mbox series

[SRU,F/E/B/X,0/2] ipsec interfaces: fix sending with bpf_redirect() / AF_PACKET sockets

Message ID 20200210165917.23193-1-kelsey.skunberg@canonical.com
Headers show
Series ipsec interfaces: fix sending with bpf_redirect() / AF_PACKET sockets | expand

Message

Kelsey Skunberg Feb. 10, 2020, 4:59 p.m. UTC
BugLink: https://bugs.launchpad.net/bugs/1860969

[SRU Justification]

[Impact]

Packets sent to a vti[6]/xfrm interface via bpf_redirect() or via an AF_PACKET socket are dropped (no carrier).

This has been fixed in v5.5 by the following upstream commits
 - 95224166a903 ("vti[6]: fix packet tx through bpf_redirect()")
 - f042365dbffe ("xfrm interface: fix packet tx through bpf_redirect()")

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=95224166a903
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f042365dbffe

The bug exists since the beginning of each driver.

== Fix ==

Backport the requested patches to Focal (5.4), Eoan (5.3), Bionic (4.15) and
Xenial (4.4).

== Risk of Regression ==

This patch affects only the cases described above (when no dst is attached to the skb), thus the risk should be low.

Nicolas Dichtel (2):
  vti[6]: fix packet tx through bpf_redirect()
  xfrm interface: fix packet tx through bpf_redirect()

 net/ipv4/ip_vti.c         | 13 +++++++++++--
 net/ipv6/ip6_vti.c        | 13 +++++++++++--
 net/xfrm/xfrm_interface.c | 32 +++++++++++++++++++++++++-------
 3 files changed, 47 insertions(+), 11 deletions(-)

Comments

Sultan Alsawaf Feb. 11, 2020, 1:12 a.m. UTC | #1
On Mon, Feb 10, 2020 at 09:59:15AM -0700, Kelsey Skunberg wrote:
> BugLink: https://bugs.launchpad.net/bugs/1860969
> 
> [SRU Justification]
> 
> [Impact]
> 
> Packets sent to a vti[6]/xfrm interface via bpf_redirect() or via an AF_PACKET socket are dropped (no carrier).
> 
> This has been fixed in v5.5 by the following upstream commits
>  - 95224166a903 ("vti[6]: fix packet tx through bpf_redirect()")
>  - f042365dbffe ("xfrm interface: fix packet tx through bpf_redirect()")
> 
> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=95224166a903
> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f042365dbffe
> 
> The bug exists since the beginning of each driver.
> 
> == Fix ==
> 
> Backport the requested patches to Focal (5.4), Eoan (5.3), Bionic (4.15) and
> Xenial (4.4).
> 
> == Risk of Regression ==
> 
> This patch affects only the cases described above (when no dst is attached to the skb), thus the risk should be low.
> 
> Nicolas Dichtel (2):
>   vti[6]: fix packet tx through bpf_redirect()
>   xfrm interface: fix packet tx through bpf_redirect()
> 
>  net/ipv4/ip_vti.c         | 13 +++++++++++--
>  net/ipv6/ip6_vti.c        | 13 +++++++++++--
>  net/xfrm/xfrm_interface.c | 32 +++++++++++++++++++++++++-------
>  3 files changed, 47 insertions(+), 11 deletions(-)
> 
> -- 
> 2.20.1
> 
> 
> -- 
> kernel-team mailing list
> kernel-team@lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team

Could you clean up the cover letter? I know you copied it from the bug, which is
fine, but it looks like the bug reporter is !Canonical and kinda botched the
formatting (i.e., SRU justification is missing and it seems like some of the
content is placed under the wrong header).

Please also wrap the cover letter text to 80 columns.

Thanks!
Sultan
Sultan Alsawaf Feb. 12, 2020, 5:28 p.m. UTC | #2
On Mon, Feb 10, 2020 at 05:12:16PM -0800, Sultan Alsawaf wrote:
> On Mon, Feb 10, 2020 at 09:59:15AM -0700, Kelsey Skunberg wrote:
> > BugLink: https://bugs.launchpad.net/bugs/1860969
> > 
> > [SRU Justification]
> > 
> > [Impact]
> > 
> > Packets sent to a vti[6]/xfrm interface via bpf_redirect() or via an AF_PACKET socket are dropped (no carrier).
> > 
> > This has been fixed in v5.5 by the following upstream commits
> >  - 95224166a903 ("vti[6]: fix packet tx through bpf_redirect()")
> >  - f042365dbffe ("xfrm interface: fix packet tx through bpf_redirect()")
> > 
> > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=95224166a903
> > https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f042365dbffe
> > 
> > The bug exists since the beginning of each driver.
> > 
> > == Fix ==
> > 
> > Backport the requested patches to Focal (5.4), Eoan (5.3), Bionic (4.15) and
> > Xenial (4.4).
> > 
> > == Risk of Regression ==
> > 
> > This patch affects only the cases described above (when no dst is attached to the skb), thus the risk should be low.
> > 
> > Nicolas Dichtel (2):
> >   vti[6]: fix packet tx through bpf_redirect()
> >   xfrm interface: fix packet tx through bpf_redirect()
> > 
> >  net/ipv4/ip_vti.c         | 13 +++++++++++--
> >  net/ipv6/ip6_vti.c        | 13 +++++++++++--
> >  net/xfrm/xfrm_interface.c | 32 +++++++++++++++++++++++++-------
> >  3 files changed, 47 insertions(+), 11 deletions(-)
> > 
> > -- 
> > 2.20.1
> > 
> > 
> > -- 
> > kernel-team mailing list
> > kernel-team@lists.ubuntu.com
> > https://lists.ubuntu.com/mailman/listinfo/kernel-team
> 
> Could you clean up the cover letter? I know you copied it from the bug, which is
> fine, but it looks like the bug reporter is !Canonical and kinda botched the
> formatting (i.e., SRU justification is missing and it seems like some of the
> content is placed under the wrong header).
> 
> Please also wrap the cover letter text to 80 columns.
> 
> Thanks!
> Sultan

After consulting the almighty wiki[1], it looks like this is actually correct.

Carry on!

Sultan

[1] https://wiki.ubuntu.com/KernelTeam/KernelUpdates
Kleber Sacilotto de Souza Feb. 13, 2020, 9:32 a.m. UTC | #3
On 10.02.20 17:59, Kelsey Skunberg wrote:
> BugLink: https://bugs.launchpad.net/bugs/1860969
> 
> [SRU Justification]
> 
> [Impact]
> 
> Packets sent to a vti[6]/xfrm interface via bpf_redirect() or via an AF_PACKET socket are dropped (no carrier).
> 
> This has been fixed in v5.5 by the following upstream commits
>  - 95224166a903 ("vti[6]: fix packet tx through bpf_redirect()")
>  - f042365dbffe ("xfrm interface: fix packet tx through bpf_redirect()")
> 
> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=95224166a903
> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f042365dbffe
> 
> The bug exists since the beginning of each driver.
> 
> == Fix ==
> 
> Backport the requested patches to Focal (5.4), Eoan (5.3), Bionic (4.15) and
> Xenial (4.4).
> 
> == Risk of Regression ==
> 
> This patch affects only the cases described above (when no dst is attached to the skb), thus the risk should be low.
> 
> Nicolas Dichtel (2):
>   vti[6]: fix packet tx through bpf_redirect()
>   xfrm interface: fix packet tx through bpf_redirect()
> 
>  net/ipv4/ip_vti.c         | 13 +++++++++++--
>  net/ipv6/ip6_vti.c        | 13 +++++++++++--
>  net/xfrm/xfrm_interface.c | 32 +++++++++++++++++++++++++-------
>  3 files changed, 47 insertions(+), 11 deletions(-)
> 

A V2 of this patchset has been sent to fix issues with the cover letter,
so I'm NAK'ing this thread.

Thanks!