From: Greg KH <gregkh@suse.de>
To: linux-kernel@vger.kernel.org, stable@kernel.org
Cc: Justin Forbes <jmforbes@linuxtx.org>,
Zwane Mwaikambo <zwane@arm.linux.org.uk>,
"Theodore Ts'o" <tytso@mit.edu>,
Randy Dunlap <rdunlap@xenotime.net>,
Dave Jones <davej@redhat.com>,
Chuck Wolber <chuckw@quantumlinux.com>,
Chris Wedgwood <reviews@ml.cw.f00f.org>,
Michael Krufky <mkrufky@linuxtv.org>,
Chuck Ebbert <cebbert@redhat.com>,
Domenico Andreoli <cavokz@gmail.com>, Willy Tarreau <w@1wt.eu>,
Rodrigo Rubira Branco <rbranco@la.checkpoint.com>,
Jake Edge <jake@lwn.net>, Eugene Teo <eteo@redhat.com>,
torvalds@linux-foundation.org, akpm@linux-foundation.org,
alan@lxorguk.ukuu.org.uk, John McCutchan <ttb@tentacle.dhs.org>,
Robert Love <rlove@google.com>,
Vegard Nossum <vegard.nossum@gmail.com>
Subject: [patch 03/43] inotify: clean up inotify_read and fix locking problems
Date: Fri, 30 Jan 2009 18:42:19 -0800 [thread overview]
Message-ID: <20090131024219.GD12368@kroah.com> (raw)
In-Reply-To: <20090131024158.GA12368@kroah.com>
[-- Attachment #1: inotify-clean-up-inotify_read-and-fix-locking-problems.patch --]
[-- Type: text/plain, Size: 5526 bytes --]
2.6.28-stable review patch. If anyone has any objections, please let us know.
------------------
From: Vegard Nossum <vegard.nossum@gmail.com>
commit 3632dee2f8b8a9720329f29eeaa4ec4669a3aff8 upstream.
If userspace supplies an invalid pointer to a read() of an inotify
instance, the inotify device's event list mutex is unlocked twice.
This causes an unbalance which effectively leaves the data structure
unprotected, and we can trigger oopses by accessing the inotify
instance from different tasks concurrently.
The best fix (contributed largely by Linus) is a total rewrite
of the function in question:
On Thu, Jan 22, 2009 at 7:05 AM, Linus Torvalds wrote:
> The thing to notice is that:
>
> - locking is done in just one place, and there is no question about it
> not having an unlock.
>
> - that whole double-while(1)-loop thing is gone.
>
> - use multiple functions to make nesting and error handling sane
>
> - do error testing after doing the things you always need to do, ie do
> this:
>
> mutex_lock(..)
> ret = function_call();
> mutex_unlock(..)
>
> .. test ret here ..
>
> instead of doing conditional exits with unlocking or freeing.
>
> So if the code is written in this way, it may still be buggy, but at least
> it's not buggy because of subtle "forgot to unlock" or "forgot to free"
> issues.
>
> This _always_ unlocks if it locked, and it always frees if it got a
> non-error kevent.
Cc: John McCutchan <ttb@tentacle.dhs.org>
Cc: Robert Love <rlove@google.com>
Signed-off-by: Vegard Nossum <vegard.nossum@gmail.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
---
fs/inotify_user.c | 135 +++++++++++++++++++++++++++++-------------------------
1 file changed, 74 insertions(+), 61 deletions(-)
--- a/fs/inotify_user.c
+++ b/fs/inotify_user.c
@@ -427,10 +427,61 @@ static unsigned int inotify_poll(struct
return ret;
}
+/*
+ * Get an inotify_kernel_event if one exists and is small
+ * enough to fit in "count". Return an error pointer if
+ * not large enough.
+ *
+ * Called with the device ev_mutex held.
+ */
+static struct inotify_kernel_event *get_one_event(struct inotify_device *dev,
+ size_t count)
+{
+ size_t event_size = sizeof(struct inotify_event);
+ struct inotify_kernel_event *kevent;
+
+ if (list_empty(&dev->events))
+ return NULL;
+
+ kevent = inotify_dev_get_event(dev);
+ if (kevent->name)
+ event_size += kevent->event.len;
+
+ if (event_size > count)
+ return ERR_PTR(-EINVAL);
+
+ remove_kevent(dev, kevent);
+ return kevent;
+}
+
+/*
+ * Copy an event to user space, returning how much we copied.
+ *
+ * We already checked that the event size is smaller than the
+ * buffer we had in "get_one_event()" above.
+ */
+static ssize_t copy_event_to_user(struct inotify_kernel_event *kevent,
+ char __user *buf)
+{
+ size_t event_size = sizeof(struct inotify_event);
+
+ if (copy_to_user(buf, &kevent->event, event_size))
+ return -EFAULT;
+
+ if (kevent->name) {
+ buf += event_size;
+
+ if (copy_to_user(buf, kevent->name, kevent->event.len))
+ return -EFAULT;
+
+ event_size += kevent->event.len;
+ }
+ return event_size;
+}
+
static ssize_t inotify_read(struct file *file, char __user *buf,
size_t count, loff_t *pos)
{
- size_t event_size = sizeof (struct inotify_event);
struct inotify_device *dev;
char __user *start;
int ret;
@@ -440,81 +491,43 @@ static ssize_t inotify_read(struct file
dev = file->private_data;
while (1) {
+ struct inotify_kernel_event *kevent;
prepare_to_wait(&dev->wq, &wait, TASK_INTERRUPTIBLE);
mutex_lock(&dev->ev_mutex);
- if (!list_empty(&dev->events)) {
- ret = 0;
- break;
- }
+ kevent = get_one_event(dev, count);
mutex_unlock(&dev->ev_mutex);
- if (file->f_flags & O_NONBLOCK) {
- ret = -EAGAIN;
- break;
- }
-
- if (signal_pending(current)) {
- ret = -EINTR;
- break;
+ if (kevent) {
+ ret = PTR_ERR(kevent);
+ if (IS_ERR(kevent))
+ break;
+ ret = copy_event_to_user(kevent, buf);
+ free_kevent(kevent);
+ if (ret < 0)
+ break;
+ buf += ret;
+ count -= ret;
+ continue;
}
- schedule();
- }
-
- finish_wait(&dev->wq, &wait);
- if (ret)
- return ret;
-
- while (1) {
- struct inotify_kernel_event *kevent;
-
- ret = buf - start;
- if (list_empty(&dev->events))
+ ret = -EAGAIN;
+ if (file->f_flags & O_NONBLOCK)
break;
-
- kevent = inotify_dev_get_event(dev);
- if (event_size + kevent->event.len > count) {
- if (ret == 0 && count > 0) {
- /*
- * could not get a single event because we
- * didn't have enough buffer space.
- */
- ret = -EINVAL;
- }
+ ret = -EINTR;
+ if (signal_pending(current))
break;
- }
- remove_kevent(dev, kevent);
- /*
- * Must perform the copy_to_user outside the mutex in order
- * to avoid a lock order reversal with mmap_sem.
- */
- mutex_unlock(&dev->ev_mutex);
-
- if (copy_to_user(buf, &kevent->event, event_size)) {
- ret = -EFAULT;
+ if (start != buf)
break;
- }
- buf += event_size;
- count -= event_size;
-
- if (kevent->name) {
- if (copy_to_user(buf, kevent->name, kevent->event.len)){
- ret = -EFAULT;
- break;
- }
- buf += kevent->event.len;
- count -= kevent->event.len;
- }
- free_kevent(kevent);
-
- mutex_lock(&dev->ev_mutex);
+ schedule();
}
- mutex_unlock(&dev->ev_mutex);
+ finish_wait(&dev->wq, &wait);
+ if (start != buf && ret != -EFAULT)
+ ret = buf - start;
return ret;
}
next prev parent reply other threads:[~2009-01-31 2:59 UTC|newest]
Thread overview: 44+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <20090131022548.656772939@mini.kroah.org>
2009-01-31 2:41 ` [patch 00/43] 2.6.28-stable review Greg KH
2009-01-31 2:42 ` [patch 01/43] ath5k: fix mesh point operation Greg KH
2009-01-31 2:42 ` [patch 02/43] mac80211: decrement ref count to netdev after launching mesh discovery Greg KH
2009-01-31 2:42 ` Greg KH [this message]
2009-01-31 2:42 ` [patch 04/43] fuse: destroy bdi on umount Greg KH
2009-01-31 2:42 ` [patch 05/43] fuse: fix missing fput on error Greg KH
2009-01-31 2:42 ` [patch 06/43] fuse: fix NULL deref in fuse_file_alloc() Greg KH
2009-01-31 2:42 ` [patch 07/43] x86, mm: fix pte_free() Greg KH
2009-01-31 2:42 ` [patch 08/43] klist.c: bit 0 in pointer cant be used as flag Greg KH
2009-01-31 2:42 ` [patch 09/43] sysfs: fix problems with binary files Greg KH
2009-01-31 2:42 ` [patch 10/43] x86: fix page attribute corruption with cpa() Greg KH
2009-01-31 2:42 ` [patch 11/43] USB: fix toggle mismatch in disable_endpoint paths Greg KH
2009-01-31 2:42 ` [patch 12/43] sound: virtuoso: enable UART on Xonar HDAV1.3 Greg KH
2009-01-31 2:42 ` [patch 13/43] USB: usbmon: Implement compat_ioctl Greg KH
2009-01-31 2:42 ` [patch 14/43] USB: fix char-device disconnect handling Greg KH
2009-01-31 2:42 ` [patch 15/43] USB: storage: add unusual devs entry Greg KH
2009-01-31 2:42 ` [patch 16/43] alpha: nautilus - fix compile failure with gcc-4.3 Greg KH
2009-01-31 2:42 ` [patch 17/43] alpha: fix vmalloc breakage Greg KH
2009-01-31 2:42 ` [patch 18/43] resources: skip sanity check of busy resources Greg KH
2009-01-31 2:42 ` [patch 19/43] rtl8187: Add termination packet to prevent stall Greg KH
2009-01-31 2:42 ` [patch 20/43] it821x: Add ultra_mask quirk for Vortex86SX Greg KH
2009-01-31 2:42 ` [patch 21/43] libata: pata_via: support VX855, future chips whose IDE controller use 0x0571 Greg KH
2009-01-31 2:42 ` [patch 22/43] serial_8250: support for Sealevel Systems Model 7803 COMM+8 Greg KH
2009-01-31 2:43 ` [patch 23/43] drm: stash AGP include under the do-we-have-AGP ifdef Greg KH
2009-01-31 2:43 ` [patch 24/43] Fix OOPS in mmap_region() when merging adjacent VM_LOCKED file segments Greg KH
2009-01-31 2:43 ` [patch 25/43] bnx2x: Block nvram access when the device is inactive Greg KH
2009-01-31 2:43 ` [patch 26/43] ext3: Add sanity check to make_indexed_dir Greg KH
2009-01-31 2:43 ` [patch 27/43] rtl8187: Fix error in setting OFDM power settings for RTL8187L Greg KH
2009-01-31 2:44 ` [patch 28/43] epoll: drop max_user_instances and rely only on max_user_watches Greg KH
2009-01-31 2:44 ` [patch 29/43] gpiolib: fix request related issue Greg KH
2009-01-31 2:44 ` [patch 30/43] sgi-xpc: Remove NULL pointer dereference Greg KH
2009-01-31 2:44 ` [patch 31/43] sgi-xpc: ensure flags are updated before bte_copy Greg KH
2009-01-31 2:44 ` [patch 32/43] include/linux: Add bsg.h to the Kernel exported headers Greg KH
2009-01-31 2:44 ` [patch 33/43] ALSA: hda - Fix PCM reference NID for STAC/IDT analog outputs Greg KH
2009-01-31 2:44 ` [patch 34/43] ALSA: hda - add another MacBook Pro 4, 1 subsystem ID Greg KH
2009-01-31 2:44 ` [patch 35/43] ALSA: hda - Add quirk for HP DV6700 laptop Greg KH
2009-01-31 2:44 ` [patch 36/43] crypto: authenc - Fix zero-length IV crash Greg KH
2009-01-31 2:44 ` [patch 37/43] crypto: ccm - Fix handling of null assoc data Greg KH
2009-01-31 2:44 ` [patch 38/43] x86, pat: fix reserve_memtype() for legacy 1MB range Greg KH
2009-01-31 2:44 ` [patch 39/43] x86, pat: fix PTE corruption issue while mapping RAM using /dev/mem Greg KH
2009-01-31 2:44 ` [patch 40/43] PCI hotplug: fix lock imbalance in pciehp Greg KH
2009-01-31 2:44 ` [patch 41/43] dmaengine: fix dependency chaining Greg KH
2009-01-31 2:45 ` [patch 42/43] NET: net_namespace, fix lock imbalance Greg KH
2009-01-31 2:45 ` [patch 43/43] relay: fix lock imbalance in relay_late_setup_files Greg KH
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20090131024219.GD12368@kroah.com \
--to=gregkh@suse.de \
--cc=akpm@linux-foundation.org \
--cc=alan@lxorguk.ukuu.org.uk \
--cc=cavokz@gmail.com \
--cc=cebbert@redhat.com \
--cc=chuckw@quantumlinux.com \
--cc=davej@redhat.com \
--cc=eteo@redhat.com \
--cc=jake@lwn.net \
--cc=jmforbes@linuxtx.org \
--cc=linux-kernel@vger.kernel.org \
--cc=mkrufky@linuxtv.org \
--cc=rbranco@la.checkpoint.com \
--cc=rdunlap@xenotime.net \
--cc=reviews@ml.cw.f00f.org \
--cc=rlove@google.com \
--cc=stable@kernel.org \
--cc=torvalds@linux-foundation.org \
--cc=ttb@tentacle.dhs.org \
--cc=tytso@mit.edu \
--cc=vegard.nossum@gmail.com \
--cc=w@1wt.eu \
--cc=zwane@arm.linux.org.uk \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox