Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp1798239pxp; Mon, 7 Mar 2022 02:35:34 -0800 (PST) X-Google-Smtp-Source: ABdhPJwPr+riNnkoRIiCvrD7JeWxq5PqITCVn82f1BG23Z0S4OTr8j9BRS9afdWPiXyn8Wh8oSrt X-Received: by 2002:a05:6a00:9aa:b0:4f6:ebd0:25bd with SMTP id u42-20020a056a0009aa00b004f6ebd025bdmr8111452pfg.12.1646649334097; Mon, 07 Mar 2022 02:35:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1646649334; cv=none; d=google.com; s=arc-20160816; b=p1HjwNQ3gsPDmYjxHeS4UiGaJDjq4Vc83KCaHrkHvV0pBn1CAw3VyNlN9JWB8sEL2i XEPdUNlqovtIjv1bTIjAPESG3t9gH1caXa8x1Mfl5qBsF6j702TKOsLNItN4R/GWykxd Wufw482IV9YI5emaPICRClgBYbN6/S175beb11kndmvIi0igLOBsackwAUBuMvp1Lki0 zzT/RejOZ4yDrRtoYmmhJKF8+wkP7I/JNUykKbgbR8pJfUjwH3jQW09zH55NtoXO26H6 Z2Dh9+zULZAia1J+rX6QsUcFF46tWXHDPw1jxjrMyMLa5RHkwTG/bn55SA4suLPt+2fm kzEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ArrNbqlwMqCAc5W9/YzotWkQKSy5P6TtYas6XOKX6Zo=; b=KOGs2ZK6NAXwULV2T1nc8NWszyO4POfJn+Syb2qFpSOQesW1WnPbcMKndRLCG40dkY Dk/cpG2zHA3uYUG5zQ8QkRxHcYCJebKPm6Tik09vikPI1TRl5xZDY3aLlYPrMnEyEPds pKU9VhsaPjVmtIFnGjMwKlV/6uEpvUt2BYrbSbw/DeM69OxHt5jZmkqK2ivnVaaoQeiU nVsQp6/PD4bVsRis4ZAmvdywWVBEq01ZIR4l/sjUtItge3FcVkVDYRecrKjQpnORMVie UN9Tgf4iG5loB2aRbt/tYX8Fx/Zp+zu6pp+P7934p3y8/uHwI77CcytQQIMshwNQJlir k1Xg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=mYKahMnu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m194-20020a633fcb000000b00373bd6fea4asi11911015pga.797.2022.03.07.02.35.20; Mon, 07 Mar 2022 02:35:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=mYKahMnu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240637AbiCGKIZ (ORCPT + 99 others); Mon, 7 Mar 2022 05:08:25 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54056 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239559AbiCGJty (ORCPT ); Mon, 7 Mar 2022 04:49:54 -0500 Received: from sin.source.kernel.org (sin.source.kernel.org [IPv6:2604:1380:40e1:4800::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8F38670F41; Mon, 7 Mar 2022 01:43:29 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sin.source.kernel.org (Postfix) with ESMTPS id 3103ACE0E99; Mon, 7 Mar 2022 09:43:23 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1D430C36AE2; Mon, 7 Mar 2022 09:43:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1646646201; bh=Ine+6jSeWmLKe1F1++yX8U/yKTHmdiSmORT2Y+pEfuQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=mYKahMnuO7h2uuuJitOI0pCKWK7ZV6GLqPc2PXYxJROWTwTmowZ3D3dOWWlryWdLg mVw19U0zBMArOockgAqkEA+sy0IjAybZE6yKPsy3G/e6zbCssWVCLSCsd0fOoYhDc7 q73xqGUKapoU66Dt33Y5q+x1Jv7ljz+JaqQPCEFU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sabrina Dubroca , Sven Eckelmann , Simon Wunderlich Subject: [PATCH 5.15 165/262] batman-adv: Dont expect inter-netns unique iflink indices Date: Mon, 7 Mar 2022 10:18:29 +0100 Message-Id: <20220307091707.085974683@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220307091702.378509770@linuxfoundation.org> References: <20220307091702.378509770@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sven Eckelmann commit 6c1f41afc1dbe59d9d3c8bb0d80b749c119aa334 upstream. The ifindex doesn't have to be unique for multiple network namespaces on the same machine. $ ip netns add test1 $ ip -net test1 link add dummy1 type dummy $ ip netns add test2 $ ip -net test2 link add dummy2 type dummy $ ip -net test1 link show dev dummy1 6: dummy1: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 96:81:55:1e:dd:85 brd ff:ff:ff:ff:ff:ff $ ip -net test2 link show dev dummy2 6: dummy2: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 5a:3c:af:35:07:c3 brd ff:ff:ff:ff:ff:ff But the batman-adv code to walk through the various layers of virtual interfaces uses this assumption because dev_get_iflink handles it internally and doesn't return the actual netns of the iflink. And dev_get_iflink only documents the situation where ifindex == iflink for physical devices. But only checking for dev->netdev_ops->ndo_get_iflink is also not an option because ipoib_get_iflink implements it even when it sometimes returns an iflink != ifindex and sometimes iflink == ifindex. The caller must therefore make sure itself to check both netns and iflink + ifindex for equality. Only when they are equal, a "physical" interface was detected which should stop the traversal. On the other hand, vxcan_get_iflink can also return 0 in case there was currently no valid peer. In this case, it is still necessary to stop. Fixes: b7eddd0b3950 ("batman-adv: prevent using any virtual device created on batman-adv as hard-interface") Fixes: 5ed4a460a1d3 ("batman-adv: additional checks for virtual interfaces on top of WiFi") Reported-by: Sabrina Dubroca Signed-off-by: Sven Eckelmann Signed-off-by: Simon Wunderlich Signed-off-by: Greg Kroah-Hartman --- net/batman-adv/hard-interface.c | 19 ++++++++++++++----- 1 file changed, 14 insertions(+), 5 deletions(-) --- a/net/batman-adv/hard-interface.c +++ b/net/batman-adv/hard-interface.c @@ -157,13 +157,15 @@ static bool batadv_is_on_batman_iface(co return true; iflink = dev_get_iflink(net_dev); - - /* no more parents..stop recursion */ - if (iflink == 0 || iflink == net_dev->ifindex) + if (iflink == 0) return false; parent_net = batadv_getlink_net(net_dev, net); + /* iflink to itself, most likely physical device */ + if (net == parent_net && iflink == net_dev->ifindex) + return false; + /* recurse over the parent device */ parent_dev = __dev_get_by_index((struct net *)parent_net, iflink); /* if we got a NULL parent_dev there is something broken.. */ @@ -223,8 +225,7 @@ static struct net_device *batadv_get_rea return NULL; iflink = dev_get_iflink(netdev); - - if (netdev->ifindex == iflink) { + if (iflink == 0) { dev_hold(netdev); return netdev; } @@ -235,6 +236,14 @@ static struct net_device *batadv_get_rea net = dev_net(hard_iface->soft_iface); real_net = batadv_getlink_net(netdev, net); + + /* iflink to itself, most likely physical device */ + if (net == real_net && netdev->ifindex == iflink) { + real_netdev = netdev; + dev_hold(real_netdev); + goto out; + } + real_netdev = dev_get_by_index(real_net, iflink); out: