From: Robert Hancock <hancockr@shaw.ca>
To: linux-kernel <linux-kernel@vger.kernel.org>
Subject: Re: Bogus buffer length check in linux-2.6.11 read()
Date: Wed, 16 Mar 2005 08:37:48 -0600 [thread overview]
Message-ID: <423844BC.3010707@shaw.ca> (raw)
In-Reply-To: <3IHxD-4Gb-5@gated-at.bofh.it>
linux-os wrote:
> I don't know how much more precise I could have been. I show the
> code that will cause the observed condition. I explain that this
> condition is new, that it doesn't correspond to the previous
> behavior.
>
> Never before was some buffer checked for length before some data
> was written to it. The EFAULT is supposed to occur IFF a write
> attempt occurs outside the caller's accessible address space.
> This used to be done by hardware during the write to user-space.
> This had zero impact upon performance. Now there is some
> software added that adds CPU cycles, subtracts performance,
> and cannot possibly do anything useful.
>
> Also, the code was written to show the problem. The code
> is not designed to be an example of good coding practice.
>
> The actual problem observed with the new kernel was
> when some legacy code used gets() instead of fgets().
> The call returned immediately with an EFAULT because
> the 'C' runtime library put some value that the kernel
> didn't 'like' (4096 bytes) in the subsequent read.
>
> This is code for which there are no sources available
> and it is required to be used, cannot be replaced,
> cannot be thrown away and costs about US$ 10,000
> from a company that is no longer in business.
>
> Somebody's arbitrary and capricious addition of spook
> code destroyed an application's functionality.
It appears this was added by the patch shown here:
http://lwn.net/Articles/122581/
The reason given was that if the read or write doesn't use all of the
available space due to end-of-file, etc. the remaining part of the
buffer given by the user is not checked for accessibility, thereby
hiding bugs. It makes little sense for an app to do a read or write with
a buffer larger than the space that they've actually allocated.
I can see how this might be a problem when using gets, since there is no
way to know how big the buffer that has been allocated by the
application is.
Note that access_ok only does a rudimentary check to determine if the
address might be a valid user-space address, it does not check every
page to determine if it is accessible or not like verify_area did (and
copy_to/from_user does).
--
Robert Hancock Saskatoon, SK, Canada
To email, remove "nospam" from hancockr@nospamshaw.ca
Home Page: http://www.roberthancock.com/
next prev parent reply other threads:[~2005-03-16 14:42 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
[not found] <3IoOm-5M2-49@gated-at.bofh.it>
2005-03-15 23:59 ` Bogus buffer length check in linux-2.6.11 read() Robert Hancock
2005-03-16 12:23 ` linux-os
[not found] ` <3IwVv-4kD-17@gated-at.bofh.it>
[not found] ` <3IFYO-3eg-37@gated-at.bofh.it>
[not found] ` <3IGUS-46t-27@gated-at.bofh.it>
[not found] ` <3IHxD-4Gb-5@gated-at.bofh.it>
2005-03-16 14:37 ` Robert Hancock [this message]
2005-03-15 17:59 linux-os
2005-03-16 2:56 ` Tom Felker
2005-03-16 12:29 ` linux-os
2005-03-16 13:30 ` Ian Campbell
2005-03-16 14:11 ` linux-os
2005-03-16 14:42 ` Eric Dumazet
2005-03-16 14:51 ` linux-os
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=423844BC.3010707@shaw.ca \
--to=hancockr@shaw.ca \
--cc=linux-kernel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox