lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 29 Aug 2022 18:55:03 +0100 From: Dmitry Safonov <dima@...sta.com> To: Dan Carpenter <dan.carpenter@...cle.com>, kbuild@...ts.01.org, Eric Dumazet <edumazet@...gle.com>, "David S. Miller" <davem@...emloft.net>, linux-kernel@...r.kernel.org Cc: lkp@...el.com, kbuild-all@...ts.01.org, netdev@...r.kernel.org, Andy Lutomirski <luto@...capital.net>, Ard Biesheuvel <ardb@...nel.org>, Bob Gilligan <gilligan@...sta.com>, David Ahern <dsahern@...nel.org>, Eric Biggers <ebiggers@...nel.org>, Francesco Ruggeri <fruggeri@...sta.com>, Herbert Xu <herbert@...dor.apana.org.au>, Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>, Ivan Delalande <colona@...sta.com>, Jakub Kicinski <kuba@...nel.org>, Leonard Crestez <cdleonard@...il.com>, Paolo Abeni <pabeni@...hat.com>, Salam Noureddine <noureddine@...sta.com>, Shuah Khan <skhan@...uxfoundation.org>, linux-crypto@...r.kernel.org Subject: Re: [kbuild] Re: [PATCH 11/31] net/tcp: Add TCP-AO sign to outgoing packets Hi Dan, On 8/22/22 13:03, Dan Carpenter wrote: > Hi Dmitry, [..] > ea66758c1795cef Paolo Abeni 2022-05-04 608 static void tcp_options_write(struct tcphdr *th, struct tcp_sock *tp, [..] > 85df6b860d509a9 Dmitry Safonov 2022-08-18 622 #ifdef CONFIG_TCP_AO > 85df6b860d509a9 Dmitry Safonov 2022-08-18 623 if (unlikely(OPTION_AO & options)) { > 85df6b860d509a9 Dmitry Safonov 2022-08-18 624 u8 maclen; > 33ad798c924b4a1 Adam Langley 2008-07-19 625 > 85df6b860d509a9 Dmitry Safonov 2022-08-18 @626 if (tp) { > > Can "tp" really be NULL? Everything else assumes it can't. It actually can be NULL, see tcp_make_synack(). At this moment code assumes that *either* (tp == NULL) or (tcprsk == NULL). > 85df6b860d509a9 Dmitry Safonov 2022-08-18 627 struct tcp_ao_info *ao_info; > 85df6b860d509a9 Dmitry Safonov 2022-08-18 628 > 85df6b860d509a9 Dmitry Safonov 2022-08-18 629 ao_info = rcu_dereference_check(tp->ao_info, > 85df6b860d509a9 Dmitry Safonov 2022-08-18 630 lockdep_sock_is_held(&tp->inet_conn.icsk_inet.sk)); > 85df6b860d509a9 Dmitry Safonov 2022-08-18 631 if (WARN_ON_ONCE(!ao_key || !ao_info || !ao_info->rnext_key)) > 85df6b860d509a9 Dmitry Safonov 2022-08-18 632 goto out_ao; > 85df6b860d509a9 Dmitry Safonov 2022-08-18 633 maclen = tcp_ao_maclen(ao_key); > 85df6b860d509a9 Dmitry Safonov 2022-08-18 634 *ptr++ = htonl((TCPOPT_AO << 24) | > 85df6b860d509a9 Dmitry Safonov 2022-08-18 635 (tcp_ao_len(ao_key) << 16) | > 85df6b860d509a9 Dmitry Safonov 2022-08-18 636 (ao_key->sndid << 8) | > 85df6b860d509a9 Dmitry Safonov 2022-08-18 637 (ao_info->rnext_key->rcvid)); > 85df6b860d509a9 Dmitry Safonov 2022-08-18 638 } > > "maclen" not initialized on else path. Patch 15 ("net/tcp: Wire TCP-AO to request sockets") adds + if (tcprsk) { + u8 aolen = tcprsk->maclen + sizeof(struct tcp_ao_hdr); + + maclen = tcprsk->maclen; + *ptr++ = htonl((TCPOPT_AO << 24) | (aolen << 16) | + (tcprsk->ao_keyid << 8) | + (tcprsk->ao_rcv_next)); + } Assuming that tp != NULL OR tcprsk != NULL, maclen is always initialized _after both patches_. For version 2, I'll make it (break patches) in more bisect-able way for static analyzers and do WARN_ON(tp == NULL && tcprsk == NULL) with break off TCP-AO signing to make sure the assumption will be valid with the code changing later on. [..] > ea66758c1795cef Paolo Abeni 2022-05-04 731 mptcp_options_write(th, ptr, tp, opts); > ^^ > Not checked here either. The function has checks inside. Thanks, Dmitry
Powered by blists - more mailing lists