]> git.ipfire.org Git - thirdparty/kernel/stable-queue.git/commitdiff
5.15-stable patches
authorGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 16 May 2022 13:28:55 +0000 (15:28 +0200)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 16 May 2022 13:28:55 +0000 (15:28 +0200)
added patches:
ping-fix-address-binding-wrt-vrf.patch

queue-5.15/ping-fix-address-binding-wrt-vrf.patch [new file with mode: 0644]
queue-5.15/series

diff --git a/queue-5.15/ping-fix-address-binding-wrt-vrf.patch b/queue-5.15/ping-fix-address-binding-wrt-vrf.patch
new file mode 100644 (file)
index 0000000..af09503
--- /dev/null
@@ -0,0 +1,75 @@
+From e1a7ac6f3ba6e157adcd0ca94d92a401f1943f56 Mon Sep 17 00:00:00 2001
+From: Nicolas Dichtel <nicolas.dichtel@6wind.com>
+Date: Wed, 4 May 2022 11:07:38 +0200
+Subject: ping: fix address binding wrt vrf
+
+From: Nicolas Dichtel <nicolas.dichtel@6wind.com>
+
+commit e1a7ac6f3ba6e157adcd0ca94d92a401f1943f56 upstream.
+
+When ping_group_range is updated, 'ping' uses the DGRAM ICMP socket,
+instead of an IP raw socket. In this case, 'ping' is unable to bind its
+socket to a local address owned by a vrflite.
+
+Before the patch:
+$ sysctl -w net.ipv4.ping_group_range='0  2147483647'
+$ ip link add blue type vrf table 10
+$ ip link add foo type dummy
+$ ip link set foo master blue
+$ ip link set foo up
+$ ip addr add 192.168.1.1/24 dev foo
+$ ip addr add 2001::1/64 dev foo
+$ ip vrf exec blue ping -c1 -I 192.168.1.1 192.168.1.2
+ping: bind: Cannot assign requested address
+$ ip vrf exec blue ping6 -c1 -I 2001::1 2001::2
+ping6: bind icmp socket: Cannot assign requested address
+
+CC: stable@vger.kernel.org
+Fixes: 1b69c6d0ae90 ("net: Introduce L3 Master device abstraction")
+Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
+Reviewed-by: David Ahern <dsahern@kernel.org>
+Signed-off-by: Jakub Kicinski <kuba@kernel.org>
+Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
+Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
+---
+ net/ipv4/ping.c |   15 +++++++++++++--
+ 1 file changed, 13 insertions(+), 2 deletions(-)
+
+--- a/net/ipv4/ping.c
++++ b/net/ipv4/ping.c
+@@ -305,6 +305,7 @@ static int ping_check_bind_addr(struct s
+       struct net *net = sock_net(sk);
+       if (sk->sk_family == AF_INET) {
+               struct sockaddr_in *addr = (struct sockaddr_in *) uaddr;
++              u32 tb_id = RT_TABLE_LOCAL;
+               int chk_addr_ret;
+               if (addr_len < sizeof(*addr))
+@@ -320,8 +321,10 @@ static int ping_check_bind_addr(struct s
+               if (addr->sin_addr.s_addr == htonl(INADDR_ANY))
+                       chk_addr_ret = RTN_LOCAL;
+-              else
+-                      chk_addr_ret = inet_addr_type(net, addr->sin_addr.s_addr);
++              else {
++                      tb_id = l3mdev_fib_table_by_index(net, sk->sk_bound_dev_if) ? : tb_id;
++                      chk_addr_ret = inet_addr_type_table(net, addr->sin_addr.s_addr, tb_id);
++              }
+               if ((!inet_can_nonlocal_bind(net, isk) &&
+                    chk_addr_ret != RTN_LOCAL) ||
+@@ -357,6 +360,14 @@ static int ping_check_bind_addr(struct s
+                       if (!dev) {
+                               rcu_read_unlock();
+                               return -ENODEV;
++                      }
++              }
++
++              if (!dev && sk->sk_bound_dev_if) {
++                      dev = dev_get_by_index_rcu(net, sk->sk_bound_dev_if);
++                      if (!dev) {
++                              rcu_read_unlock();
++                              return -ENODEV;
+                       }
+               }
+               has_addr = pingv6_ops.ipv6_chk_addr(net, &addr->sin6_addr, dev,
index c6d67236b88e136dca61f12f24400eda14348260..22f6258b91a60371b0e663880561939acf2f1775 100644 (file)
@@ -97,3 +97,4 @@ revert-drm-amd-pm-keep-the-baco-feature-enabled-for-suspend.patch
 dma-buf-call-dma_buf_stats_setup-after-dmabuf-is-in-valid-list.patch
 mm-hwpoison-use-pr_err-instead-of-dump_page-in-get_any_page.patch
 sunrpc-ensure-we-flush-any-closed-sockets-before-xs_xprt_free.patch
+ping-fix-address-binding-wrt-vrf.patch