All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH net] inet: frag: enforce memory limits earlier
@ 2018-07-31  3:09 Eric Dumazet
  2018-07-31  5:54 ` Florian Westphal
  2018-07-31 21:44 ` David Miller
  0 siblings, 2 replies; 5+ messages in thread
From: Eric Dumazet @ 2018-07-31  3:09 UTC (permalink / raw)
  To: David S . Miller
  Cc: netdev, Eric Dumazet, Jann Horn, Eric Dumazet, Florian Westphal,
	Peter Oskolkov, Paolo Abeni

We currently check current frags memory usage only when
a new frag queue is created. This allows attackers to first
consume the memory budget (default : 4 MB) creating thousands
of frag queues, then sending tiny skbs to exceed high_thresh
limit by 2 to 3 order of magnitude.

Note that before commit 648700f76b03 ("inet: frags: use rhashtables
for reassembly units"), work queue could be starved under DOS,
getting no cpu cycles.
After commit 648700f76b03, only the per frag queue timer can eventually
remove an incomplete frag queue and its skbs.

Fixes: b13d3cbfb8e8 ("inet: frag: move eviction of queues to work queue")
Signed-off-by: Eric Dumazet <edumazet@google.com>
Reported-by: Jann Horn <jannh@google.com>
Cc: Florian Westphal <fw@strlen.de>
Cc: Peter Oskolkov <posk@google.com>
Cc: Paolo Abeni <pabeni@redhat.com>
---
 net/ipv4/inet_fragment.c | 6 +++---
 1 file changed, 3 insertions(+), 3 deletions(-)

diff --git a/net/ipv4/inet_fragment.c b/net/ipv4/inet_fragment.c
index 1e4cf3ab560fac154fefb7acd3539eb6e91ed84e..0d70608cc2e18bfa0df35f331e12fbe9b45b168b 100644
--- a/net/ipv4/inet_fragment.c
+++ b/net/ipv4/inet_fragment.c
@@ -157,9 +157,6 @@ static struct inet_frag_queue *inet_frag_alloc(struct netns_frags *nf,
 {
 	struct inet_frag_queue *q;
 
-	if (!nf->high_thresh || frag_mem_limit(nf) > nf->high_thresh)
-		return NULL;
-
 	q = kmem_cache_zalloc(f->frags_cachep, GFP_ATOMIC);
 	if (!q)
 		return NULL;
@@ -204,6 +201,9 @@ struct inet_frag_queue *inet_frag_find(struct netns_frags *nf, void *key)
 {
 	struct inet_frag_queue *fq;
 
+	if (!nf->high_thresh || frag_mem_limit(nf) > nf->high_thresh)
+		return NULL;
+
 	rcu_read_lock();
 
 	fq = rhashtable_lookup(&nf->rhashtable, key, nf->f->rhash_params);
-- 
2.18.0.345.g5c9ce644c3-goog

^ permalink raw reply related	[flat|nested] 5+ messages in thread

* Re: [PATCH net] inet: frag: enforce memory limits earlier
  2018-07-31  3:09 [PATCH net] inet: frag: enforce memory limits earlier Eric Dumazet
@ 2018-07-31  5:54 ` Florian Westphal
  2018-07-31 15:23   ` Jann Horn
  2018-07-31 21:44 ` David Miller
  1 sibling, 1 reply; 5+ messages in thread
From: Florian Westphal @ 2018-07-31  5:54 UTC (permalink / raw)
  To: Eric Dumazet
  Cc: David S . Miller, netdev, Jann Horn, Eric Dumazet,
	Florian Westphal, Peter Oskolkov, Paolo Abeni

Eric Dumazet <edumazet@google.com> wrote:
> We currently check current frags memory usage only when
> a new frag queue is created. This allows attackers to first
> consume the memory budget (default : 4 MB) creating thousands
> of frag queues, then sending tiny skbs to exceed high_thresh
> limit by 2 to 3 order of magnitude.
> 
> Note that before commit 648700f76b03 ("inet: frags: use rhashtables
> for reassembly units"), work queue could be starved under DOS,
> getting no cpu cycles.
> After commit 648700f76b03, only the per frag queue timer can eventually
> remove an incomplete frag queue and its skbs.

I'm not sure this is a good idea.

This can now prevent "good" queue from completing just because attacker
is sending garbage.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH net] inet: frag: enforce memory limits earlier
  2018-07-31  5:54 ` Florian Westphal
@ 2018-07-31 15:23   ` Jann Horn
  2018-07-31 15:52     ` Florian Westphal
  0 siblings, 1 reply; 5+ messages in thread
From: Jann Horn @ 2018-07-31 15:23 UTC (permalink / raw)
  To: Florian Westphal
  Cc: Eric Dumazet, David S. Miller, Network Development, eric.dumazet,
	posk, pabeni

On Tue, Jul 31, 2018 at 7:54 AM Florian Westphal <fw@strlen.de> wrote:
>
> Eric Dumazet <edumazet@google.com> wrote:
> > We currently check current frags memory usage only when
> > a new frag queue is created. This allows attackers to first
> > consume the memory budget (default : 4 MB) creating thousands
> > of frag queues, then sending tiny skbs to exceed high_thresh
> > limit by 2 to 3 order of magnitude.
> >
> > Note that before commit 648700f76b03 ("inet: frags: use rhashtables
> > for reassembly units"), work queue could be starved under DOS,
> > getting no cpu cycles.
> > After commit 648700f76b03, only the per frag queue timer can eventually
> > remove an incomplete frag queue and its skbs.
>
> I'm not sure this is a good idea.
>
> This can now prevent "good" queue from completing just because attacker
> is sending garbage.

There is only a limited amount of memory available to store fragments.
If you receive lots of fragments that don't form complete packets,
you'll have to drop some packets. I don't see why it matters whether
incoming garbage only prevents the creation of new queues or also the
completion of existing queues.

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH net] inet: frag: enforce memory limits earlier
  2018-07-31 15:23   ` Jann Horn
@ 2018-07-31 15:52     ` Florian Westphal
  0 siblings, 0 replies; 5+ messages in thread
From: Florian Westphal @ 2018-07-31 15:52 UTC (permalink / raw)
  To: Jann Horn
  Cc: Florian Westphal, Eric Dumazet, David S. Miller,
	Network Development, eric.dumazet, posk, pabeni

Jann Horn <jannh@google.com> wrote:
> On Tue, Jul 31, 2018 at 7:54 AM Florian Westphal <fw@strlen.de> wrote:
> >
> > Eric Dumazet <edumazet@google.com> wrote:
> > > We currently check current frags memory usage only when
> > > a new frag queue is created. This allows attackers to first
> > > consume the memory budget (default : 4 MB) creating thousands
> > > of frag queues, then sending tiny skbs to exceed high_thresh
> > > limit by 2 to 3 order of magnitude.
> > >
> > > Note that before commit 648700f76b03 ("inet: frags: use rhashtables
> > > for reassembly units"), work queue could be starved under DOS,
> > > getting no cpu cycles.
> > > After commit 648700f76b03, only the per frag queue timer can eventually
> > > remove an incomplete frag queue and its skbs.
> >
> > I'm not sure this is a good idea.
> >
> > This can now prevent "good" queue from completing just because attacker
> > is sending garbage.
> 
> There is only a limited amount of memory available to store fragments.
> If you receive lots of fragments that don't form complete packets,
> you'll have to drop some packets. I don't see why it matters whether
> incoming garbage only prevents the creation of new queues or also the
> completion of existing queues.

Agreed.  Objection withdrawn.

Acked-by: Florian Westphal <fw@strlen.de>

^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH net] inet: frag: enforce memory limits earlier
  2018-07-31  3:09 [PATCH net] inet: frag: enforce memory limits earlier Eric Dumazet
  2018-07-31  5:54 ` Florian Westphal
@ 2018-07-31 21:44 ` David Miller
  1 sibling, 0 replies; 5+ messages in thread
From: David Miller @ 2018-07-31 21:44 UTC (permalink / raw)
  To: edumazet; +Cc: netdev, jannh, eric.dumazet, fw, posk, pabeni

From: Eric Dumazet <edumazet@google.com>
Date: Mon, 30 Jul 2018 20:09:11 -0700

> We currently check current frags memory usage only when
> a new frag queue is created. This allows attackers to first
> consume the memory budget (default : 4 MB) creating thousands
> of frag queues, then sending tiny skbs to exceed high_thresh
> limit by 2 to 3 order of magnitude.
> 
> Note that before commit 648700f76b03 ("inet: frags: use rhashtables
> for reassembly units"), work queue could be starved under DOS,
> getting no cpu cycles.
> After commit 648700f76b03, only the per frag queue timer can eventually
> remove an incomplete frag queue and its skbs.
> 
> Fixes: b13d3cbfb8e8 ("inet: frag: move eviction of queues to work queue")
> Signed-off-by: Eric Dumazet <edumazet@google.com>
> Reported-by: Jann Horn <jannh@google.com>

Applied and queued up for -stable.

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2018-07-31 23:26 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-07-31  3:09 [PATCH net] inet: frag: enforce memory limits earlier Eric Dumazet
2018-07-31  5:54 ` Florian Westphal
2018-07-31 15:23   ` Jann Horn
2018-07-31 15:52     ` Florian Westphal
2018-07-31 21:44 ` David Miller

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.