Received: by 2002:a6b:fb09:0:0:0:0:0 with SMTP id h9csp6579iog; Thu, 16 Jun 2022 20:00:42 -0700 (PDT) X-Google-Smtp-Source: AGRyM1uNQ+0XnIZjvQt2O+pV0iTiKUL2kwXUeli5tEFUclLL7Cz90nCjemv/sP6W/f2Ju8zY379a X-Received: by 2002:a17:902:db06:b0:167:466e:b6fc with SMTP id m6-20020a170902db0600b00167466eb6fcmr7255996plx.108.1655434841992; Thu, 16 Jun 2022 20:00:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1655434841; cv=none; d=google.com; s=arc-20160816; b=OnUNor1GvyI33fnurb7Y87Em4bEyQA9wg5rkfHS/KXC8fEambRzWXWb1TTxYghTJrE 0lDGlZRnexKU6GW5Or2a5B7enNeI6xRPltf/ZVKWu/n5Ez1zDBeIS2SOyAA6nKXZZ3Dt A+u98gHz466FrqZVCoB5ZrqNcAhFmrsOp7OexgIdQyC80zkyfLDpyYH7OOFRBCw6Tm6S p2TRJIzRah/jNTHrfjfTrOIwAsRyGXErHdSpvQdUxCumlhCBS7lR4IhO3Hz41x4qbcL7 nl3KlU8DUCS5y2SBWvuUtKuI3O4trCR84q8GecOYeSfMCoS+0mUw4bSD2DbLFnTUyXbL vj7w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=k1wLpPxyMWL3o7g4obaWOP+HYM5iXHhi755tAhmtcIE=; b=H/S0u1x384Az0e/VfI7Sx2XFpG6Cg5NZPRnf331U+Flsr+5E8qdKNDG8NpaHOdqyUI 9e77ubf9VnlCcSgN/szkeqovoCVYOPe6j1x2+1HUqxEvbfJKrg7WDQnkY/ywyEGkNuqA Mhy1gblinVYYX+a4agLYPrHHSOsihZS6DjYILfvwXfZNLkasDy9mv3KSBopIlMNPjAgf 3mMuhWpDISDDWegImUDOBhDeUimRz4yuolZulV6aqU0mAK8xgNdatIgkttmvlVMdVYkk IKI5YZo8g7ILw8BoycRkJx9XhXZKzYJJisbvzjjFVPALLWmSd0n7x7YmmDxOUnj9lH77 BJKw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=gzHSJMP9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id f22-20020aa782d6000000b0051840478994si4033614pfn.375.2022.06.16.19.59.35; Thu, 16 Jun 2022 20:00:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=gzHSJMP9; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232865AbiFQCiD (ORCPT + 99 others); Thu, 16 Jun 2022 22:38:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51078 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233262AbiFQCiB (ORCPT ); Thu, 16 Jun 2022 22:38:01 -0400 Received: from mail-io1-xd34.google.com (mail-io1-xd34.google.com [IPv6:2607:f8b0:4864:20::d34]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AF3D018B2D for ; Thu, 16 Jun 2022 19:37:59 -0700 (PDT) Received: by mail-io1-xd34.google.com with SMTP id b138so3285489iof.13 for ; Thu, 16 Jun 2022 19:37:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=k1wLpPxyMWL3o7g4obaWOP+HYM5iXHhi755tAhmtcIE=; b=gzHSJMP95bIg5Tk2TEpqJhGrRSMqfqyDcxl8JBKEk4t3a2eIybL23yZX/jwCG9iNuB 53GzohvvQ5wc69u35MCYefyzWSjWTC1iKS7b4O59+PAfu1UtFTqkS0wumBupwplqEuWw xeyz7vVw7qvZeMmZWZL+Snk9LtybUuL0Ob+bYhqhZjTvZSzuHWbrdLkbn9uN6uNPo26o k/i97sdgcYhWSRI8JXpN2AhCWHIJ/LSXwfCxpwuH9yUMriBxamEVZcmvN0F2MYOe5Rms OxvAfwLUurvCXsBjkKyxzIC0tmZMYLmg2/0KigEN74sDtlgMRjIik3GBk+1TxuFfv1jy /BzA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=k1wLpPxyMWL3o7g4obaWOP+HYM5iXHhi755tAhmtcIE=; b=X2hWRTgi5c83I40ceK2j1i1AlvAJi9dxXzrZFGD3ifVgZC7tdmgWZAIFdkQ8O59h1C 5vAg5CJiTr5PCtWre7HDoxh+MMzXoHgdwTzt3uNQbzQclXFTVLIl22UANXUqncyZ2JcD gBQgbK9gGO+PgaXvcKyH6L9su03AmNEXsrDWLy14H7cRGxgK3hdXN8Ja6nWCoe7LRPEu uMAqV/YENj7Ym73vSerPNe2PZGIGyjGhe/Iqs85/LkvW383BoA9RLwRe2dU5enlzpcC3 PZWPUpTE+P5ajKFuomd/BhYUtvCVe3kjQ72FSrFUohX150WE1yyHeUQ/L3301U8G0KcF 0Fgw== X-Gm-Message-State: AJIora/gN4VYlLW9tRkhAx5+A0MXzn4BJnosRWyEi+OblOQM8ZlPc3gB 9352QS0cSDh9ki+ODpRfTAnpVc0Q2pRsv+WEqApcAg== X-Received: by 2002:a05:6638:264e:b0:333:e9ca:a674 with SMTP id n14-20020a056638264e00b00333e9caa674mr4593962jat.85.1655433478795; Thu, 16 Jun 2022 19:37:58 -0700 (PDT) MIME-Version: 1.0 References: <20220617020213.1881452-1-cmllamas@google.com> In-Reply-To: <20220617020213.1881452-1-cmllamas@google.com> From: =?UTF-8?Q?Maciej_=C5=BBenczykowski?= Date: Thu, 16 Jun 2022 19:37:47 -0700 Message-ID: Subject: Re: [PATCH net] ipv4: ping: fix bind address validity check To: Carlos Llamas Cc: "David S . Miller" , Hideaki YOSHIFUJI , David Ahern , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Riccardo Paolo Bestetti , kernel-team@android.com, Kernel hackers , Linux NetDev , Miaohe Lin Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 16, 2022 at 7:02 PM Carlos Llamas wrote: > > Commit 8ff978b8b222 ("ipv4/raw: support binding to nonlocal addresses") > introduced a helper function to fold duplicated validity checks of bind > addresses into inet_addr_valid_or_nonlocal(). However, this caused an > unintended regression in ping_check_bind_addr(), which previously would > reject binding to multicast and broadcast addresses, but now these are > both incorrectly allowed as reported in [1]. > > This patch restores the original check. A simple reordering is done to > improve readability and make it evident that multicast and broadcast > addresses should not be allowed. Also, add an early exit for INADDR_ANY > which replaces lost behavior added by commit 0ce779a9f501 ("net: Avoid > unnecessary inet_addr_type() call when addr is INADDR_ANY"). > > [1] https://lore.kernel.org/netdev/CANP3RGdkAcDyAZoT1h8Gtuu0saq+eOrrTiWbx= nOs+5zn+cpyKg@mail.gmail.com/ > > Fixes: 8ff978b8b222 ("ipv4/raw: support binding to nonlocal addresses") > Cc: Miaohe Lin > Cc: Riccardo Paolo Bestetti > Reported-by: Maciej =C5=BBenczykowski > Signed-off-by: Carlos Llamas > --- > net/ipv4/ping.c | 10 +++++++--- > 1 file changed, 7 insertions(+), 3 deletions(-) > > diff --git a/net/ipv4/ping.c b/net/ipv4/ping.c > index 1a43ca73f94d..3c6101def7d6 100644 > --- a/net/ipv4/ping.c > +++ b/net/ipv4/ping.c > @@ -319,12 +319,16 @@ static int ping_check_bind_addr(struct sock *sk, st= ruct inet_sock *isk, > pr_debug("ping_check_bind_addr(sk=3D%p,addr=3D%pI4,port= =3D%d)\n", > sk, &addr->sin_addr.s_addr, ntohs(addr->sin_port= )); > > + if (addr->sin_addr.s_addr =3D=3D htonl(INADDR_ANY)) > + return 0; > + > tb_id =3D l3mdev_fib_table_by_index(net, sk->sk_bound_dev= _if) ? : tb_id; > chk_addr_ret =3D inet_addr_type_table(net, addr->sin_addr= .s_addr, tb_id); > > - if (!inet_addr_valid_or_nonlocal(net, inet_sk(sk), > - addr->sin_addr.s_addr, > - chk_addr_ret)) > + if (chk_addr_ret =3D=3D RTN_MULTICAST || > + chk_addr_ret =3D=3D RTN_BROADCAST || > + (chk_addr_ret !=3D RTN_LOCAL && > + !inet_can_nonlocal_bind(net, isk))) > return -EADDRNOTAVAIL; > > #if IS_ENABLED(CONFIG_IPV6) > -- > 2.36.1.476.g0c4daa206d-goog Reviewed-by: Maciej =C5=BBenczykowski