Received: by 2002:a05:6a10:5bc5:0:0:0:0 with SMTP id os5csp1619260pxb; Mon, 11 Oct 2021 09:36:13 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwR4cvJr6f7jzIlatg7x8vWwub/CeFvH860Vetxh/5Imx/+1qTAb3nKgaUFvuD2G0nNsSDE X-Received: by 2002:a17:90a:eb07:: with SMTP id j7mr37075pjz.20.1633970173731; Mon, 11 Oct 2021 09:36:13 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633970173; cv=none; d=google.com; s=arc-20160816; b=ZzhyWvFEbnoi/Budrgj75qvhLlLU8fOH1EypwskW16FVme+Ec4ODwagDLnV3PnXwD2 I0pigko4ndStCXLgaKApqThlTjkkU8XACiIR0v0OmP9eJPUv5kXivxuxBp3Jg9al4ge6 PsVxX7k1sThqmcp7OzPTsHPOs1rAbrgCoj7W4jIRkFaHdWvqOZBqbHqfudVkxSlD6Z8S EDB2jicFj5PPISuzUdvWjUnpq4dAq3l8/2ZfeHeNMfhSTwP77vzY162H9MdRDFyNmJNI bXqc8g4ipGnba4v31aB9Pu/oMCTEBzdrAohEjMIfCyJZFddZjNE1bHP19G4P5e2g3zE2 LfpA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Z7k9S9SL8txwYKk/Yj+r+tNoDIpyyHo2DwkcwiC+JaM=; b=y9pgppMhksTJ46ls961r8Hg/wDsJ50lebVaXJ6GgkVLSLuEywDpJ1L9D+OcfRh7VEL qvuE/4Sio3pAkuoz8GbDtE63G6ifSKPjPgRD0hjT7PrqJcJzntiRdG6erSXZgJOorYdT Z/bnDikW7S2dItOSYtIbADkDLH8UPa1Ks7IKtUnGS5quM82jTwq+icOYcknhLEbTs2m4 r+c4Gp1ZCE7EComiYhjdVvIT3xFHFEzzIQFXmx5m6S/iD80pxv/OTxyqkD699X7BN7VH 8e0AiYwxeGyJNOW/mz6YboZZvJpm+QehfC/IN7qnuj8obcsDD4Gzoe+8fTgHakfbg4Qt KSwA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=e4RITpgd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 10si10647192pfl.261.2021.10.11.09.36.01; Mon, 11 Oct 2021 09:36:13 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=e4RITpgd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243115AbhJKOMm (ORCPT + 99 others); Mon, 11 Oct 2021 10:12:42 -0400 Received: from mail.kernel.org ([198.145.29.99]:33954 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240932AbhJKOJn (ORCPT ); Mon, 11 Oct 2021 10:09:43 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 023F56113E; Mon, 11 Oct 2021 14:02:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1633960930; bh=3+anbr1w9S+ZkJqAyWxH8wZP/pLu7gTQNnv4+8Bd+TM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=e4RITpgdWzI3FLRbfHaqMp421+zjQsEg/kJC3rNHfvUrK+K0j+rq4tCf1jv2LwRze uSMZG0JQytrADQ2Wy1AppaeBZ3XYyB265jAdJciKV+YxauBaoqWb32dyCB8pALAOao UzwBxF0vlPVNwZQytMSXAzZ0Ri3BXM62b+YfkT0U= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mike Manning , David Ahern , Jakub Kicinski , Sasha Levin Subject: [PATCH 5.14 117/151] net: prefer socket bound to interface when not in VRF Date: Mon, 11 Oct 2021 15:46:29 +0200 Message-Id: <20211011134521.599810189@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20211011134517.833565002@linuxfoundation.org> References: <20211011134517.833565002@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mike Manning [ Upstream commit 8d6c414cd2fb74aa6812e9bfec6178f8246c4f3a ] The commit 6da5b0f027a8 ("net: ensure unbound datagram socket to be chosen when not in a VRF") modified compute_score() so that a device match is always made, not just in the case of an l3mdev skb, then increments the score also for unbound sockets. This ensures that sockets bound to an