lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 17 Sep 2023 20:04:31 -0700
From: Jordan Rife <jrife@...gle.com>
To: davem@...emloft.net, edumazet@...gle.com, kuba@...nel.org, 
	pabeni@...hat.com, netdev@...r.kernel.org
Cc: dborkman@...nel.org, willemdebruijn.kernel@...il.com, 
	philipp.reisner@...bit.com, lars.ellenberg@...bit.com, 
	christoph.boehmwalder@...bit.com, axboe@...nel.dk, chengyou@...ux.alibaba.com, 
	kaishen@...ux.alibaba.com, jgg@...pe.ca, leon@...nel.org, bmt@...ich.ibm.com, 
	ccaulfie@...hat.com, teigland@...hat.com, mark@...heh.com, jlbec@...lplan.org, 
	joseph.qi@...ux.alibaba.com, sfrench@...ba.org, pc@...guebit.com, 
	lsahlber@...hat.com, sprasad@...rosoft.com, tom@...pey.com, ericvh@...nel.org, 
	lucho@...kov.net, asmadeus@...ewreck.org, linux_oss@...debyte.com, 
	idryomov@...il.com, xiubli@...hat.com, jlayton@...nel.org, horms@...ge.net.au, 
	ja@....bg, pablo@...filter.org, kadlec@...filter.org, fw@...len.de, 
	santosh.shilimkar@...cle.com
Subject: Re: [PATCH net v2 1/3] net: replace calls to sock->ops->connect()
 with kernel_connect()

CC subsystem maintainers:

- DRBD
- BLOCK LAYER:
- INFINIBAND SUBSYSTEM:
- SOFT-IWARP DRIVER:
- DISTRIBUTED LOCK MANAGER (DLM):
- ORACLE CLUSTER FILESYSTEM 2 (OCFS2):
- COMMON INTERNET FILE SYSTEM CLIENT (CIFS and SMB3):
- 9P FILE SYSTEM:
- CEPH COMMON CODE (LIBCEPH):
- IPVS:
- NETFILTER:
- RDS - RELIABLE DATAGRAM SOCKETS:

On Sun, Sep 17, 2023 at 7:50 PM Jordan Rife <jrife@...gle.com> wrote:
>
> commit 0bdf399342c5 ("net: Avoid address overwrite in kernel_connect")
> ensured that kernel_connect() will not overwrite the address parameter
> in cases where BPF connect hooks perform an address rewrite. This change
> replaces all direct calls to sock->ops->connect() with kernel_connect()
> to make these call safe.
>
> This patch also introduces a sanity check to kernel_connect() to ensure
> that the addr_length does not exceed the size of sockaddr_storage before
> performing the address copy.
>
> Link: https://lore.kernel.org/netdev/20230912013332.2048422-1-jrife@google.com/
>
> Signed-off-by: Jordan Rife <jrife@...gle.com>
> ---
> v1->v2: Split up original patch into patch series. Insulate calls with
>         kernel_connect() instead of pushing address copy deeper into
>         sock->ops->connect().
>
>  drivers/block/drbd/drbd_receiver.c     |  2 +-
>  drivers/infiniband/hw/erdma/erdma_cm.c |  2 +-
>  drivers/infiniband/sw/siw/siw_cm.c     |  2 +-
>  fs/dlm/lowcomms.c                      |  6 +++---
>  fs/ocfs2/cluster/tcp.c                 |  8 ++++----
>  fs/smb/client/connect.c                |  4 ++--
>  net/9p/trans_fd.c                      | 10 +++++-----
>  net/ceph/messenger.c                   |  4 ++--
>  net/netfilter/ipvs/ip_vs_sync.c        |  4 ++--
>  net/rds/tcp_connect.c                  |  2 +-
>  net/socket.c                           |  3 +++
>  11 files changed, 25 insertions(+), 22 deletions(-)
>
> diff --git a/drivers/block/drbd/drbd_receiver.c b/drivers/block/drbd/drbd_receiver.c
> index 0c9f54197768d..9b2660e990a98 100644
> --- a/drivers/block/drbd/drbd_receiver.c
> +++ b/drivers/block/drbd/drbd_receiver.c
> @@ -646,7 +646,7 @@ static struct socket *drbd_try_connect(struct drbd_connection *connection)
>          * stay C_WF_CONNECTION, don't go Disconnecting! */
>         disconnect_on_error = 0;
>         what = "connect";
> -       err = sock->ops->connect(sock, (struct sockaddr *) &peer_in6, peer_addr_len, 0);
> +       err = kernel_connect(sock, (struct sockaddr *)&peer_in6, peer_addr_len, 0);
>
>  out:
>         if (err < 0) {
> diff --git a/drivers/infiniband/hw/erdma/erdma_cm.c b/drivers/infiniband/hw/erdma/erdma_cm.c
> index 771059a8eb7d7..e2b89e7bbe2b8 100644
> --- a/drivers/infiniband/hw/erdma/erdma_cm.c
> +++ b/drivers/infiniband/hw/erdma/erdma_cm.c
> @@ -993,7 +993,7 @@ static int kernel_bindconnect(struct socket *s, struct sockaddr *laddr,
>         ret = s->ops->bind(s, laddr, laddrlen);
>         if (ret)
>                 return ret;
> -       ret = s->ops->connect(s, raddr, raddrlen, flags);
> +       ret = kernel_connect(s, raddr, raddrlen, flags);
>         return ret < 0 ? ret : 0;
>  }
>
> diff --git a/drivers/infiniband/sw/siw/siw_cm.c b/drivers/infiniband/sw/siw/siw_cm.c
> index a2605178f4eda..05624f424153e 100644
> --- a/drivers/infiniband/sw/siw/siw_cm.c
> +++ b/drivers/infiniband/sw/siw/siw_cm.c
> @@ -1328,7 +1328,7 @@ static int kernel_bindconnect(struct socket *s, struct sockaddr *laddr,
>         if (rv < 0)
>                 return rv;
>
> -       rv = s->ops->connect(s, raddr, size, flags);
> +       rv = kernel_connect(s, raddr, size, flags);
>
>         return rv < 0 ? rv : 0;
>  }
> diff --git a/fs/dlm/lowcomms.c b/fs/dlm/lowcomms.c
> index f7bc22e74db27..1cf796b97eb65 100644
> --- a/fs/dlm/lowcomms.c
> +++ b/fs/dlm/lowcomms.c
> @@ -1818,7 +1818,7 @@ static int dlm_tcp_bind(struct socket *sock)
>  static int dlm_tcp_connect(struct connection *con, struct socket *sock,
>                            struct sockaddr *addr, int addr_len)
>  {
> -       return sock->ops->connect(sock, addr, addr_len, O_NONBLOCK);
> +       return kernel_connect(sock, addr, addr_len, O_NONBLOCK);
>  }
>
>  static int dlm_tcp_listen_validate(void)
> @@ -1876,12 +1876,12 @@ static int dlm_sctp_connect(struct connection *con, struct socket *sock,
>         int ret;
>
>         /*
> -        * Make sock->ops->connect() function return in specified time,
> +        * Make kernel_connect() function return in specified time,
>          * since O_NONBLOCK argument in connect() function does not work here,
>          * then, we should restore the default value of this attribute.
>          */
>         sock_set_sndtimeo(sock->sk, 5);
> -       ret = sock->ops->connect(sock, addr, addr_len, 0);
> +       ret = kernel_connect(sock, addr, addr_len, 0);
>         sock_set_sndtimeo(sock->sk, 0);
>         return ret;
>  }
> diff --git a/fs/ocfs2/cluster/tcp.c b/fs/ocfs2/cluster/tcp.c
> index 960080753d3bd..ead7c287ff373 100644
> --- a/fs/ocfs2/cluster/tcp.c
> +++ b/fs/ocfs2/cluster/tcp.c
> @@ -1636,10 +1636,10 @@ static void o2net_start_connect(struct work_struct *work)
>         remoteaddr.sin_addr.s_addr = node->nd_ipv4_address;
>         remoteaddr.sin_port = node->nd_ipv4_port;
>
> -       ret = sc->sc_sock->ops->connect(sc->sc_sock,
> -                                       (struct sockaddr *)&remoteaddr,
> -                                       sizeof(remoteaddr),
> -                                       O_NONBLOCK);
> +       ret = kernel_connect(sc->sc_sock,
> +                            (struct sockaddr *)&remoteaddr,
> +                            sizeof(remoteaddr),
> +                            O_NONBLOCK);
>         if (ret == -EINPROGRESS)
>                 ret = 0;
>
> diff --git a/fs/smb/client/connect.c b/fs/smb/client/connect.c
> index 687754791bf0a..b7764cd57e035 100644
> --- a/fs/smb/client/connect.c
> +++ b/fs/smb/client/connect.c
> @@ -3042,8 +3042,8 @@ generic_ip_connect(struct TCP_Server_Info *server)
>                  socket->sk->sk_sndbuf,
>                  socket->sk->sk_rcvbuf, socket->sk->sk_rcvtimeo);
>
> -       rc = socket->ops->connect(socket, saddr, slen,
> -                                 server->noblockcnt ? O_NONBLOCK : 0);
> +       rc = kernel_connect(socket, saddr, slen,
> +                           server->noblockcnt ? O_NONBLOCK : 0);
>         /*
>          * When mounting SMB root file systems, we do not want to block in
>          * connect. Otherwise bail out and then let cifs_reconnect() perform
> diff --git a/net/9p/trans_fd.c b/net/9p/trans_fd.c
> index c4015f30f9fa7..225ee8b6d4c5b 100644
> --- a/net/9p/trans_fd.c
> +++ b/net/9p/trans_fd.c
> @@ -1019,9 +1019,9 @@ p9_fd_create_tcp(struct p9_client *client, const char *addr, char *args)
>                 }
>         }
>
> -       err = READ_ONCE(csocket->ops)->connect(csocket,
> -                                   (struct sockaddr *)&sin_server,
> -                                   sizeof(struct sockaddr_in), 0);
> +       err = kernel_connect(csocket,
> +                            (struct sockaddr *)&sin_server,
> +                            sizeof(struct sockaddr_in), 0);
>         if (err < 0) {
>                 pr_err("%s (%d): problem connecting socket to %s\n",
>                        __func__, task_pid_nr(current), addr);
> @@ -1060,8 +1060,8 @@ p9_fd_create_unix(struct p9_client *client, const char *addr, char *args)
>
>                 return err;
>         }
> -       err = READ_ONCE(csocket->ops)->connect(csocket, (struct sockaddr *)&sun_server,
> -                       sizeof(struct sockaddr_un) - 1, 0);
> +       err = kernel_connect(csocket, (struct sockaddr *)&sun_server,
> +                            sizeof(struct sockaddr_un) - 1, 0);
>         if (err < 0) {
>                 pr_err("%s (%d): problem connecting socket: %s: %d\n",
>                        __func__, task_pid_nr(current), addr, err);
> diff --git a/net/ceph/messenger.c b/net/ceph/messenger.c
> index 10a41cd9c5235..3c8b78d9c4d1c 100644
> --- a/net/ceph/messenger.c
> +++ b/net/ceph/messenger.c
> @@ -459,8 +459,8 @@ int ceph_tcp_connect(struct ceph_connection *con)
>         set_sock_callbacks(sock, con);
>
>         con_sock_state_connecting(con);
> -       ret = sock->ops->connect(sock, (struct sockaddr *)&ss, sizeof(ss),
> -                                O_NONBLOCK);
> +       ret = kernel_connect(sock, (struct sockaddr *)&ss, sizeof(ss),
> +                            O_NONBLOCK);
>         if (ret == -EINPROGRESS) {
>                 dout("connect %s EINPROGRESS sk_state = %u\n",
>                      ceph_pr_addr(&con->peer_addr),
> diff --git a/net/netfilter/ipvs/ip_vs_sync.c b/net/netfilter/ipvs/ip_vs_sync.c
> index da5af28ff57b5..6e4ed1e11a3b7 100644
> --- a/net/netfilter/ipvs/ip_vs_sync.c
> +++ b/net/netfilter/ipvs/ip_vs_sync.c
> @@ -1505,8 +1505,8 @@ static int make_send_sock(struct netns_ipvs *ipvs, int id,
>         }
>
>         get_mcast_sockaddr(&mcast_addr, &salen, &ipvs->mcfg, id);
> -       result = sock->ops->connect(sock, (struct sockaddr *) &mcast_addr,
> -                                   salen, 0);
> +       result = kernel_connect(sock, (struct sockaddr *)&mcast_addr,
> +                               salen, 0);
>         if (result < 0) {
>                 pr_err("Error connecting to the multicast addr\n");
>                 goto error;
> diff --git a/net/rds/tcp_connect.c b/net/rds/tcp_connect.c
> index f0c477c5d1db4..d788c6d28986f 100644
> --- a/net/rds/tcp_connect.c
> +++ b/net/rds/tcp_connect.c
> @@ -173,7 +173,7 @@ int rds_tcp_conn_path_connect(struct rds_conn_path *cp)
>          * own the socket
>          */
>         rds_tcp_set_callbacks(sock, cp);
> -       ret = sock->ops->connect(sock, addr, addrlen, O_NONBLOCK);
> +       ret = kernel_connect(sock, addr, addrlen, O_NONBLOCK);
>
>         rdsdebug("connect to address %pI6c returned %d\n", &conn->c_faddr, ret);
>         if (ret == -EINPROGRESS)
> diff --git a/net/socket.c b/net/socket.c
> index c8b08b32f097e..b2e3700d035a6 100644
> --- a/net/socket.c
> +++ b/net/socket.c
> @@ -3572,6 +3572,9 @@ int kernel_connect(struct socket *sock, struct sockaddr *addr, int addrlen,
>  {
>         struct sockaddr_storage address;
>
> +       if (addrlen > sizeof(address))
> +               return -EINVAL;
> +
>         memcpy(&address, addr, addrlen);
>
>         return READ_ONCE(sock->ops)->connect(sock, (struct sockaddr *)&address,
> --
> 2.42.0.459.ge4e396fd5e-goog
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