiky7OOjCEs=; b=tvCQ+SZUTXJ/BwlYY8ph8WLjhulzmm3GAwhch/tUiZQVh4tmYGiWb4nNqgheuwtlkc bE4ctOod2kto2GkD5I6Uw8Izmn7TGqEO9Yf/0XSsWOYUdHa/Wsl18VRLxYlRlKCPUkp3 /qB+VouGQ7DfUUgPx+fV8RsLEUyL/pOB5u0WArNyN9i6DJEbnh+068zHjZEy0NKi4kln UDlxnKjVkX5Y4uq5OQHe7GFfDa5vorZWjpmeoMMFCaRq1/KMrU6RtqgbFbMCK74mLe0T BjztdyApD8d0FAwP507wMMlyyhja8QOSyaqRQ7m3xUY7LVX/Pq+91wGM6/i5TilCQRYp fJFQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ivW7eD4u; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i29si732509ejo.398.2021.09.01.12.42.46; Wed, 01 Sep 2021 12:43:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ivW7eD4u; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345180AbhIAMvj (ORCPT + 99 others); Wed, 1 Sep 2021 08:51:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:49974 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1346110AbhIAMqk (ORCPT ); Wed, 1 Sep 2021 08:46:40 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id BF75761175; Wed, 1 Sep 2021 12:39:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1630499988; bh=CWl0Xy5b3uEviqJR9nQyplgdzO0aEM7gT0hzN7UQCgU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ivW7eD4uL1lBFsTem8oWfoqMtUn+tLW8QQ24XMj2dVmwV/O/btPhVLPrmtNCzchY4 Z7RNNb/lCsvBnTqYcC5LlRHBwGN63hEPbVY50Bnyg4SU8EhNnuzaw/TttPoxyBTOCW Mz6VNZjTBeynqaJ31y4fby0L8qKpD9EZjnqP/nHE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Andrey Ignatov , "David S. Miller" , Sasha Levin Subject: [PATCH 5.13 059/113] rtnetlink: Return correct error on changing device netns Date: Wed, 1 Sep 2021 14:28:14 +0200 Message-Id: <20210901122303.939945428@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210901122301.984263453@linuxfoundation.org> References: <20210901122301.984263453@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andrey Ignatov [ Upstream commit 96a6b93b69880b2c978e1b2be9cae6970b605008 ] Currently when device is moved between network namespaces using RTM_NEWLINK message type and one of netns attributes (FLA_NET_NS_PID, IFLA_NET_NS_FD, IFLA_TARGET_NETNSID) but w/o specifying IFLA_IFNAME, and target namespace already has device with same name, userspace will get EINVAL what is confusing and makes debugging harder. Fix it so that userspace gets more appropriate EEXIST instead what makes debugging much easier. Before: # ./ifname.sh + ip netns add ns0 + ip netns exec ns0 ip link add l0 type dummy + ip netns exec ns0 ip link show l0 8: l0: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 66:90:b5:d5:78:69 brd ff:ff:ff:ff:ff:ff + ip link add l0 type dummy + ip link show l0 10: l0: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 6e:c6:1f:15:20:8d brd ff:ff:ff:ff:ff:ff + ip link set l0 netns ns0 RTNETLINK answers: Invalid argument After: # ./ifname.sh + ip netns add ns0 + ip netns exec ns0 ip link add l0 type dummy + ip netns exec ns0 ip link show l0 8: l0: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 1e:4a:72:e3:e3:8f brd ff:ff:ff:ff:ff:ff + ip link add l0 type dummy + ip link show l0 10: l0: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether f2:fc:fe:2b:7d:a6 brd ff:ff:ff:ff:ff:ff + ip link set l0 netns ns0 RTNETLINK answers: File exists The problem is that do_setlink() passes its `char *ifname` argument, that it gets from a caller, to __dev_change_net_namespace() as is (as `const char *pat`), but semantics of ifname and pat can be different. For example, __rtnl_newlink() does this: net/core/rtnetlink.c 3270 char ifname[IFNAMSIZ]; ... 3286 if (tb[IFLA_IFNAME]) 3287 nla_strscpy(ifname, tb[IFLA_IFNAME], IFNAMSIZ); 3288 else 3289 ifname[0] = '\0'; ... 3364 if (dev) { ... 3394 return do_setlink(skb, dev, ifm, extack, tb, ifname, status); 3395 } , i.e. do_setlink() gets ifname pointer that is always valid no matter if user specified IFLA_IFNAME or not and then do_setlink() passes this ifname pointer as is to __dev_change_net_namespace() as pat argument. But the pat (pattern) in __dev_change_net_namespace() is used as: net/core/dev.c 11198 err = -EEXIST; 11199 if (__dev_get_by_name(net, dev->name)) { 11200 /* We get here if we can't use the current device name */ 11201 if (!pat) 11202 goto out; 11203 err = dev_get_valid_name(net, dev, pat); 11204 if (err < 0) 11205 goto out; 11206 } As the result the `goto out` path on line 11202 is neven taken and instead of returning EEXIST defined on line 11198, __dev_change_net_namespace() returns an error from dev_get_valid_name() and this, in turn, will be EINVAL for ifname[0] = '\0' set earlier. Fixes: d8a5ec672768 ("[NET]: netlink support for moving devices between network namespaces.") Signed-off-by: Andrey Ignatov Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/core/rtnetlink.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/net/core/rtnetlink.c b/net/core/rtnetlink.c index c6e75bd0035d..89c7369805e9 100644 --- a/net/core/rtnetlink.c +++ b/net/core/rtnetlink.c @@ -2597,6 +2597,7 @@ static int do_setlink(const struct sk_buff *skb, return err; if (tb[IFLA_NET_NS_PID] || tb[IFLA_NET_NS_FD] || tb[IFLA_TARGET_NETNSID]) { + const char *pat = ifname && ifname[0] ? ifname : NULL; struct net *net; int new_ifindex; @@ -2612,7 +2613,7 @@ static int do_setlink(const struct sk_buff *skb, else new_ifindex = 0; - err = __dev_change_net_namespace(dev, net, ifname, new_ifindex); + err = __dev_change_net_namespace(dev, net, pat, new_ifindex); put_net(net); if (err) goto errout; -- 2.30.2