l3mdev are never selected when not in a VRF. But as unbound and bound sockets are now scored equally, this results in the last opened socket being selected if there are matches in the default VRF for an unbound socket and a socket bound to a dev that is not an l3mdev. However, handling prior to this commit was to always select the bound socket in this case. Reinstate this handling by incrementing the score only for bound sockets. The required isolation due to choosing between an unbound socket and a socket bound to an l3mdev remains in place due to the device match always being made. The same approach is taken for compute_score() for stream sockets. Fixes: 6da5b0f027a8 ("net: ensure unbound datagram socket to be chosen when not in a VRF") Fixes: e78190581aff ("net: ensure unbound stream socket to be chosen when not in a VRF") Signed-off-by: Mike Manning Reviewed-by: David Ahern Link: https://lore.kernel.org/r/cf0a8523-b362-1edf-ee78-eef63cbbb428@gmail.com Signed-off-by: Jakub Kicinski Signed-off-by: Sasha Levin --- net/ipv4/inet_hashtables.c | 4 +++- net/ipv4/udp.c | 3 ++- net/ipv6/inet6_hashtables.c | 2 +- net/ipv6/udp.c | 3 ++- 4 files changed, 8 insertions(+), 4 deletions(-) diff --git a/net/ipv4/inet_hashtables.c b/net/ipv4/inet_hashtables.c index 80aeaf9e6e16..bfb522e51346 100644 --- a/net/ipv4/inet_hashtables.c +++ b/net/ipv4/inet_hashtables.c @@ -242,8 +242,10 @@ static inline int compute_score(struct sock *sk, struct net *net, if (!inet_sk_bound_dev_eq(net, sk->sk_bound_dev_if, dif, sdif)) return -1; + score = sk->sk_bound_dev_if ? 2 : 1; - score = sk->sk_family == PF_INET ? 2 : 1; + if (sk->sk_family == PF_INET) + score++; if (READ_ONCE(sk->sk_incoming_cpu) == raw_smp_processor_id()) score++; } diff --git a/net/ipv4/udp.c b/net/ipv4/udp.c index 915ea635b2d5..cbc7907f79b8 100644 --- a/net/ipv4/udp.c +++ b/net/ipv4/udp.c @@ -390,7 +390,8 @@ static int compute_score(struct sock *sk, struct net *net, dif, sdif); if (!dev_match) return -1; - score += 4; + if (sk->sk_bound_dev_if) + score += 4; if (READ_ONCE(sk->sk_incoming_cpu) == raw_smp_processor_id()) score++; diff --git a/net/ipv6/inet6_hashtables.c b/net/ipv6/inet6_hashtables.c index 55c290d55605..67c9114835c8 100644 --- a/net/ipv6/inet6_hashtables.c +++ b/net/ipv6/inet6_hashtables.c @@ -106,7 +106,7 @@ static inline int compute_score(struct sock *sk, struct net *net, if (!inet_sk_bound_dev_eq(net, sk->sk_bound_dev_if, dif, sdif)) return -1; - score = 1; + score = sk->sk_bound_dev_if ? 2 : 1; if (READ_ONCE(sk->sk_incoming_cpu) == raw_smp_processor_id()) score++; } diff --git a/net/ipv6/udp.c b/net/ipv6/udp.c index 80ae024d13c8..ba77955d75fb 100644 --- a/net/ipv6/udp.c +++ b/net/ipv6/udp.c @@ -133,7 +133,8 @@ static int compute_score(struct sock *sk, struct net *net, dev_match = udp_sk_bound_dev_eq(net, sk->sk_bound_dev_if, dif, sdif); if (!dev_match) return -1; - score++; + if (sk->sk_bound_dev_if) + score++; if (READ_ONCE(sk->sk_incoming_cpu) == raw_smp_processor_id()) score++; -- 2.33.0