From: Greg KH <gregkh@suse.de>
To: linux-kernel@vger.kernel.org, stable@kernel.org
Cc: Justin Forbes <jmforbes@linuxtx.org>,
Zwane Mwaikambo <zwane@arm.linux.org.uk>,
"Theodore Ts'o" <tytso@mit.edu>,
Randy Dunlap <rdunlap@xenotime.net>,
Dave Jones <davej@redhat.com>,
Chuck Wolber <chuckw@quantumlinux.com>,
Chris Wedgwood <reviews@ml.cw.f00f.org>,
Michael Krufky <mkrufky@linuxtv.org>,
Chuck Ebbert <cebbert@redhat.com>,
Domenico Andreoli <cavokz@gmail.com>, Willy Tarreau <w@1wt.eu>,
Rodrigo Rubira Branco <rbranco@la.checkpoint.com>,
Jake Edge <jake@lwn.net>, Eugene Teo <eteo@redhat.com>,
torvalds@linux-foundation.org, akpm@linux-foundation.org,
alan@lxorguk.ukuu.org.uk, John McCutchan <ttb@tentacle.dhs.org>,
Robert Love <rlove@google.com>,
Vegard Nossum <vegard.nossum@gmail.com>
Subject: [patch 04/32] inotify: clean up inotify_read and fix locking problems
Date: Fri, 30 Jan 2009 18:39:34 -0800 [thread overview]
Message-ID: <20090131023934.GE12147@kroah.com> (raw)
In-Reply-To: <20090131023906.GA12147@kroah.com>
[-- Attachment #1: inotify-clean-up-inotify_read-and-fix-locking-problems.patch --]
[-- Type: text/plain, Size: 5526 bytes --]
2.6.27-stable review patch. If anyone has any objections, please let us know.
------------------
From: Vegard Nossum <vegard.nossum@gmail.com>
commit 3632dee2f8b8a9720329f29eeaa4ec4669a3aff8 upstream.
If userspace supplies an invalid pointer to a read() of an inotify
instance, the inotify device's event list mutex is unlocked twice.
This causes an unbalance which effectively leaves the data structure
unprotected, and we can trigger oopses by accessing the inotify
instance from different tasks concurrently.
The best fix (contributed largely by Linus) is a total rewrite
of the function in question:
On Thu, Jan 22, 2009 at 7:05 AM, Linus Torvalds wrote:
> The thing to notice is that:
>
> - locking is done in just one place, and there is no question about it
> not having an unlock.
>
> - that whole double-while(1)-loop thing is gone.
>
> - use multiple functions to make nesting and error handling sane
>
> - do error testing after doing the things you always need to do, ie do
> this:
>
> mutex_lock(..)
> ret = function_call();
> mutex_unlock(..)
>
> .. test ret here ..
>
> instead of doing conditional exits with unlocking or freeing.
>
> So if the code is written in this way, it may still be buggy, but at least
> it's not buggy because of subtle "forgot to unlock" or "forgot to free"
> issues.
>
> This _always_ unlocks if it locked, and it always frees if it got a
> non-error kevent.
Cc: John McCutchan <ttb@tentacle.dhs.org>
Cc: Robert Love <rlove@google.com>
Signed-off-by: Vegard Nossum <vegard.nossum@gmail.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
---
fs/inotify_user.c | 135 +++++++++++++++++++++++++++++-------------------------
1 file changed, 74 insertions(+), 61 deletions(-)
--- a/fs/inotify_user.c
+++ b/fs/inotify_user.c
@@ -427,10 +427,61 @@ static unsigned int inotify_poll(struct
return ret;
}
+/*
+ * Get an inotify_kernel_event if one exists and is small
+ * enough to fit in "count". Return an error pointer if
+ * not large enough.
+ *
+ * Called with the device ev_mutex held.
+ */
+static struct inotify_kernel_event *get_one_event(struct inotify_device *dev,
+ size_t count)
+{
+ size_t event_size = sizeof(struct inotify_event);
+ struct inotify_kernel_event *kevent;
+
+ if (list_empty(&dev->events))
+ return NULL;
+
+ kevent = inotify_dev_get_event(dev);
+ if (kevent->name)
+ event_size += kevent->event.len;
+
+ if (event_size > count)
+ return ERR_PTR(-EINVAL);
+
+ remove_kevent(dev, kevent);
+ return kevent;
+}
+
+/*
+ * Copy an event to user space, returning how much we copied.
