linux-mm.kvack.org archive mirror
 help / color / mirror / Atom feed
* [PATCH] mm/backing-dev.c: check user buffer length before copy data to the related user buffer.
@ 2013-08-20  3:23 Chen Gang
  2013-08-20 15:28 ` Jan Kara
  2013-08-20 23:29 ` Andrew Morton
  0 siblings, 2 replies; 7+ messages in thread
From: Chen Gang @ 2013-08-20  3:23 UTC (permalink / raw)
  To: Jan Kara, Tejun Heo, jmoyer, Jens Axboe; +Cc: Andrew Morton, linux-mm

'*lenp' may be less than "sizeof(kbuf)", need check it before the next
copy_to_user().

pdflush_proc_obsolete() is called by sysctl which 'procname' is
"nr_pdflush_threads", if the user passes buffer length less than
"sizeof(kbuf)", it will cause issue.


Signed-off-by: Chen Gang <gang.chen@asianux.com>
---
 mm/backing-dev.c |    2 +-
 1 files changed, 1 insertions(+), 1 deletions(-)

diff --git a/mm/backing-dev.c b/mm/backing-dev.c
index e04454c..2674671 100644
--- a/mm/backing-dev.c
+++ b/mm/backing-dev.c
@@ -649,7 +649,7 @@ int pdflush_proc_obsolete(struct ctl_table *table, int write,
 {
 	char kbuf[] = "0\n";
 
-	if (*ppos) {
+	if (*ppos || *lenp < sizeof(kbuf)) {
 		*lenp = 0;
 		return 0;
 	}
-- 
1.7.7.6

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply related	[flat|nested] 7+ messages in thread

* Re: [PATCH] mm/backing-dev.c: check user buffer length before copy data to the related user buffer.
  2013-08-20  3:23 [PATCH] mm/backing-dev.c: check user buffer length before copy data to the related user buffer Chen Gang
@ 2013-08-20 15:28 ` Jan Kara
  2013-08-21  2:28   ` Chen Gang
  2013-08-20 23:29 ` Andrew Morton
  1 sibling, 1 reply; 7+ messages in thread
From: Jan Kara @ 2013-08-20 15:28 UTC (permalink / raw)
  To: Chen Gang
  Cc: Jan Kara, Tejun Heo, jmoyer, Jens Axboe, Andrew Morton, linux-mm

On Tue 20-08-13 11:23:24, Chen Gang wrote:
> '*lenp' may be less than "sizeof(kbuf)", need check it before the next
> copy_to_user().
> 
> pdflush_proc_obsolete() is called by sysctl which 'procname' is
> "nr_pdflush_threads", if the user passes buffer length less than
> "sizeof(kbuf)", it will cause issue.
> 
  Good catch. The patch looks good. You can add:
Reviewed-by: Jan Kara <jack@suse.cz>

								Honza
> 
> Signed-off-by: Chen Gang <gang.chen@asianux.com>
> ---
>  mm/backing-dev.c |    2 +-
>  1 files changed, 1 insertions(+), 1 deletions(-)
> 
> diff --git a/mm/backing-dev.c b/mm/backing-dev.c
> index e04454c..2674671 100644
> --- a/mm/backing-dev.c
> +++ b/mm/backing-dev.c
> @@ -649,7 +649,7 @@ int pdflush_proc_obsolete(struct ctl_table *table, int write,
>  {
>  	char kbuf[] = "0\n";
>  
> -	if (*ppos) {
> +	if (*ppos || *lenp < sizeof(kbuf)) {
>  		*lenp = 0;
>  		return 0;
>  	}
> -- 
> 1.7.7.6
-- 
Jan Kara <jack@suse.cz>
SUSE Labs, CR

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] mm/backing-dev.c: check user buffer length before copy data to the related user buffer.
  2013-08-20  3:23 [PATCH] mm/backing-dev.c: check user buffer length before copy data to the related user buffer Chen Gang
  2013-08-20 15:28 ` Jan Kara
@ 2013-08-20 23:29 ` Andrew Morton
  2013-08-21  3:35   ` Chen Gang
  1 sibling, 1 reply; 7+ messages in thread
From: Andrew Morton @ 2013-08-20 23:29 UTC (permalink / raw)
  To: Chen Gang; +Cc: Jan Kara, Tejun Heo, jmoyer, Jens Axboe, linux-mm

On Tue, 20 Aug 2013 11:23:24 +0800 Chen Gang <gang.chen@asianux.com> wrote:

> '*lenp' may be less than "sizeof(kbuf)", need check it before the next
> copy_to_user().
> 
> pdflush_proc_obsolete() is called by sysctl which 'procname' is
> "nr_pdflush_threads", if the user passes buffer length less than
> "sizeof(kbuf)", it will cause issue.
> 
> ...
>
> --- a/mm/backing-dev.c
> +++ b/mm/backing-dev.c
> @@ -649,7 +649,7 @@ int pdflush_proc_obsolete(struct ctl_table *table, int write,
>  {
>  	char kbuf[] = "0\n";
>  
> -	if (*ppos) {
> +	if (*ppos || *lenp < sizeof(kbuf)) {
>  		*lenp = 0;
>  		return 0;
>  	}

Well sort-of.  If userspace opens /proc/sys/vm/nr_pdflush_threads and
then does a series of one-byte reads, the kernel should return "0" on the
first read, "\n" on the second and then EOF.

However this usually doesn't work in /proc anyway :(

akpm3:/tmp> cat /proc/sys/vm/max_map_count         
65530
akpm3:/tmp> dd if=/proc/sys/vm/max_map_count of=foo bs=1
1+0 records in
1+0 records out
1 byte (1 B) copied, 0.00011963 s, 8.4 kB/s
akpm3:/tmp> wc foo
0 1 1 foo

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] mm/backing-dev.c: check user buffer length before copy data to the related user buffer.
  2013-08-20 15:28 ` Jan Kara
@ 2013-08-21  2:28   ` Chen Gang
  0 siblings, 0 replies; 7+ messages in thread
From: Chen Gang @ 2013-08-21  2:28 UTC (permalink / raw)
  To: Jan Kara; +Cc: Tejun Heo, jmoyer, Jens Axboe, Andrew Morton, linux-mm

On 08/20/2013 11:28 PM, Jan Kara wrote:
> On Tue 20-08-13 11:23:24, Chen Gang wrote:
>> '*lenp' may be less than "sizeof(kbuf)", need check it before the next
>> copy_to_user().
>>
>> pdflush_proc_obsolete() is called by sysctl which 'procname' is
>> "nr_pdflush_threads", if the user passes buffer length less than
>> "sizeof(kbuf)", it will cause issue.
>>
>   Good catch. The patch looks good. You can add:
> Reviewed-by: Jan Kara <jack@suse.cz>
> 

Thanks.

> 								Honza
>>
>> Signed-off-by: Chen Gang <gang.chen@asianux.com>
>> ---
>>  mm/backing-dev.c |    2 +-
>>  1 files changed, 1 insertions(+), 1 deletions(-)
>>
>> diff --git a/mm/backing-dev.c b/mm/backing-dev.c
>> index e04454c..2674671 100644
>> --- a/mm/backing-dev.c
>> +++ b/mm/backing-dev.c
>> @@ -649,7 +649,7 @@ int pdflush_proc_obsolete(struct ctl_table *table, int write,
>>  {
>>  	char kbuf[] = "0\n";
>>  
>> -	if (*ppos) {
>> +	if (*ppos || *lenp < sizeof(kbuf)) {
>>  		*lenp = 0;
>>  		return 0;
>>  	}
>> -- 
>> 1.7.7.6


-- 
Chen Gang

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] mm/backing-dev.c: check user buffer length before copy data to the related user buffer.
  2013-08-20 23:29 ` Andrew Morton
@ 2013-08-21  3:35   ` Chen Gang
  2013-08-21  3:45     ` Andrew Morton
  0 siblings, 1 reply; 7+ messages in thread
From: Chen Gang @ 2013-08-21  3:35 UTC (permalink / raw)
  To: Andrew Morton; +Cc: Jan Kara, Tejun Heo, jmoyer, Jens Axboe, linux-mm

On 08/21/2013 07:29 AM, Andrew Morton wrote:
> On Tue, 20 Aug 2013 11:23:24 +0800 Chen Gang <gang.chen@asianux.com> wrote:
> 
>> '*lenp' may be less than "sizeof(kbuf)", need check it before the next
>> copy_to_user().
>>
>> pdflush_proc_obsolete() is called by sysctl which 'procname' is
>> "nr_pdflush_threads", if the user passes buffer length less than
>> "sizeof(kbuf)", it will cause issue.
>>
>> ...
>>
>> --- a/mm/backing-dev.c
>> +++ b/mm/backing-dev.c
>> @@ -649,7 +649,7 @@ int pdflush_proc_obsolete(struct ctl_table *table, int write,
>>  {
>>  	char kbuf[] = "0\n";
>>  
>> -	if (*ppos) {
>> +	if (*ppos || *lenp < sizeof(kbuf)) {
>>  		*lenp = 0;
>>  		return 0;
>>  	}
> 
> Well sort-of.  If userspace opens /proc/sys/vm/nr_pdflush_threads and
> then does a series of one-byte reads, the kernel should return "0" on the
> first read, "\n" on the second and then EOF.
> 

Excuse me for my English, I guess your meaning is

  "this patch is OK, but can be improvement"

Is it correct ?

> However this usually doesn't work in /proc anyway :(
> 
> akpm3:/tmp> cat /proc/sys/vm/max_map_count         
> 65530
> akpm3:/tmp> dd if=/proc/sys/vm/max_map_count of=foo bs=1
> 1+0 records in
> 1+0 records out
> 1 byte (1 B) copied, 0.00011963 s, 8.4 kB/s
> akpm3:/tmp> wc foo
> 0 1 1 foo
> 

Also excuse me for my English, I guess your meaning is:

  for "dd if=/proc/sys/vm/* of=/tmp/foo bs=1",
  need return "1 byte (1 B) copied", not 2 bytes (memory overflow), or 0 which meaningless.



If both of my guesses are correct, is the diff below better ?

----------------------------diff begin----------------------------------

diff --git a/mm/backing-dev.c b/mm/backing-dev.c
index e04454c..d3be432 100644
--- a/mm/backing-dev.c
+++ b/mm/backing-dev.c
@@ -647,19 +647,19 @@ EXPORT_SYMBOL(wait_iff_congested);
 int pdflush_proc_obsolete(struct ctl_table *table, int write,
 			void __user *buffer, size_t *lenp, loff_t *ppos)
 {
-	char kbuf[] = "0\n";
+	char kbuf[2] = {'0', '\n'};
 
 	if (*ppos) {
 		*lenp = 0;
 		return 0;
 	}
 
-	if (copy_to_user(buffer, kbuf, sizeof(kbuf)))
+	if (copy_to_user(buffer, kbuf, min(*lenp, sizeof(kbuf))))
 		return -EFAULT;
 	printk_once(KERN_WARNING "%s exported in /proc is scheduled for removal\n",
 			table->procname);
 
-	*lenp = 2;
+	*lenp = min(*lenp, sizeof(kbuf));
 	*ppos += *lenp;
 	return 2;
 }

----------------------------diff end------------------------------------


The diff above is not tested, if OK, I will send related patch after
finish the related test.


Thanks.
-- 
Chen Gang

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply related	[flat|nested] 7+ messages in thread

* Re: [PATCH] mm/backing-dev.c: check user buffer length before copy data to the related user buffer.
  2013-08-21  3:35   ` Chen Gang
@ 2013-08-21  3:45     ` Andrew Morton
  2013-08-21  3:56       ` Chen Gang
  0 siblings, 1 reply; 7+ messages in thread
From: Andrew Morton @ 2013-08-21  3:45 UTC (permalink / raw)
  To: Chen Gang; +Cc: Jan Kara, Tejun Heo, jmoyer, Jens Axboe, linux-mm

On Wed, 21 Aug 2013 11:35:04 +0800 Chen Gang <gang.chen@asianux.com> wrote:

> On 08/21/2013 07:29 AM, Andrew Morton wrote:
> > On Tue, 20 Aug 2013 11:23:24 +0800 Chen Gang <gang.chen@asianux.com> wrote:
> > 
> >> '*lenp' may be less than "sizeof(kbuf)", need check it before the next
> >> copy_to_user().
> >>
> >> pdflush_proc_obsolete() is called by sysctl which 'procname' is
> >> "nr_pdflush_threads", if the user passes buffer length less than
> >> "sizeof(kbuf)", it will cause issue.
> >>
> >> ...
> >>
> >> --- a/mm/backing-dev.c
> >> +++ b/mm/backing-dev.c
> >> @@ -649,7 +649,7 @@ int pdflush_proc_obsolete(struct ctl_table *table, int write,
> >>  {
> >>  	char kbuf[] = "0\n";
> >>  
> >> -	if (*ppos) {
> >> +	if (*ppos || *lenp < sizeof(kbuf)) {
> >>  		*lenp = 0;
> >>  		return 0;
> >>  	}
> > 
> > Well sort-of.  If userspace opens /proc/sys/vm/nr_pdflush_threads and
> > then does a series of one-byte reads, the kernel should return "0" on the
> > first read, "\n" on the second and then EOF.
> > 
> 
> Excuse me for my English, I guess your meaning is
> 
>   "this patch is OK, but can be improvement"
> 
> Is it correct ?

Not really.  I was pointing out that the patched code doesn't correctly
implement read(1) behavior.  But that is true of many other procfs
files, so I suggest we not attempt to address the problem for this
procfs file.


--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply	[flat|nested] 7+ messages in thread

* Re: [PATCH] mm/backing-dev.c: check user buffer length before copy data to the related user buffer.
  2013-08-21  3:45     ` Andrew Morton
@ 2013-08-21  3:56       ` Chen Gang
  0 siblings, 0 replies; 7+ messages in thread
From: Chen Gang @ 2013-08-21  3:56 UTC (permalink / raw)
  To: Andrew Morton; +Cc: Jan Kara, Tejun Heo, jmoyer, Jens Axboe, linux-mm

On 08/21/2013 11:45 AM, Andrew Morton wrote:
> On Wed, 21 Aug 2013 11:35:04 +0800 Chen Gang <gang.chen@asianux.com> wrote:
> 
>> On 08/21/2013 07:29 AM, Andrew Morton wrote:
>>> On Tue, 20 Aug 2013 11:23:24 +0800 Chen Gang <gang.chen@asianux.com> wrote:
>>>
>>>> '*lenp' may be less than "sizeof(kbuf)", need check it before the next
>>>> copy_to_user().
>>>>
>>>> pdflush_proc_obsolete() is called by sysctl which 'procname' is
>>>> "nr_pdflush_threads", if the user passes buffer length less than
>>>> "sizeof(kbuf)", it will cause issue.
>>>>
>>>> ...
>>>>
>>>> --- a/mm/backing-dev.c
>>>> +++ b/mm/backing-dev.c
>>>> @@ -649,7 +649,7 @@ int pdflush_proc_obsolete(struct ctl_table *table, int write,
>>>>  {
>>>>  	char kbuf[] = "0\n";
>>>>  
>>>> -	if (*ppos) {
>>>> +	if (*ppos || *lenp < sizeof(kbuf)) {
>>>>  		*lenp = 0;
>>>>  		return 0;
>>>>  	}
>>>
>>> Well sort-of.  If userspace opens /proc/sys/vm/nr_pdflush_threads and
>>> then does a series of one-byte reads, the kernel should return "0" on the
>>> first read, "\n" on the second and then EOF.
>>>
>>
>> Excuse me for my English, I guess your meaning is
>>
>>   "this patch is OK, but can be improvement"
>>
>> Is it correct ?
> 
> Not really.  I was pointing out that the patched code doesn't correctly
> implement read(1) behavior.  But that is true of many other procfs
> files, so I suggest we not attempt to address the problem for this
> procfs file.
> 
> 
> 
> 

Hmm... does the fix below correctly implement read(1) behavior ?

----------------------------diff begin----------------------------------

diff --git a/mm/backing-dev.c b/mm/backing-dev.c
index e04454c..d3be432 100644
--- a/mm/backing-dev.c
+++ b/mm/backing-dev.c
@@ -647,19 +647,19 @@ EXPORT_SYMBOL(wait_iff_congested);
 int pdflush_proc_obsolete(struct ctl_table *table, int write,
 			void __user *buffer, size_t *lenp, loff_t *ppos)
 {
-	char kbuf[] = "0\n";
+	char kbuf[2] = {'0', '\n'};
 
 	if (*ppos) {
 		*lenp = 0;
 		return 0;
 	}
 
-	if (copy_to_user(buffer, kbuf, sizeof(kbuf)))
+	if (copy_to_user(buffer, kbuf, min(*lenp, sizeof(kbuf))))
 		return -EFAULT;
 	printk_once(KERN_WARNING "%s exported in /proc is scheduled for removal\n",
 			table->procname);
 
-	*lenp = 2;
+	*lenp = min(*lenp, sizeof(kbuf));
 	*ppos += *lenp;
 	return 2;
 }

----------------------------diff end------------------------------------


The diff above is not tested, if OK, I will send related patch after
finish the related test.


Thanks.
-- 
Chen Gang

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>

^ permalink raw reply related	[flat|nested] 7+ messages in thread

end of thread, other threads:[~2013-08-21  3:58 UTC | newest]

Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2013-08-20  3:23 [PATCH] mm/backing-dev.c: check user buffer length before copy data to the related user buffer Chen Gang
2013-08-20 15:28 ` Jan Kara
2013-08-21  2:28   ` Chen Gang
2013-08-20 23:29 ` Andrew Morton
2013-08-21  3:35   ` Chen Gang
2013-08-21  3:45     ` Andrew Morton
2013-08-21  3:56       ` Chen Gang

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).