2008-01-11 17:57:09 +03:00
/* SCTP kernel implementation
2005-04-17 02:20:36 +04:00
* ( C ) Copyright IBM Corp . 2002 , 2004
* Copyright ( c ) 2002 Intel Corp .
*
2008-01-11 17:57:09 +03:00
* This file is part of the SCTP kernel implementation
2005-04-17 02:20:36 +04:00
*
* Sysctl related interfaces for SCTP .
*
2008-01-11 17:57:09 +03:00
* This SCTP implementation is free software ;
2005-04-17 02:20:36 +04:00
* you can redistribute it and / or modify it under the terms of
* the GNU General Public License as published by
* the Free Software Foundation ; either version 2 , or ( at your option )
* any later version .
*
2008-01-11 17:57:09 +03:00
* This SCTP implementation is distributed in the hope that it
2005-04-17 02:20:36 +04:00
* will be useful , but WITHOUT ANY WARRANTY ; without even the implied
* * * * * * * * * * * * * * * * * * * * * * * * *
* warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE .
* See the GNU General Public License for more details .
*
* You should have received a copy of the GNU General Public License
2013-12-06 18:28:48 +04:00
* along with GNU CC ; see the file COPYING . If not , see
* < http : //www.gnu.org/licenses/>.
2005-04-17 02:20:36 +04:00
*
* Please send any bug reports or fixes you make to the
* email address ( es ) :
2013-07-23 16:51:47 +04:00
* lksctp developers < linux - sctp @ vger . kernel . org >
2005-04-17 02:20:36 +04:00
*
* Written or modified by :
* Mingqin Liu < liuming @ us . ibm . com >
* Jon Grimm < jgrimm @ us . ibm . com >
* Ardelle Fan < ardelle . fan @ intel . com >
* Ryan Layer < rmlayer @ us . ibm . com >
* Sridhar Samudrala < sri @ us . ibm . com >
*/
net: sctp: fix permissions for rto_alpha and rto_beta knobs
Commit 3fd091e73b81 ("[SCTP]: Remove multiple levels of msecs
to jiffies conversions.") has silently changed permissions for
rto_alpha and rto_beta knobs from 0644 to 0444. The purpose of
this was to discourage users from tweaking rto_alpha and
rto_beta knobs in production environments since they are key
to correctly compute rtt/srtt.
RFC4960 under section 6.3.1. RTO Calculation says regarding
rto_alpha and rto_beta under rule C3 and C4:
[...]
C3) When a new RTT measurement R' is made, set
RTTVAR <- (1 - RTO.Beta) * RTTVAR + RTO.Beta * |SRTT - R'|
and
SRTT <- (1 - RTO.Alpha) * SRTT + RTO.Alpha * R'
Note: The value of SRTT used in the update to RTTVAR
is its value before updating SRTT itself using the
second assignment. After the computation, update
RTO <- SRTT + 4 * RTTVAR.
C4) When data is in flight and when allowed by rule C5
below, a new RTT measurement MUST be made each round
trip. Furthermore, new RTT measurements SHOULD be
made no more than once per round trip for a given
destination transport address. There are two reasons
for this recommendation: First, it appears that
measuring more frequently often does not in practice
yield any significant benefit [ALLMAN99]; second,
if measurements are made more often, then the values
of RTO.Alpha and RTO.Beta in rule C3 above should be
adjusted so that SRTT and RTTVAR still adjust to
changes at roughly the same rate (in terms of how many
round trips it takes them to reflect new values) as
they would if making only one measurement per
round-trip and using RTO.Alpha and RTO.Beta as given
in rule C3. However, the exact nature of these
adjustments remains a research issue.
[...]
While it is discouraged to adjust rto_alpha and rto_beta
and not further specified how to adjust them, the RFC also
doesn't explicitly forbid it, but rather gives a RECOMMENDED
default value (rto_alpha=3, rto_beta=2). We have a couple
of users relying on the old permissions before they got
changed. That said, if someone really has the urge to adjust
them, we could allow it with a warning in the log.
Fixes: 3fd091e73b81 ("[SCTP]: Remove multiple levels of msecs to jiffies conversions.")
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Cc: Vlad Yasevich <vyasevich@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-06-15 02:59:14 +04:00
# define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
2005-04-17 02:20:36 +04:00
# include <net/sctp/structs.h>
2005-09-06 05:07:42 +04:00
# include <net/sctp/sctp.h>
2005-04-17 02:20:36 +04:00
# include <linux/sysctl.h>
2006-08-23 00:29:17 +04:00
static int zero = 0 ;
static int one = 1 ;
static int timer_max = 86400000 ; /* ms in one day */
static int int_max = INT_MAX ;
2009-05-13 02:03:20 +04:00
static int sack_timer_min = 1 ;
static int sack_timer_max = 500 ;
2009-09-03 15:55:47 +04:00
static int addr_scope_max = 3 ; /* check sctp_scope_policy_t in include/net/sctp/constants.h for max entries */
2009-11-23 23:53:57 +03:00
static int rwnd_scale_max = 16 ;
net: sctp: fix permissions for rto_alpha and rto_beta knobs
Commit 3fd091e73b81 ("[SCTP]: Remove multiple levels of msecs
to jiffies conversions.") has silently changed permissions for
rto_alpha and rto_beta knobs from 0644 to 0444. The purpose of
this was to discourage users from tweaking rto_alpha and
rto_beta knobs in production environments since they are key
to correctly compute rtt/srtt.
RFC4960 under section 6.3.1. RTO Calculation says regarding
rto_alpha and rto_beta under rule C3 and C4:
[...]
C3) When a new RTT measurement R' is made, set
RTTVAR <- (1 - RTO.Beta) * RTTVAR + RTO.Beta * |SRTT - R'|
and
SRTT <- (1 - RTO.Alpha) * SRTT + RTO.Alpha * R'
Note: The value of SRTT used in the update to RTTVAR
is its value before updating SRTT itself using the
second assignment. After the computation, update
RTO <- SRTT + 4 * RTTVAR.
C4) When data is in flight and when allowed by rule C5
below, a new RTT measurement MUST be made each round
trip. Furthermore, new RTT measurements SHOULD be
made no more than once per round trip for a given
destination transport address. There are two reasons
for this recommendation: First, it appears that
measuring more frequently often does not in practice
yield any significant benefit [ALLMAN99]; second,
if measurements are made more often, then the values
of RTO.Alpha and RTO.Beta in rule C3 above should be
adjusted so that SRTT and RTTVAR still adjust to
changes at roughly the same rate (in terms of how many
round trips it takes them to reflect new values) as
they would if making only one measurement per
round-trip and using RTO.Alpha and RTO.Beta as given
in rule C3. However, the exact nature of these
adjustments remains a research issue.
[...]
While it is discouraged to adjust rto_alpha and rto_beta
and not further specified how to adjust them, the RFC also
doesn't explicitly forbid it, but rather gives a RECOMMENDED
default value (rto_alpha=3, rto_beta=2). We have a couple
of users relying on the old permissions before they got
changed. That said, if someone really has the urge to adjust
them, we could allow it with a warning in the log.
Fixes: 3fd091e73b81 ("[SCTP]: Remove multiple levels of msecs to jiffies conversions.")
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Cc: Vlad Yasevich <vyasevich@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-06-15 02:59:14 +04:00
static int rto_alpha_min = 0 ;
static int rto_beta_min = 0 ;
static int rto_alpha_max = 1000 ;
static int rto_beta_max = 1000 ;
2011-12-16 16:44:15 +04:00
static unsigned long max_autoclose_min = 0 ;
static unsigned long max_autoclose_max =
( MAX_SCHEDULE_TIMEOUT / HZ > UINT_MAX )
? UINT_MAX : MAX_SCHEDULE_TIMEOUT / HZ ;
2005-04-17 02:20:36 +04:00
2010-11-10 02:24:26 +03:00
extern long sysctl_sctp_mem [ 3 ] ;
2007-09-17 03:04:37 +04:00
extern int sysctl_sctp_rmem [ 3 ] ;
extern int sysctl_sctp_wmem [ 3 ] ;
2007-08-16 03:07:44 +04:00
2013-12-11 05:50:40 +04:00
static int proc_sctp_do_hmac_alg ( struct ctl_table * ctl , int write ,
2012-10-24 13:20:03 +04:00
void __user * buffer , size_t * lenp ,
loff_t * ppos ) ;
2013-12-11 05:50:39 +04:00
static int proc_sctp_do_rto_min ( struct ctl_table * ctl , int write ,
void __user * buffer , size_t * lenp ,
loff_t * ppos ) ;
static int proc_sctp_do_rto_max ( struct ctl_table * ctl , int write ,
2012-10-24 13:20:03 +04:00
void __user * buffer , size_t * lenp ,
loff_t * ppos ) ;
net: sctp: fix permissions for rto_alpha and rto_beta knobs
Commit 3fd091e73b81 ("[SCTP]: Remove multiple levels of msecs
to jiffies conversions.") has silently changed permissions for
rto_alpha and rto_beta knobs from 0644 to 0444. The purpose of
this was to discourage users from tweaking rto_alpha and
rto_beta knobs in production environments since they are key
to correctly compute rtt/srtt.
RFC4960 under section 6.3.1. RTO Calculation says regarding
rto_alpha and rto_beta under rule C3 and C4:
[...]
C3) When a new RTT measurement R' is made, set
RTTVAR <- (1 - RTO.Beta) * RTTVAR + RTO.Beta * |SRTT - R'|
and
SRTT <- (1 - RTO.Alpha) * SRTT + RTO.Alpha * R'
Note: The value of SRTT used in the update to RTTVAR
is its value before updating SRTT itself using the
second assignment. After the computation, update
RTO <- SRTT + 4 * RTTVAR.
C4) When data is in flight and when allowed by rule C5
below, a new RTT measurement MUST be made each round
trip. Furthermore, new RTT measurements SHOULD be
made no more than once per round trip for a given
destination transport address. There are two reasons
for this recommendation: First, it appears that
measuring more frequently often does not in practice
yield any significant benefit [ALLMAN99]; second,
if measurements are made more often, then the values
of RTO.Alpha and RTO.Beta in rule C3 above should be
adjusted so that SRTT and RTTVAR still adjust to
changes at roughly the same rate (in terms of how many
round trips it takes them to reflect new values) as
they would if making only one measurement per
round-trip and using RTO.Alpha and RTO.Beta as given
in rule C3. However, the exact nature of these
adjustments remains a research issue.
[...]
While it is discouraged to adjust rto_alpha and rto_beta
and not further specified how to adjust them, the RFC also
doesn't explicitly forbid it, but rather gives a RECOMMENDED
default value (rto_alpha=3, rto_beta=2). We have a couple
of users relying on the old permissions before they got
changed. That said, if someone really has the urge to adjust
them, we could allow it with a warning in the log.
Fixes: 3fd091e73b81 ("[SCTP]: Remove multiple levels of msecs to jiffies conversions.")
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Cc: Vlad Yasevich <vyasevich@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-06-15 02:59:14 +04:00
static int proc_sctp_do_alpha_beta ( struct ctl_table * ctl , int write ,
void __user * buffer , size_t * lenp ,
loff_t * ppos ) ;
net: sctp: cache auth_enable per endpoint
Currently, it is possible to create an SCTP socket, then switch
auth_enable via sysctl setting to 1 and crash the system on connect:
Oops[#1]:
CPU: 0 PID: 0 Comm: swapper Not tainted 3.14.1-mipsgit-20140415 #1
task: ffffffff8056ce80 ti: ffffffff8055c000 task.ti: ffffffff8055c000
[...]
Call Trace:
[<ffffffff8043c4e8>] sctp_auth_asoc_set_default_hmac+0x68/0x80
[<ffffffff8042b300>] sctp_process_init+0x5e0/0x8a4
[<ffffffff8042188c>] sctp_sf_do_5_1B_init+0x234/0x34c
[<ffffffff804228c8>] sctp_do_sm+0xb4/0x1e8
[<ffffffff80425a08>] sctp_endpoint_bh_rcv+0x1c4/0x214
[<ffffffff8043af68>] sctp_rcv+0x588/0x630
[<ffffffff8043e8e8>] sctp6_rcv+0x10/0x24
[<ffffffff803acb50>] ip6_input+0x2c0/0x440
[<ffffffff8030fc00>] __netif_receive_skb_core+0x4a8/0x564
[<ffffffff80310650>] process_backlog+0xb4/0x18c
[<ffffffff80313cbc>] net_rx_action+0x12c/0x210
[<ffffffff80034254>] __do_softirq+0x17c/0x2ac
[<ffffffff800345e0>] irq_exit+0x54/0xb0
[<ffffffff800075a4>] ret_from_irq+0x0/0x4
[<ffffffff800090ec>] rm7k_wait_irqoff+0x24/0x48
[<ffffffff8005e388>] cpu_startup_entry+0xc0/0x148
[<ffffffff805a88b0>] start_kernel+0x37c/0x398
Code: dd0900b8 000330f8 0126302d <dcc60000> 50c0fff1 0047182a a48306a0
03e00008 00000000
---[ end trace b530b0551467f2fd ]---
Kernel panic - not syncing: Fatal exception in interrupt
What happens while auth_enable=0 in that case is, that
ep->auth_hmacs is initialized to NULL in sctp_auth_init_hmacs()
when endpoint is being created.
After that point, if an admin switches over to auth_enable=1,
the machine can crash due to NULL pointer dereference during
reception of an INIT chunk. When we enter sctp_process_init()
via sctp_sf_do_5_1B_init() in order to respond to an INIT chunk,
the INIT verification succeeds and while we walk and process
all INIT params via sctp_process_param() we find that
net->sctp.auth_enable is set, therefore do not fall through,
but invoke sctp_auth_asoc_set_default_hmac() instead, and thus,
dereference what we have set to NULL during endpoint
initialization phase.
The fix is to make auth_enable immutable by caching its value
during endpoint initialization, so that its original value is
being carried along until destruction. The bug seems to originate
from the very first days.
Fix in joint work with Daniel Borkmann.
Reported-by: Joshua Kinard <kumba@gentoo.org>
Signed-off-by: Vlad Yasevich <vyasevic@redhat.com>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Acked-by: Neil Horman <nhorman@tuxdriver.com>
Tested-by: Joshua Kinard <kumba@gentoo.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-04-17 19:26:50 +04:00
static int proc_sctp_do_auth ( struct ctl_table * ctl , int write ,
void __user * buffer , size_t * lenp ,
loff_t * ppos ) ;
2013-12-11 05:50:39 +04:00
2013-06-12 10:04:25 +04:00
static struct ctl_table sctp_table [ ] = {
2012-08-07 11:29:57 +04:00
{
. procname = " sctp_mem " ,
. data = & sysctl_sctp_mem ,
. maxlen = sizeof ( sysctl_sctp_mem ) ,
. mode = 0644 ,
. proc_handler = proc_doulongvec_minmax
} ,
{
. procname = " sctp_rmem " ,
. data = & sysctl_sctp_rmem ,
. maxlen = sizeof ( sysctl_sctp_rmem ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " sctp_wmem " ,
. data = & sysctl_sctp_wmem ,
. maxlen = sizeof ( sysctl_sctp_wmem ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{ /* sentinel */ }
} ;
2013-06-12 10:04:25 +04:00
static struct ctl_table sctp_net_table [ ] = {
2005-04-17 02:20:36 +04:00
{
. procname = " rto_initial " ,
2012-08-07 11:29:57 +04:00
. data = & init_net . sctp . rto_initial ,
2006-08-23 00:29:17 +04:00
. maxlen = sizeof ( unsigned int ) ,
2005-04-17 02:20:36 +04:00
. mode = 0644 ,
2008-11-04 05:21:05 +03:00
. proc_handler = proc_dointvec_minmax ,
2006-08-23 00:29:17 +04:00
. extra1 = & one ,
. extra2 = & timer_max
2005-04-17 02:20:36 +04:00
} ,
{
. procname = " rto_min " ,
2012-08-07 11:29:57 +04:00
. data = & init_net . sctp . rto_min ,
2006-08-23 00:29:17 +04:00
. maxlen = sizeof ( unsigned int ) ,
2005-04-17 02:20:36 +04:00
. mode = 0644 ,
2013-12-11 05:50:39 +04:00
. proc_handler = proc_sctp_do_rto_min ,
2006-08-23 00:29:17 +04:00
. extra1 = & one ,
2013-12-11 05:50:39 +04:00
. extra2 = & init_net . sctp . rto_max
2005-04-17 02:20:36 +04:00
} ,
{
. procname = " rto_max " ,
2012-08-07 11:29:57 +04:00
. data = & init_net . sctp . rto_max ,
2006-08-23 00:29:17 +04:00
. maxlen = sizeof ( unsigned int ) ,
2005-04-17 02:20:36 +04:00
. mode = 0644 ,
2013-12-11 05:50:39 +04:00
. proc_handler = proc_sctp_do_rto_max ,
. extra1 = & init_net . sctp . rto_min ,
2006-08-23 00:29:17 +04:00
. extra2 = & timer_max
2005-04-17 02:20:36 +04:00
} ,
{
2012-08-07 11:29:57 +04:00
. procname = " rto_alpha_exp_divisor " ,
. data = & init_net . sctp . rto_alpha ,
. maxlen = sizeof ( int ) ,
net: sctp: fix permissions for rto_alpha and rto_beta knobs
Commit 3fd091e73b81 ("[SCTP]: Remove multiple levels of msecs
to jiffies conversions.") has silently changed permissions for
rto_alpha and rto_beta knobs from 0644 to 0444. The purpose of
this was to discourage users from tweaking rto_alpha and
rto_beta knobs in production environments since they are key
to correctly compute rtt/srtt.
RFC4960 under section 6.3.1. RTO Calculation says regarding
rto_alpha and rto_beta under rule C3 and C4:
[...]
C3) When a new RTT measurement R' is made, set
RTTVAR <- (1 - RTO.Beta) * RTTVAR + RTO.Beta * |SRTT - R'|
and
SRTT <- (1 - RTO.Alpha) * SRTT + RTO.Alpha * R'
Note: The value of SRTT used in the update to RTTVAR
is its value before updating SRTT itself using the
second assignment. After the computation, update
RTO <- SRTT + 4 * RTTVAR.
C4) When data is in flight and when allowed by rule C5
below, a new RTT measurement MUST be made each round
trip. Furthermore, new RTT measurements SHOULD be
made no more than once per round trip for a given
destination transport address. There are two reasons
for this recommendation: First, it appears that
measuring more frequently often does not in practice
yield any significant benefit [ALLMAN99]; second,
if measurements are made more often, then the values
of RTO.Alpha and RTO.Beta in rule C3 above should be
adjusted so that SRTT and RTTVAR still adjust to
changes at roughly the same rate (in terms of how many
round trips it takes them to reflect new values) as
they would if making only one measurement per
round-trip and using RTO.Alpha and RTO.Beta as given
in rule C3. However, the exact nature of these
adjustments remains a research issue.
[...]
While it is discouraged to adjust rto_alpha and rto_beta
and not further specified how to adjust them, the RFC also
doesn't explicitly forbid it, but rather gives a RECOMMENDED
default value (rto_alpha=3, rto_beta=2). We have a couple
of users relying on the old permissions before they got
changed. That said, if someone really has the urge to adjust
them, we could allow it with a warning in the log.
Fixes: 3fd091e73b81 ("[SCTP]: Remove multiple levels of msecs to jiffies conversions.")
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Cc: Vlad Yasevich <vyasevich@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-06-15 02:59:14 +04:00
. mode = 0644 ,
. proc_handler = proc_sctp_do_alpha_beta ,
. extra1 = & rto_alpha_min ,
. extra2 = & rto_alpha_max ,
2012-08-07 11:29:57 +04:00
} ,
{
. procname = " rto_beta_exp_divisor " ,
. data = & init_net . sctp . rto_beta ,
. maxlen = sizeof ( int ) ,
net: sctp: fix permissions for rto_alpha and rto_beta knobs
Commit 3fd091e73b81 ("[SCTP]: Remove multiple levels of msecs
to jiffies conversions.") has silently changed permissions for
rto_alpha and rto_beta knobs from 0644 to 0444. The purpose of
this was to discourage users from tweaking rto_alpha and
rto_beta knobs in production environments since they are key
to correctly compute rtt/srtt.
RFC4960 under section 6.3.1. RTO Calculation says regarding
rto_alpha and rto_beta under rule C3 and C4:
[...]
C3) When a new RTT measurement R' is made, set
RTTVAR <- (1 - RTO.Beta) * RTTVAR + RTO.Beta * |SRTT - R'|
and
SRTT <- (1 - RTO.Alpha) * SRTT + RTO.Alpha * R'
Note: The value of SRTT used in the update to RTTVAR
is its value before updating SRTT itself using the
second assignment. After the computation, update
RTO <- SRTT + 4 * RTTVAR.
C4) When data is in flight and when allowed by rule C5
below, a new RTT measurement MUST be made each round
trip. Furthermore, new RTT measurements SHOULD be
made no more than once per round trip for a given
destination transport address. There are two reasons
for this recommendation: First, it appears that
measuring more frequently often does not in practice
yield any significant benefit [ALLMAN99]; second,
if measurements are made more often, then the values
of RTO.Alpha and RTO.Beta in rule C3 above should be
adjusted so that SRTT and RTTVAR still adjust to
changes at roughly the same rate (in terms of how many
round trips it takes them to reflect new values) as
they would if making only one measurement per
round-trip and using RTO.Alpha and RTO.Beta as given
in rule C3. However, the exact nature of these
adjustments remains a research issue.
[...]
While it is discouraged to adjust rto_alpha and rto_beta
and not further specified how to adjust them, the RFC also
doesn't explicitly forbid it, but rather gives a RECOMMENDED
default value (rto_alpha=3, rto_beta=2). We have a couple
of users relying on the old permissions before they got
changed. That said, if someone really has the urge to adjust
them, we could allow it with a warning in the log.
Fixes: 3fd091e73b81 ("[SCTP]: Remove multiple levels of msecs to jiffies conversions.")
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Cc: Vlad Yasevich <vyasevich@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-06-15 02:59:14 +04:00
. mode = 0644 ,
. proc_handler = proc_sctp_do_alpha_beta ,
. extra1 = & rto_beta_min ,
. extra2 = & rto_beta_max ,
2005-04-17 02:20:36 +04:00
} ,
{
. procname = " max_burst " ,
2012-08-07 11:29:57 +04:00
. data = & init_net . sctp . max_burst ,
2005-04-17 02:20:36 +04:00
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
2008-11-04 05:21:05 +03:00
. proc_handler = proc_dointvec_minmax ,
2006-08-23 00:29:17 +04:00
. extra1 = & zero ,
. extra2 = & int_max
2005-04-17 02:20:36 +04:00
} ,
{
2012-08-07 11:29:57 +04:00
. procname = " cookie_preserve_enable " ,
. data = & init_net . sctp . cookie_preserve_enable ,
2005-04-17 02:20:36 +04:00
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
2012-08-07 11:29:57 +04:00
. proc_handler = proc_dointvec ,
} ,
2012-10-24 13:20:03 +04:00
{
. procname = " cookie_hmac_alg " ,
2014-02-12 05:44:43 +04:00
. data = & init_net . sctp . sctp_hmac_alg ,
2012-10-24 13:20:03 +04:00
. maxlen = 8 ,
. mode = 0644 ,
. proc_handler = proc_sctp_do_hmac_alg ,
} ,
2012-08-07 11:29:57 +04:00
{
. procname = " valid_cookie_life " ,
. data = & init_net . sctp . valid_cookie_life ,
. maxlen = sizeof ( unsigned int ) ,
. mode = 0644 ,
2008-11-04 05:21:05 +03:00
. proc_handler = proc_dointvec_minmax ,
2012-08-07 11:29:57 +04:00
. extra1 = & one ,
. extra2 = & timer_max
2005-04-17 02:20:36 +04:00
} ,
2005-04-28 23:02:04 +04:00
{
2012-08-07 11:29:57 +04:00
. procname = " sack_timeout " ,
. data = & init_net . sctp . sack_timeout ,
2005-04-28 23:02:04 +04:00
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
2012-08-07 11:29:57 +04:00
. proc_handler = proc_dointvec_minmax ,
. extra1 = & sack_timer_min ,
. extra2 = & sack_timer_max ,
2005-04-28 23:02:04 +04:00
} ,
2005-11-12 03:08:24 +03:00
{
2012-08-07 11:29:57 +04:00
. procname = " hb_interval " ,
. data = & init_net . sctp . hb_interval ,
. maxlen = sizeof ( unsigned int ) ,
2005-11-12 03:08:24 +03:00
. mode = 0644 ,
2012-08-07 11:29:57 +04:00
. proc_handler = proc_dointvec_minmax ,
. extra1 = & one ,
. extra2 = & timer_max
2005-11-12 03:08:24 +03:00
} ,
2005-04-17 02:20:36 +04:00
{
2012-08-07 11:29:57 +04:00
. procname = " association_max_retrans " ,
. data = & init_net . sctp . max_retrans_association ,
2005-04-17 02:20:36 +04:00
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
2008-11-04 05:21:05 +03:00
. proc_handler = proc_dointvec_minmax ,
2006-08-23 00:29:17 +04:00
. extra1 = & one ,
. extra2 = & int_max
2005-04-17 02:20:36 +04:00
} ,
2012-07-21 11:56:07 +04:00
{
2012-08-07 11:29:57 +04:00
. procname = " path_max_retrans " ,
. data = & init_net . sctp . max_retrans_path ,
2012-07-21 11:56:07 +04:00
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec_minmax ,
2012-08-07 11:29:57 +04:00
. extra1 = & one ,
2012-07-21 11:56:07 +04:00
. extra2 = & int_max
} ,
2005-04-17 02:20:36 +04:00
{
. procname = " max_init_retransmits " ,
2012-08-07 11:29:57 +04:00
. data = & init_net . sctp . max_retrans_init ,
2005-04-17 02:20:36 +04:00
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
2008-11-04 05:21:05 +03:00
. proc_handler = proc_dointvec_minmax ,
2006-08-23 00:29:17 +04:00
. extra1 = & one ,
. extra2 = & int_max
2005-04-17 02:20:36 +04:00
} ,
{
2012-08-07 11:29:57 +04:00
. procname = " pf_retrans " ,
. data = & init_net . sctp . pf_retrans ,
. maxlen = sizeof ( int ) ,
2005-04-17 02:20:36 +04:00
. mode = 0644 ,
2008-11-04 05:21:05 +03:00
. proc_handler = proc_dointvec_minmax ,
2012-08-07 11:29:57 +04:00
. extra1 = & zero ,
. extra2 = & int_max
2005-04-17 02:20:36 +04:00
} ,
{
2012-08-07 11:29:57 +04:00
. procname = " sndbuf_policy " ,
. data = & init_net . sctp . sndbuf_policy ,
2006-01-17 22:55:17 +03:00
. maxlen = sizeof ( int ) ,
2005-04-17 02:20:36 +04:00
. mode = 0644 ,
2008-11-04 05:21:05 +03:00
. proc_handler = proc_dointvec ,
2005-04-17 02:20:36 +04:00
} ,
{
2012-08-07 11:29:57 +04:00
. procname = " rcvbuf_policy " ,
. data = & init_net . sctp . rcvbuf_policy ,
2011-04-26 12:36:05 +04:00
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = proc_dointvec ,
} ,
{
. procname = " default_auto_asconf " ,
2012-08-07 11:29:57 +04:00
. data = & init_net . sctp . default_auto_asconf ,
2005-04-17 02:20:36 +04:00
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
2008-11-04 05:21:05 +03:00
. proc_handler = proc_dointvec ,
2005-04-17 02:20:36 +04:00
} ,
{
2012-08-07 11:29:57 +04:00
. procname = " addip_enable " ,
. data = & init_net . sctp . addip_enable ,
2005-04-17 02:20:36 +04:00
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
2008-11-04 05:21:05 +03:00
. proc_handler = proc_dointvec ,
2005-04-17 02:20:36 +04:00
} ,
2005-06-29 00:24:23 +04:00
{
2012-08-07 11:29:57 +04:00
. procname = " addip_noauth_enable " ,
. data = & init_net . sctp . addip_noauth ,
2009-05-13 02:03:20 +04:00
. maxlen = sizeof ( int ) ,
2005-06-29 00:24:23 +04:00
. mode = 0644 ,
2008-11-04 05:21:05 +03:00
. proc_handler = proc_dointvec ,
2007-08-16 03:07:44 +04:00
} ,
{
2012-08-07 11:29:57 +04:00
. procname = " prsctp_enable " ,
. data = & init_net . sctp . prsctp_enable ,
2007-09-17 06:31:35 +04:00
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
2008-11-04 05:21:05 +03:00
. proc_handler = proc_dointvec ,
2007-09-17 06:31:35 +04:00
} ,
2007-10-25 01:24:26 +04:00
{
2012-08-07 11:29:57 +04:00
. procname = " auth_enable " ,
. data = & init_net . sctp . auth_enable ,
2007-10-25 01:24:26 +04:00
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
net: sctp: cache auth_enable per endpoint
Currently, it is possible to create an SCTP socket, then switch
auth_enable via sysctl setting to 1 and crash the system on connect:
Oops[#1]:
CPU: 0 PID: 0 Comm: swapper Not tainted 3.14.1-mipsgit-20140415 #1
task: ffffffff8056ce80 ti: ffffffff8055c000 task.ti: ffffffff8055c000
[...]
Call Trace:
[<ffffffff8043c4e8>] sctp_auth_asoc_set_default_hmac+0x68/0x80
[<ffffffff8042b300>] sctp_process_init+0x5e0/0x8a4
[<ffffffff8042188c>] sctp_sf_do_5_1B_init+0x234/0x34c
[<ffffffff804228c8>] sctp_do_sm+0xb4/0x1e8
[<ffffffff80425a08>] sctp_endpoint_bh_rcv+0x1c4/0x214
[<ffffffff8043af68>] sctp_rcv+0x588/0x630
[<ffffffff8043e8e8>] sctp6_rcv+0x10/0x24
[<ffffffff803acb50>] ip6_input+0x2c0/0x440
[<ffffffff8030fc00>] __netif_receive_skb_core+0x4a8/0x564
[<ffffffff80310650>] process_backlog+0xb4/0x18c
[<ffffffff80313cbc>] net_rx_action+0x12c/0x210
[<ffffffff80034254>] __do_softirq+0x17c/0x2ac
[<ffffffff800345e0>] irq_exit+0x54/0xb0
[<ffffffff800075a4>] ret_from_irq+0x0/0x4
[<ffffffff800090ec>] rm7k_wait_irqoff+0x24/0x48
[<ffffffff8005e388>] cpu_startup_entry+0xc0/0x148
[<ffffffff805a88b0>] start_kernel+0x37c/0x398
Code: dd0900b8 000330f8 0126302d <dcc60000> 50c0fff1 0047182a a48306a0
03e00008 00000000
---[ end trace b530b0551467f2fd ]---
Kernel panic - not syncing: Fatal exception in interrupt
What happens while auth_enable=0 in that case is, that
ep->auth_hmacs is initialized to NULL in sctp_auth_init_hmacs()
when endpoint is being created.
After that point, if an admin switches over to auth_enable=1,
the machine can crash due to NULL pointer dereference during
reception of an INIT chunk. When we enter sctp_process_init()
via sctp_sf_do_5_1B_init() in order to respond to an INIT chunk,
the INIT verification succeeds and while we walk and process
all INIT params via sctp_process_param() we find that
net->sctp.auth_enable is set, therefore do not fall through,
but invoke sctp_auth_asoc_set_default_hmac() instead, and thus,
dereference what we have set to NULL during endpoint
initialization phase.
The fix is to make auth_enable immutable by caching its value
during endpoint initialization, so that its original value is
being carried along until destruction. The bug seems to originate
from the very first days.
Fix in joint work with Daniel Borkmann.
Reported-by: Joshua Kinard <kumba@gentoo.org>
Signed-off-by: Vlad Yasevich <vyasevic@redhat.com>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Acked-by: Neil Horman <nhorman@tuxdriver.com>
Tested-by: Joshua Kinard <kumba@gentoo.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-04-17 19:26:50 +04:00
. proc_handler = proc_sctp_do_auth ,
2007-10-25 01:24:26 +04:00
} ,
2009-09-03 15:55:47 +04:00
{
. procname = " addr_scope_policy " ,
2012-08-07 11:29:57 +04:00
. data = & init_net . sctp . scope_policy ,
2009-09-03 15:55:47 +04:00
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
2009-11-16 14:11:48 +03:00
. proc_handler = proc_dointvec_minmax ,
2009-09-03 15:55:47 +04:00
. extra1 = & zero ,
. extra2 = & addr_scope_max ,
} ,
2009-11-23 23:53:57 +03:00
{
. procname = " rwnd_update_shift " ,
2012-08-07 11:29:57 +04:00
. data = & init_net . sctp . rwnd_upd_shift ,
2009-11-23 23:53:57 +03:00
. maxlen = sizeof ( int ) ,
. mode = 0644 ,
. proc_handler = & proc_dointvec_minmax ,
. extra1 = & one ,
. extra2 = & rwnd_scale_max ,
} ,
2011-12-16 16:44:15 +04:00
{
. procname = " max_autoclose " ,
2012-08-07 11:29:57 +04:00
. data = & init_net . sctp . max_autoclose ,
2011-12-16 16:44:15 +04:00
. maxlen = sizeof ( unsigned long ) ,
. mode = 0644 ,
. proc_handler = & proc_doulongvec_minmax ,
. extra1 = & max_autoclose_min ,
. extra2 = & max_autoclose_max ,
} ,
2013-08-10 00:09:41 +04:00
2009-12-08 18:55:01 +03:00
{ /* sentinel */ }
2005-04-17 02:20:36 +04:00
} ;
2013-12-11 05:50:40 +04:00
static int proc_sctp_do_hmac_alg ( struct ctl_table * ctl , int write ,
2012-10-24 13:20:03 +04:00
void __user * buffer , size_t * lenp ,
loff_t * ppos )
{
struct net * net = current - > nsproxy - > net_ns ;
2013-06-12 10:04:25 +04:00
struct ctl_table tbl ;
2014-06-19 03:31:30 +04:00
bool changed = false ;
2012-10-24 13:20:03 +04:00
char * none = " none " ;
2014-06-19 03:31:30 +04:00
char tmp [ 8 ] ;
int ret ;
2012-10-24 13:20:03 +04:00
memset ( & tbl , 0 , sizeof ( struct ctl_table ) ) ;
if ( write ) {
tbl . data = tmp ;
2014-06-19 03:31:30 +04:00
tbl . maxlen = sizeof ( tmp ) ;
2012-10-24 13:20:03 +04:00
} else {
tbl . data = net - > sctp . sctp_hmac_alg ? : none ;
tbl . maxlen = strlen ( tbl . data ) ;
}
2014-06-19 03:31:30 +04:00
ret = proc_dostring ( & tbl , write , buffer , lenp , ppos ) ;
if ( write & & ret = = 0 ) {
2012-10-24 13:20:03 +04:00
# ifdef CONFIG_CRYPTO_MD5
if ( ! strncmp ( tmp , " md5 " , 3 ) ) {
net - > sctp . sctp_hmac_alg = " md5 " ;
2014-06-19 03:31:30 +04:00
changed = true ;
2012-10-24 13:20:03 +04:00
}
# endif
# ifdef CONFIG_CRYPTO_SHA1
if ( ! strncmp ( tmp , " sha1 " , 4 ) ) {
net - > sctp . sctp_hmac_alg = " sha1 " ;
2014-06-19 03:31:30 +04:00
changed = true ;
2012-10-24 13:20:03 +04:00
}
# endif
if ( ! strncmp ( tmp , " none " , 4 ) ) {
net - > sctp . sctp_hmac_alg = NULL ;
2014-06-19 03:31:30 +04:00
changed = true ;
2012-10-24 13:20:03 +04:00
}
if ( ! changed )
ret = - EINVAL ;
}
return ret ;
}
2013-12-11 05:50:39 +04:00
static int proc_sctp_do_rto_min ( struct ctl_table * ctl , int write ,
void __user * buffer , size_t * lenp ,
loff_t * ppos )
{
struct net * net = current - > nsproxy - > net_ns ;
unsigned int min = * ( unsigned int * ) ctl - > extra1 ;
unsigned int max = * ( unsigned int * ) ctl - > extra2 ;
2014-06-19 03:31:30 +04:00
struct ctl_table tbl ;
int ret , new_value ;
2013-12-11 05:50:39 +04:00
memset ( & tbl , 0 , sizeof ( struct ctl_table ) ) ;
tbl . maxlen = sizeof ( unsigned int ) ;
if ( write )
tbl . data = & new_value ;
else
tbl . data = & net - > sctp . rto_min ;
2014-06-19 03:31:30 +04:00
2013-12-11 05:50:39 +04:00
ret = proc_dointvec ( & tbl , write , buffer , lenp , ppos ) ;
2014-06-19 03:31:30 +04:00
if ( write & & ret = = 0 ) {
if ( new_value > max | | new_value < min )
2013-12-11 05:50:39 +04:00
return - EINVAL ;
2014-06-19 03:31:30 +04:00
2013-12-11 05:50:39 +04:00
net - > sctp . rto_min = new_value ;
}
2014-06-19 03:31:30 +04:00
2013-12-11 05:50:39 +04:00
return ret ;
}
static int proc_sctp_do_rto_max ( struct ctl_table * ctl , int write ,
void __user * buffer , size_t * lenp ,
loff_t * ppos )
{
struct net * net = current - > nsproxy - > net_ns ;
unsigned int min = * ( unsigned int * ) ctl - > extra1 ;
unsigned int max = * ( unsigned int * ) ctl - > extra2 ;
2014-06-19 03:31:30 +04:00
struct ctl_table tbl ;
int ret , new_value ;
2013-12-11 05:50:39 +04:00
memset ( & tbl , 0 , sizeof ( struct ctl_table ) ) ;
tbl . maxlen = sizeof ( unsigned int ) ;
if ( write )
tbl . data = & new_value ;
else
tbl . data = & net - > sctp . rto_max ;
2014-06-19 03:31:30 +04:00
2013-12-11 05:50:39 +04:00
ret = proc_dointvec ( & tbl , write , buffer , lenp , ppos ) ;
2014-06-19 03:31:30 +04:00
if ( write & & ret = = 0 ) {
if ( new_value > max | | new_value < min )
2013-12-11 05:50:39 +04:00
return - EINVAL ;
2014-06-19 03:31:30 +04:00
2013-12-11 05:50:39 +04:00
net - > sctp . rto_max = new_value ;
}
2014-06-19 03:31:30 +04:00
2013-12-11 05:50:39 +04:00
return ret ;
}
net: sctp: fix permissions for rto_alpha and rto_beta knobs
Commit 3fd091e73b81 ("[SCTP]: Remove multiple levels of msecs
to jiffies conversions.") has silently changed permissions for
rto_alpha and rto_beta knobs from 0644 to 0444. The purpose of
this was to discourage users from tweaking rto_alpha and
rto_beta knobs in production environments since they are key
to correctly compute rtt/srtt.
RFC4960 under section 6.3.1. RTO Calculation says regarding
rto_alpha and rto_beta under rule C3 and C4:
[...]
C3) When a new RTT measurement R' is made, set
RTTVAR <- (1 - RTO.Beta) * RTTVAR + RTO.Beta * |SRTT - R'|
and
SRTT <- (1 - RTO.Alpha) * SRTT + RTO.Alpha * R'
Note: The value of SRTT used in the update to RTTVAR
is its value before updating SRTT itself using the
second assignment. After the computation, update
RTO <- SRTT + 4 * RTTVAR.
C4) When data is in flight and when allowed by rule C5
below, a new RTT measurement MUST be made each round
trip. Furthermore, new RTT measurements SHOULD be
made no more than once per round trip for a given
destination transport address. There are two reasons
for this recommendation: First, it appears that
measuring more frequently often does not in practice
yield any significant benefit [ALLMAN99]; second,
if measurements are made more often, then the values
of RTO.Alpha and RTO.Beta in rule C3 above should be
adjusted so that SRTT and RTTVAR still adjust to
changes at roughly the same rate (in terms of how many
round trips it takes them to reflect new values) as
they would if making only one measurement per
round-trip and using RTO.Alpha and RTO.Beta as given
in rule C3. However, the exact nature of these
adjustments remains a research issue.
[...]
While it is discouraged to adjust rto_alpha and rto_beta
and not further specified how to adjust them, the RFC also
doesn't explicitly forbid it, but rather gives a RECOMMENDED
default value (rto_alpha=3, rto_beta=2). We have a couple
of users relying on the old permissions before they got
changed. That said, if someone really has the urge to adjust
them, we could allow it with a warning in the log.
Fixes: 3fd091e73b81 ("[SCTP]: Remove multiple levels of msecs to jiffies conversions.")
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Cc: Vlad Yasevich <vyasevich@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-06-15 02:59:14 +04:00
static int proc_sctp_do_alpha_beta ( struct ctl_table * ctl , int write ,
void __user * buffer , size_t * lenp ,
loff_t * ppos )
{
2014-06-30 15:52:09 +04:00
if ( write )
pr_warn_once ( " Changing rto_alpha or rto_beta may lead to "
" suboptimal rtt/srtt estimations! \n " ) ;
net: sctp: fix permissions for rto_alpha and rto_beta knobs
Commit 3fd091e73b81 ("[SCTP]: Remove multiple levels of msecs
to jiffies conversions.") has silently changed permissions for
rto_alpha and rto_beta knobs from 0644 to 0444. The purpose of
this was to discourage users from tweaking rto_alpha and
rto_beta knobs in production environments since they are key
to correctly compute rtt/srtt.
RFC4960 under section 6.3.1. RTO Calculation says regarding
rto_alpha and rto_beta under rule C3 and C4:
[...]
C3) When a new RTT measurement R' is made, set
RTTVAR <- (1 - RTO.Beta) * RTTVAR + RTO.Beta * |SRTT - R'|
and
SRTT <- (1 - RTO.Alpha) * SRTT + RTO.Alpha * R'
Note: The value of SRTT used in the update to RTTVAR
is its value before updating SRTT itself using the
second assignment. After the computation, update
RTO <- SRTT + 4 * RTTVAR.
C4) When data is in flight and when allowed by rule C5
below, a new RTT measurement MUST be made each round
trip. Furthermore, new RTT measurements SHOULD be
made no more than once per round trip for a given
destination transport address. There are two reasons
for this recommendation: First, it appears that
measuring more frequently often does not in practice
yield any significant benefit [ALLMAN99]; second,
if measurements are made more often, then the values
of RTO.Alpha and RTO.Beta in rule C3 above should be
adjusted so that SRTT and RTTVAR still adjust to
changes at roughly the same rate (in terms of how many
round trips it takes them to reflect new values) as
they would if making only one measurement per
round-trip and using RTO.Alpha and RTO.Beta as given
in rule C3. However, the exact nature of these
adjustments remains a research issue.
[...]
While it is discouraged to adjust rto_alpha and rto_beta
and not further specified how to adjust them, the RFC also
doesn't explicitly forbid it, but rather gives a RECOMMENDED
default value (rto_alpha=3, rto_beta=2). We have a couple
of users relying on the old permissions before they got
changed. That said, if someone really has the urge to adjust
them, we could allow it with a warning in the log.
Fixes: 3fd091e73b81 ("[SCTP]: Remove multiple levels of msecs to jiffies conversions.")
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Cc: Vlad Yasevich <vyasevich@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-06-15 02:59:14 +04:00
return proc_dointvec_minmax ( ctl , write , buffer , lenp , ppos ) ;
}
net: sctp: cache auth_enable per endpoint
Currently, it is possible to create an SCTP socket, then switch
auth_enable via sysctl setting to 1 and crash the system on connect:
Oops[#1]:
CPU: 0 PID: 0 Comm: swapper Not tainted 3.14.1-mipsgit-20140415 #1
task: ffffffff8056ce80 ti: ffffffff8055c000 task.ti: ffffffff8055c000
[...]
Call Trace:
[<ffffffff8043c4e8>] sctp_auth_asoc_set_default_hmac+0x68/0x80
[<ffffffff8042b300>] sctp_process_init+0x5e0/0x8a4
[<ffffffff8042188c>] sctp_sf_do_5_1B_init+0x234/0x34c
[<ffffffff804228c8>] sctp_do_sm+0xb4/0x1e8
[<ffffffff80425a08>] sctp_endpoint_bh_rcv+0x1c4/0x214
[<ffffffff8043af68>] sctp_rcv+0x588/0x630
[<ffffffff8043e8e8>] sctp6_rcv+0x10/0x24
[<ffffffff803acb50>] ip6_input+0x2c0/0x440
[<ffffffff8030fc00>] __netif_receive_skb_core+0x4a8/0x564
[<ffffffff80310650>] process_backlog+0xb4/0x18c
[<ffffffff80313cbc>] net_rx_action+0x12c/0x210
[<ffffffff80034254>] __do_softirq+0x17c/0x2ac
[<ffffffff800345e0>] irq_exit+0x54/0xb0
[<ffffffff800075a4>] ret_from_irq+0x0/0x4
[<ffffffff800090ec>] rm7k_wait_irqoff+0x24/0x48
[<ffffffff8005e388>] cpu_startup_entry+0xc0/0x148
[<ffffffff805a88b0>] start_kernel+0x37c/0x398
Code: dd0900b8 000330f8 0126302d <dcc60000> 50c0fff1 0047182a a48306a0
03e00008 00000000
---[ end trace b530b0551467f2fd ]---
Kernel panic - not syncing: Fatal exception in interrupt
What happens while auth_enable=0 in that case is, that
ep->auth_hmacs is initialized to NULL in sctp_auth_init_hmacs()
when endpoint is being created.
After that point, if an admin switches over to auth_enable=1,
the machine can crash due to NULL pointer dereference during
reception of an INIT chunk. When we enter sctp_process_init()
via sctp_sf_do_5_1B_init() in order to respond to an INIT chunk,
the INIT verification succeeds and while we walk and process
all INIT params via sctp_process_param() we find that
net->sctp.auth_enable is set, therefore do not fall through,
but invoke sctp_auth_asoc_set_default_hmac() instead, and thus,
dereference what we have set to NULL during endpoint
initialization phase.
The fix is to make auth_enable immutable by caching its value
during endpoint initialization, so that its original value is
being carried along until destruction. The bug seems to originate
from the very first days.
Fix in joint work with Daniel Borkmann.
Reported-by: Joshua Kinard <kumba@gentoo.org>
Signed-off-by: Vlad Yasevich <vyasevic@redhat.com>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Acked-by: Neil Horman <nhorman@tuxdriver.com>
Tested-by: Joshua Kinard <kumba@gentoo.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-04-17 19:26:50 +04:00
static int proc_sctp_do_auth ( struct ctl_table * ctl , int write ,
void __user * buffer , size_t * lenp ,
loff_t * ppos )
{
struct net * net = current - > nsproxy - > net_ns ;
struct ctl_table tbl ;
int new_value , ret ;
memset ( & tbl , 0 , sizeof ( struct ctl_table ) ) ;
tbl . maxlen = sizeof ( unsigned int ) ;
if ( write )
tbl . data = & new_value ;
else
tbl . data = & net - > sctp . auth_enable ;
ret = proc_dointvec ( & tbl , write , buffer , lenp , ppos ) ;
2014-06-19 01:46:31 +04:00
if ( write & & ret = = 0 ) {
net: sctp: cache auth_enable per endpoint
Currently, it is possible to create an SCTP socket, then switch
auth_enable via sysctl setting to 1 and crash the system on connect:
Oops[#1]:
CPU: 0 PID: 0 Comm: swapper Not tainted 3.14.1-mipsgit-20140415 #1
task: ffffffff8056ce80 ti: ffffffff8055c000 task.ti: ffffffff8055c000
[...]
Call Trace:
[<ffffffff8043c4e8>] sctp_auth_asoc_set_default_hmac+0x68/0x80
[<ffffffff8042b300>] sctp_process_init+0x5e0/0x8a4
[<ffffffff8042188c>] sctp_sf_do_5_1B_init+0x234/0x34c
[<ffffffff804228c8>] sctp_do_sm+0xb4/0x1e8
[<ffffffff80425a08>] sctp_endpoint_bh_rcv+0x1c4/0x214
[<ffffffff8043af68>] sctp_rcv+0x588/0x630
[<ffffffff8043e8e8>] sctp6_rcv+0x10/0x24
[<ffffffff803acb50>] ip6_input+0x2c0/0x440
[<ffffffff8030fc00>] __netif_receive_skb_core+0x4a8/0x564
[<ffffffff80310650>] process_backlog+0xb4/0x18c
[<ffffffff80313cbc>] net_rx_action+0x12c/0x210
[<ffffffff80034254>] __do_softirq+0x17c/0x2ac
[<ffffffff800345e0>] irq_exit+0x54/0xb0
[<ffffffff800075a4>] ret_from_irq+0x0/0x4
[<ffffffff800090ec>] rm7k_wait_irqoff+0x24/0x48
[<ffffffff8005e388>] cpu_startup_entry+0xc0/0x148
[<ffffffff805a88b0>] start_kernel+0x37c/0x398
Code: dd0900b8 000330f8 0126302d <dcc60000> 50c0fff1 0047182a a48306a0
03e00008 00000000
---[ end trace b530b0551467f2fd ]---
Kernel panic - not syncing: Fatal exception in interrupt
What happens while auth_enable=0 in that case is, that
ep->auth_hmacs is initialized to NULL in sctp_auth_init_hmacs()
when endpoint is being created.
After that point, if an admin switches over to auth_enable=1,
the machine can crash due to NULL pointer dereference during
reception of an INIT chunk. When we enter sctp_process_init()
via sctp_sf_do_5_1B_init() in order to respond to an INIT chunk,
the INIT verification succeeds and while we walk and process
all INIT params via sctp_process_param() we find that
net->sctp.auth_enable is set, therefore do not fall through,
but invoke sctp_auth_asoc_set_default_hmac() instead, and thus,
dereference what we have set to NULL during endpoint
initialization phase.
The fix is to make auth_enable immutable by caching its value
during endpoint initialization, so that its original value is
being carried along until destruction. The bug seems to originate
from the very first days.
Fix in joint work with Daniel Borkmann.
Reported-by: Joshua Kinard <kumba@gentoo.org>
Signed-off-by: Vlad Yasevich <vyasevic@redhat.com>
Signed-off-by: Daniel Borkmann <dborkman@redhat.com>
Acked-by: Neil Horman <nhorman@tuxdriver.com>
Tested-by: Joshua Kinard <kumba@gentoo.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-04-17 19:26:50 +04:00
struct sock * sk = net - > sctp . ctl_sock ;
net - > sctp . auth_enable = new_value ;
/* Update the value in the control socket */
lock_sock ( sk ) ;
sctp_sk ( sk ) - > ep - > auth_enable = new_value ;
release_sock ( sk ) ;
}
return ret ;
}
2012-08-07 11:23:59 +04:00
int sctp_sysctl_net_register ( struct net * net )
{
2014-05-08 16:55:01 +04:00
struct ctl_table * table ;
int i ;
2012-08-07 11:23:59 +04:00
2014-05-08 16:55:01 +04:00
table = kmemdup ( sctp_net_table , sizeof ( sctp_net_table ) , GFP_KERNEL ) ;
if ( ! table )
return - ENOMEM ;
2012-08-07 11:23:59 +04:00
2014-05-08 16:55:01 +04:00
for ( i = 0 ; table [ i ] . data ; i + + )
table [ i ] . data + = ( char * ) ( & net - > sctp ) - ( char * ) & init_net . sctp ;
2012-08-07 11:29:57 +04:00
2012-08-07 11:23:59 +04:00
net - > sctp . sysctl_header = register_net_sysctl ( net , " net/sctp " , table ) ;
2014-05-08 16:55:02 +04:00
if ( net - > sctp . sysctl_header = = NULL ) {
kfree ( table ) ;
return - ENOMEM ;
}
2012-08-07 11:23:59 +04:00
return 0 ;
}
void sctp_sysctl_net_unregister ( struct net * net )
{
2013-01-24 20:02:47 +04:00
struct ctl_table * table ;
table = net - > sctp . sysctl_header - > ctl_table_arg ;
2012-08-07 11:23:59 +04:00
unregister_net_sysctl_table ( net - > sctp . sysctl_header ) ;
2013-01-24 20:02:47 +04:00
kfree ( table ) ;
2012-08-07 11:23:59 +04:00
}
2013-12-23 08:16:51 +04:00
static struct ctl_table_header * sctp_sysctl_header ;
2005-04-17 02:20:36 +04:00
/* Sysctl registration. */
void sctp_sysctl_register ( void )
{
2012-04-19 17:44:49 +04:00
sctp_sysctl_header = register_net_sysctl ( & init_net , " net/sctp " , sctp_table ) ;
2005-04-17 02:20:36 +04:00
}
/* Sysctl deregistration. */
void sctp_sysctl_unregister ( void )
{
2012-04-19 17:24:33 +04:00
unregister_net_sysctl_table ( sctp_sysctl_header ) ;
2005-04-17 02:20:36 +04:00
}