+ *
+ * We already checked that the event size is smaller than the
+ * buffer we had in "get_one_event()" above.
+ */
+static ssize_t copy_event_to_user(struct inotify_kernel_event *kevent,
+ char __user *buf)
+{
+ size_t event_size = sizeof(struct inotify_event);
+
+ if (copy_to_user(buf, &kevent->event, event_size))
+ return -EFAULT;
+
+ if (kevent->name) {
+ buf += event_size;
+
+ if (copy_to_user(buf, kevent->name, kevent->event.len))
+ return -EFAULT;
+
+ event_size += kevent->event.len;
+ }
+ return event_size;
+}
+
static ssize_t inotify_read(struct file *file, char __user *buf,
size_t count, loff_t *pos)
{
- size_t event_size = sizeof (struct inotify_event);
struct inotify_device *dev;
char __user *start;
int ret;
@@ -440,81 +491,43 @@ static ssize_t inotify_read(struct file
dev = file->private_data;
while (1) {
+ struct inotify_kernel_event *kevent;
prepare_to_wait(&dev->wq, &wait, TASK_INTERRUPTIBLE);
mutex_lock(&dev->ev_mutex);
- if (!list_empty(&dev->events)) {
- ret = 0;
- break;
- }
+ kevent = get_one_event(dev, count);
mutex_unlock(&dev->ev_mutex);
- if (file->f_flags & O_NONBLOCK) {
- ret = -EAGAIN;
- break;
- }
-
- if (signal_pending(current)) {
- ret = -EINTR;
- break;
+ if (kevent) {
+ ret = PTR_ERR(kevent);
+ if (IS_ERR(kevent))
+ break;
+ ret = copy_event_to_user(kevent, buf);
+ free_kevent(kevent);
+ if (ret < 0)
+ break;
+ buf += ret;
+ count -= ret;
+ continue;
}
- schedule();
- }
-
- finish_wait(&dev->wq, &wait);
- if (ret)
- return ret;
-
- while (1) {
- struct inotify_kernel_event *kevent;
-
- ret = buf - start;
- if (list_empty(&dev->events))
+ ret = -EAGAIN;
+ if (file->f_flags & O_NONBLOCK)
break;
-
- kevent = inotify_dev_get_event(dev);
- if (event_size + kevent->event.len > count) {
- if (ret == 0 && count > 0) {
- /*
- * could not get a single event because we
- * didn't have enough buffer space.
- */
- ret = -EINVAL;
- }
+ ret = -EINTR;
+ if (signal_pending(current))
break;
- }
- remove_kevent(dev, kevent);
- /*
- * Must perform the copy_to_user outside the mutex in order
- * to avoid a lock order reversal with mmap_sem.
- */
- mutex_unlock(&dev->ev_mutex);
-
- if (copy_to_user(buf, &kevent->event, event_size)) {
- ret = -EFAULT;
+ if (start != buf)
break;
- }
- buf += event_size;
- count -= event_size;
-
- if (kevent->name) {
- if (copy_to_user(buf, kevent->name, kevent->event.len)){
- ret = -EFAULT;
- break;
- }
- buf += kevent->event.len;
- count -= kevent->event.len;
- }
- free_kevent(kevent);
-
- mutex_lock(&dev->ev_mutex);
+ schedule();
}
- mutex_unlock(&dev->ev_mutex);
+ finish_wait(&dev->wq, &wait);
+ if (start != buf && ret != -EFAULT)
+ ret = buf - start;
return ret;
}
next prev parent reply other threads:[~2009-01-31 2:48 UTC|newest]
Thread overview: 36+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20090131023411.032399235@mini.kroah.org>
2009-01-31 2:39 ` [patch 00/32] 2.6.27-stable review Greg KH
2009-01-31 2:39 ` [patch 01/32] fuse: destroy bdi on umount Greg KH
2009-01-31 2:39 ` [patch 02/32] fuse: fix missing fput on error Greg KH
2009-01-31 2:39 ` [patch 03/32] fuse: fix NULL deref in fuse_file_alloc() Greg KH
2009-01-31 2:39 ` Greg KH [this message]
2009-01-31 2:39 ` [patch 05/32] mac80211: decrement ref count to netdev after launching mesh discovery Greg KH
2009-01-31 2:39 ` [patch 06/32] sysfs: fix problems with binary files Greg KH
2009-01-31 2:39 ` [patch 07/32] x86, mm: fix pte_free() Greg KH
2009-01-31 2:39 ` [patch 08/32] alpha: nautilus - fix compile failure with gcc-4.3 Greg KH
2009-01-31 2:39 ` [patch 09/32] it821x: Add ultra_mask quirk for Vortex86SX Greg KH
2009-01-31 2:40 ` [patch 10/32] libata: pata_via: support VX855, future chips whose IDE controller use 0x0571 Greg KH
2009-01-31 2:40 ` [patch 11/32] rtl8187: Add termination packet to prevent stall Greg KH
2009-01-31 2:40 ` [patch 12/32] serial_8250: support for Sealevel Systems Model 7803 COMM+8 Greg KH
2009-01-31 2:40 ` [patch 13/32] SUNRPC: Fix a memory leak in rpcb_getport_async Greg KH
2009-01-31 2:40 ` [patch 14/32] SUNRPC: Fix autobind on cloned rpc clients Greg KH
2009-01-31 2:40 ` [patch 15/32] USB: fix char-device disconnect handling Greg KH
2009-01-31 2:40 ` [patch 16/32] USB: storage: add unusual devs entry Greg KH
2009-01-31 2:40 ` [patch 17/32] USB: usbmon: Implement compat_ioctl Greg KH
2009-01-31 2:40 ` [patch 18/32] ALSA: hda - add another MacBook Pro 4, 1 subsystem ID Greg KH
2009-01-31 2:40 ` [patch 19/32] ALSA: hda - Add quirk for HP DV6700 laptop Greg KH
2009-01-31 2:40 ` [patch 20/32] ALSA: hda - Fix PCM reference NID for STAC/IDT analog outputs Greg KH
2009-01-31 2:40 ` [patch 21/32] bnx2x: Block nvram access when the device is inactive Greg KH
2009-01-31 2:40 ` [patch 22/32] crypto: authenc - Fix zero-length IV crash Greg KH
2009-01-31 2:40 ` [patch 23/32] crypto: ccm - Fix handling of null assoc data Greg KH
2009-01-31 2:40 ` [patch 24/32] epoll: drop max_user_instances and rely only on max_user_watches Greg KH
2009-01-31 2:40 ` [patch 25/32] ext3: Add sanity check to make_indexed_dir Greg KH
2009-01-31 2:40 ` [patch 26/32] include/linux: Add bsg.h to the Kernel exported headers Greg KH
2009-01-31 2:40 ` [patch 27/32] sgi-xpc: ensure flags are updated before bte_copy Greg KH
2009-01-31 2:40 ` [patch 28/32] sgi-xpc: Remove NULL pointer dereference Greg KH
2009-01-31 2:40 ` [patch 29/32] sound: virtuoso: do not overwrite EEPROM on Xonar D2/D2X Greg KH
2009-01-31 2:40 ` [patch 30/32] rtl8187: Fix error in setting OFDM power settings for RTL8187L Greg KH
2009-01-31 2:40 ` [patch 31/32] PCI hotplug: fix lock imbalance in pciehp Greg KH
2009-01-31 2:40 ` [patch 32/32] relay: fix lock imbalance in relay_late_setup_files Greg KH
2009-01-31 2:57 ` For -stable: sata_mv: fix 8-port timeouts on 508x/6081 chips Mark Lord
2009-01-31 3:11 ` [stable] " Greg KH
2009-01-31 19:24 ` Jeff Garzik
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20090131023934.GE12147@kroah.com \
--to=gregkh@suse.de \
--cc=akpm@linux-foundation.org \
--cc=alan@lxorguk.ukuu.org.uk \
--cc=cavokz@gmail.com \
--cc=cebbert@redhat.com \
--cc=chuckw@quantumlinux.com \
--cc=davej@redhat.com \
--cc=eteo@redhat.com \
--cc=jake@lwn.net \
--cc=jmforbes@linuxtx.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mkrufky@linuxtv.org \
--cc=rbranco@la.checkpoint.com \
--cc=rdunlap@xenotime.net \
--cc=reviews@ml.cw.f00f.org \
--cc=rlove@google.com \
--cc=stable@kernel.org \
--cc=torvalds@linux-foundation.org \
--cc=ttb@tentacle.dhs.org \
--cc=tytso@mit.edu \
--cc=vegard.nossum@gmail.com \
--cc=w@1wt.eu \
--cc=zwane@arm.linux.org.uk \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox