Fix refcounting bug in CRIU interface, noticed by Chris Salls (Oleg & Tycho).

-----BEGIN PGP SIGNATURE-----
 Version: GnuPG v1
 Comment: Kees Cook <kees@outflux.net>
 
 iQIcBAABCgAGBQJZzI6SAAoJEIly9N/cbcAmlg8P/iwmvIvZFXRIXqtjxV+i7Fom
 YxccAYhPGCpjmpewnlw46jErCd6mOhoL5QsA/Ab1uUHr4YwDZGAMSBhZcOtJIT3h
 5Yk+DdQCZkirM2xpBt4+sD2oGpnZaKS0rqmkYxM8XPZMVWsIGQu05oBGONkPQP1Q
 HkourKw1/UEqdUh3MqV0Vej+luniA8PI7nD61v6uYAxK+5XO5xJN9c3BqNBSFjXR
 dIzFHd/zlYICihaaPe+CVsDfHc/pn/kt2o7dvdtlPnJrz/doy69m9jOZUQkmeqkJ
 /ho+BQKchci5hqeaV5guhzZugiVUbYLPCtVEDJKm+hiRr4iu/5yKRNuxjbNQ4VHh
 68zF2yhLlilEqXgGQQ/kOvfUP/cWYKpirpCpFLRBQtuo+XF9EwoOR/MmdhRFu2Id
 lh+UgUeQW87Qdv+OKCIdb7tIJh04N1fXc5YBRjEZ/oSzDbl17HnVEfhHEksul8nf
 cX1uTJpt83d4SzMCkOGFVWYBK7U/xNnc+7hOB4tRYBb1il76xIII3A8jl481t2Ss
 VmTJcQd1t1HHYX8Og7S5yxAUH9+/FSRMwe6IWymPW82EFYayo1s98rWDp6Xpmezf
 ZlR4XdZvUWsY0KnMbbOyS0+9dMjyf0yV/E1Nxpm7oaqFz0rR8wjb9nJ4nvf9WofF
 2hzoKUX1kdn+eLftjDs6
 =Hnjh
 -----END PGP SIGNATURE-----

Merge tag 'seccomp-v4.14-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux

Pull seccomp fix from Kees Cook:
 "Fix refcounting bug in CRIU interface, noticed by Chris Salls (Oleg &
  Tycho)"

* tag 'seccomp-v4.14-rc3' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux:
  seccomp: fix the usage of get/put_seccomp_filter() in seccomp_get_filter()
This commit is contained in:
Linus Torvalds 2017-09-28 11:20:52 -07:00
commit 26e811cdb9
1 changed files with 16 additions and 7 deletions

View File

@ -473,14 +473,19 @@ static long seccomp_attach_filter(unsigned int flags,
return 0; return 0;
} }
void __get_seccomp_filter(struct seccomp_filter *filter)
{
/* Reference count is bounded by the number of total processes. */
refcount_inc(&filter->usage);
}
/* get_seccomp_filter - increments the reference count of the filter on @tsk */ /* get_seccomp_filter - increments the reference count of the filter on @tsk */
void get_seccomp_filter(struct task_struct *tsk) void get_seccomp_filter(struct task_struct *tsk)
{ {
struct seccomp_filter *orig = tsk->seccomp.filter; struct seccomp_filter *orig = tsk->seccomp.filter;
if (!orig) if (!orig)
return; return;
/* Reference count is bounded by the number of total processes. */ __get_seccomp_filter(orig);
refcount_inc(&orig->usage);
} }
static inline void seccomp_filter_free(struct seccomp_filter *filter) static inline void seccomp_filter_free(struct seccomp_filter *filter)
@ -491,10 +496,8 @@ static inline void seccomp_filter_free(struct seccomp_filter *filter)
} }
} }
/* put_seccomp_filter - decrements the ref count of tsk->seccomp.filter */ static void __put_seccomp_filter(struct seccomp_filter *orig)
void put_seccomp_filter(struct task_struct *tsk)
{ {
struct seccomp_filter *orig = tsk->seccomp.filter;
/* Clean up single-reference branches iteratively. */ /* Clean up single-reference branches iteratively. */
while (orig && refcount_dec_and_test(&orig->usage)) { while (orig && refcount_dec_and_test(&orig->usage)) {
struct seccomp_filter *freeme = orig; struct seccomp_filter *freeme = orig;
@ -503,6 +506,12 @@ void put_seccomp_filter(struct task_struct *tsk)
} }
} }
/* put_seccomp_filter - decrements the ref count of tsk->seccomp.filter */
void put_seccomp_filter(struct task_struct *tsk)
{
__put_seccomp_filter(tsk->seccomp.filter);
}
static void seccomp_init_siginfo(siginfo_t *info, int syscall, int reason) static void seccomp_init_siginfo(siginfo_t *info, int syscall, int reason)
{ {
memset(info, 0, sizeof(*info)); memset(info, 0, sizeof(*info));
@ -1025,13 +1034,13 @@ long seccomp_get_filter(struct task_struct *task, unsigned long filter_off,
if (!data) if (!data)
goto out; goto out;
get_seccomp_filter(task); __get_seccomp_filter(filter);
spin_unlock_irq(&task->sighand->siglock); spin_unlock_irq(&task->sighand->siglock);
if (copy_to_user(data, fprog->filter, bpf_classic_proglen(fprog))) if (copy_to_user(data, fprog->filter, bpf_classic_proglen(fprog)))
ret = -EFAULT; ret = -EFAULT;
put_seccomp_filter(task); __put_seccomp_filter(filter);
return ret; return ret;
out: out: