From: Mikhail Ivanov <ivanov.mikhail1@huawei-partners.com>
To: <mic@digikod.net>, <gnoack@google.com>
Cc: <willemdebruijn.kernel@gmail.com>, <matthieu@buffet.re>,
<linux-security-module@vger.kernel.org>, <netdev@vger.kernel.org>,
<netfilter-devel@vger.kernel.org>, <yusongping@huawei.com>,
<artem.kuzin@huawei.com>, <konstantin.meskhidze@huawei.com>
Subject: Re: [RFC PATCH v2 3/8] landlock: Fix inconsistency of errors for TCP actions
Date: Thu, 17 Oct 2024 14:34:59 +0300 [thread overview]
Message-ID: <a68a9e2c-fb2c-3cd7-c076-ecf95e94606d@huawei-partners.com> (raw)
In-Reply-To: <20241017110454.265818-4-ivanov.mikhail1@huawei-partners.com>
On 10/17/2024 2:04 PM, Mikhail Ivanov wrote:
[...]
> +static int
> +check_tcp_connect_consistency_and_get_port(struct socket *const sock,
> + struct sockaddr *const address,
> + const int addrlen, __be16 *port)
> +{
> + int err = 0;
> + struct sock *const sk = sock->sk;
> +
> + /* Cf. __inet_stream_connect(). */
> + lock_sock(sk);
> + switch (sock->state) {
> + default:
> + err = -EINVAL;
> + break;
> + case SS_CONNECTED:
> + err = -EISCONN;
> + break;
> + case SS_CONNECTING:
> + /*
> + * Calling connect(2) on nonblocking socket with SYN_SENT or SYN_RECV
> + * state immediately returns -EISCONN and -EALREADY (Cf. __inet_stream_connect()).
> + *
> + * This check is not tested with kselftests.
> + */
> + if ((sock->file->f_flags & O_NONBLOCK) &&
> + ((1 << sk->sk_state) & (TCPF_SYN_SENT | TCPF_SYN_RECV))) {
> + if (inet_test_bit(DEFER_CONNECT, sk))
> + err = -EISCONN;
> + else
> + err = -EALREADY;
> + break;
> + }
> +
> + /*
> + * Current state is possible in two cases:
> + * 1. connect(2) is called upon nonblocking socket and previous
> + * connection attempt was closed by RST packet (therefore socket is
> + * in TCP_CLOSE state). In this case connect(2) calls
> + * sk_prot->disconnect(), changes socket state and increases number
> + * of disconnects.
> + * 2. connect(2) is called twice upon socket with TCP_FASTOPEN_CONNECT
> + * option set. If socket state is TCP_CLOSE connect(2) does the
> + * same logic as in point 1 case. Otherwise connect(2) may freeze
> + * after inet_wait_for_connect() call since SYN was never sent.
> + *
> + * For both this cases Landlock cannot provide error consistency since
> + * 1. Both cases involve executing some network stack logic and changing
> + * the socket state.
> + * 2. It cannot omit access check and allow network stack handle error
> + * consistency since socket can change its state to SS_UNCONNECTED
> + * before it will be locked again in inet_stream_connect().
> + *
> + * Therefore it is only possible to return 0 and check access right with
> + * check_access_port() helper.
> + */
> + release_sock(sk);
> + return 0;
Returning 0 is incorrect since port was not extracted yet. Last two
lines should be replaced with a "break" to let further switch safely
extract a port.
This also requires fix in tcp_errors_consistency.connect kselftest.
> + case SS_UNCONNECTED:
> + if (sk->sk_state != TCP_CLOSE)
> + err = -EISCONN;
> + break;
> + }
> + release_sock(sk);
> +
> + if (err)
> + return err;
> +
> + /* IPV6_ADDRFORM can change sk->sk_family under us. */
> + switch (READ_ONCE(sk->sk_family)) {
> + case AF_INET:
> + /* Cf. tcp_v4_connect(). */
> + if (addrlen < sizeof(struct sockaddr_in))
> + return -EINVAL;
> + if (address->sa_family != AF_INET)
> + return -EAFNOSUPPORT;
> +
> + *port = ((struct sockaddr_in *)address)->sin_port;
> + break;
> +#if IS_ENABLED(CONFIG_IPV6)
> + case AF_INET6:
> + /* Cf. tcp_v6_connect(). */
> + if (addrlen < SIN6_LEN_RFC2133)
> + return -EINVAL;
> + if (address->sa_family != AF_INET6)
> + return -EAFNOSUPPORT;
> +
> + *port = ((struct sockaddr_in6 *)address)->sin6_port;
> + break;
> +#endif /* IS_ENABLED(CONFIG_IPV6) */
> + default:
> + WARN_ON_ONCE(0);
> + return -EACCES;
> + }
> +
> + return 0;
> +}
next prev parent reply other threads:[~2024-10-17 11:35 UTC|newest]
Thread overview: 50+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-10-17 11:04 [RFC PATCH v2 0/8] Fix non-TCP restriction and inconsistency of TCP errors Mikhail Ivanov
2024-10-17 11:04 ` [RFC PATCH v2 1/8] landlock: Fix non-TCP sockets restriction Mikhail Ivanov
2024-10-17 12:59 ` Matthieu Baerts
2024-10-18 18:08 ` Mickaël Salaün
2024-10-31 16:21 ` Mikhail Ivanov
2024-11-08 17:16 ` David Laight
2024-12-04 19:29 ` Mickaël Salaün
2024-12-12 18:43 ` Mickaël Salaün
2024-12-13 18:19 ` Mikhail Ivanov
2025-01-24 15:02 ` Mickaël Salaün
2025-01-27 12:40 ` Mikhail Ivanov
2025-01-27 19:48 ` Mickaël Salaün
2025-01-28 10:56 ` Mikhail Ivanov
2025-01-28 18:14 ` Matthieu Baerts
2025-01-29 9:52 ` Mikhail Ivanov
2025-01-29 10:25 ` Matthieu Baerts
2025-01-29 11:02 ` Mikhail Ivanov
2025-01-29 11:33 ` Matthieu Baerts
2025-01-29 11:47 ` Mikhail Ivanov
2025-01-29 11:57 ` Matthieu Baerts
2025-01-29 14:51 ` Mickaël Salaün
2025-01-29 15:44 ` Matthieu Baerts
2025-01-30 9:51 ` Mickaël Salaün
2025-01-30 10:18 ` Matthieu Baerts
2025-01-31 11:04 ` Mikhail Ivanov
2024-12-04 19:27 ` Mickaël Salaün
2024-12-04 19:35 ` Mickaël Salaün
2024-12-09 10:19 ` Mikhail Ivanov
2024-12-10 18:04 ` Mickaël Salaün
2024-12-10 18:05 ` Mickaël Salaün
2024-12-11 15:24 ` Mikhail Ivanov
2024-12-12 18:43 ` Mickaël Salaün
2024-12-13 11:42 ` Mikhail Ivanov
2024-12-04 19:30 ` Mickaël Salaün
2024-12-09 10:19 ` Mikhail Ivanov
2024-10-17 11:04 ` [RFC PATCH v2 2/8] landlock: Make network stack layer checks explicit for each TCP action Mikhail Ivanov
2024-10-17 11:04 ` [RFC PATCH v2 3/8] landlock: Fix inconsistency of errors for TCP actions Mikhail Ivanov
2024-10-17 11:34 ` Mikhail Ivanov [this message]
2024-10-17 12:48 ` Tetsuo Handa
2024-11-06 9:27 ` Mikhail Ivanov
2024-12-04 19:32 ` Mickaël Salaün
2024-10-17 11:04 ` [RFC PATCH v2 4/8] selftests/landlock: Test TCP accesses with protocol=IPPROTO_TCP Mikhail Ivanov
2024-10-17 11:04 ` [RFC PATCH v2 5/8] selftests/landlock: Test that MPTCP actions are not restricted Mikhail Ivanov
2024-10-17 11:04 ` [RFC PATCH v2 6/8] selftests/landlock: Test consistency of errors for TCP actions Mikhail Ivanov
2024-12-10 18:07 ` Mickaël Salaün
2024-12-11 15:29 ` Mikhail Ivanov
2024-10-17 11:04 ` [RFC PATCH v2 7/8] landlock: Add note about errors consistency in documentation Mikhail Ivanov
2024-12-10 18:08 ` Mickaël Salaün
2024-12-11 15:30 ` Mikhail Ivanov
2024-10-17 11:04 ` [RFC PATCH v2 8/8] selftests/landlock: Test that SCTP actions are not restricted Mikhail Ivanov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=a68a9e2c-fb2c-3cd7-c076-ecf95e94606d@huawei-partners.com \
--to=ivanov.mikhail1@huawei-partners.com \
--cc=artem.kuzin@huawei.com \
--cc=gnoack@google.com \
--cc=konstantin.meskhidze@huawei.com \
--cc=linux-security-module@vger.kernel.org \
--cc=matthieu@buffet.re \
--cc=mic@digikod.net \
--cc=netdev@vger.kernel.org \
--cc=netfilter-devel@vger.kernel.org \
--cc=willemdebruijn.kernel@gmail.com \
--cc=yusongping@huawei.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).