Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934130AbdDSMvh (ORCPT ); Wed, 19 Apr 2017 08:51:37 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:58398 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1763314AbdDSMva (ORCPT ); Wed, 19 Apr 2017 08:51:30 -0400 From: "Naveen N. Rao" To: Michael Ellerman , Ingo Molnar Cc: Ananth N Mavinakayanahalli , Masami Hiramatsu , linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org Subject: [PATCH v3 3/7] kprobes: validate the symbol name length Date: Wed, 19 Apr 2017 18:21:02 +0530 X-Mailer: git-send-email 2.12.1 In-Reply-To: References: In-Reply-To: References: X-TM-AS-MML: disable x-cbid: 17041912-0012-0000-0000-000003E55503 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17041912-0013-0000-0000-00001B6C0F8B Message-Id: <6e14d22994530fb5200c74d1593e73541d3b8028.1492604782.git.naveen.n.rao@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2017-04-19_10:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 spamscore=0 suspectscore=0 malwarescore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1703280000 definitions=main-1704190113 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2508 Lines: 83 When a kprobe is being registered, we use the symbol_name field to lookup the address where the probe should be placed. Since this is a user-provided field, let's ensure that the length of the string is within expected limits. Signed-off-by: Naveen N. Rao --- include/linux/kprobes.h | 1 + kernel/kprobes.c | 24 ++++++++++++++++++++++++ kernel/trace/trace_kprobe.c | 4 ++++ 3 files changed, 29 insertions(+) diff --git a/include/linux/kprobes.h b/include/linux/kprobes.h index 1f82a3db00b1..4ee10fef5135 100644 --- a/include/linux/kprobes.h +++ b/include/linux/kprobes.h @@ -405,6 +405,7 @@ int disable_kprobe(struct kprobe *kp); int enable_kprobe(struct kprobe *kp); void dump_kprobe(struct kprobe *kp); +bool is_valid_kprobe_symbol_name(const char *name); #else /* !CONFIG_KPROBES: */ diff --git a/kernel/kprobes.c b/kernel/kprobes.c index 6a128f3a7ed1..bb86681c8a10 100644 --- a/kernel/kprobes.c +++ b/kernel/kprobes.c @@ -1382,6 +1382,28 @@ bool within_kprobe_blacklist(unsigned long addr) return false; } +bool is_valid_kprobe_symbol_name(const char *name) +{ + size_t sym_len; + char *s; + + s = strchr(name, ':'); + if (s) { + sym_len = strnlen(s+1, KSYM_NAME_LEN); + if (sym_len <= 0 || sym_len >= KSYM_NAME_LEN) + return false; + sym_len = (size_t)(s - name); + if (sym_len <= 0 || sym_len >= MODULE_NAME_LEN) + return false; + } else { + sym_len = strnlen(name, MODULE_NAME_LEN); + if (sym_len <= 0 || sym_len >= MODULE_NAME_LEN) + return false; + } + + return true; +} + /* * If we have a symbol_name argument, look it up and add the offset field * to it. This way, we can specify a relative address to a symbol. @@ -1397,6 +1419,8 @@ static kprobe_opcode_t *kprobe_addr(struct kprobe *p) goto invalid; if (p->symbol_name) { + if (!is_valid_kprobe_symbol_name(p->symbol_name)) + return ERR_PTR(-EINVAL); addr = kprobe_lookup_name(p->symbol_name, p->offset); if (!addr) return ERR_PTR(-ENOENT); diff --git a/kernel/trace/trace_kprobe.c b/kernel/trace/trace_kprobe.c index 5f688cc724f0..bf73e5f31128 100644 --- a/kernel/trace/trace_kprobe.c +++ b/kernel/trace/trace_kprobe.c @@ -704,6 +704,10 @@ static int create_trace_kprobe(int argc, char **argv) pr_info("Return probe must be used without offset.\n"); return -EINVAL; } + if (!is_valid_kprobe_symbol_name(symbol)) { + pr_info("Symbol name is too long.\n"); + return -EINVAL; + } } argc -= 2; argv += 2; -- 2.12.1