Received: by 10.213.65.68 with SMTP id h4csp270962imn; Mon, 12 Mar 2018 13:18:00 -0700 (PDT) X-Google-Smtp-Source: AG47ELstNf9RzYGehWnxAnubfVHP2heV+i1zvFagXUxl80A33W/4eTaWa0fw+tN/waT2/95ypl7p X-Received: by 2002:a17:902:a70f:: with SMTP id w15-v6mr9394261plq.79.1520885880423; Mon, 12 Mar 2018 13:18:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1520885880; cv=none; d=google.com; s=arc-20160816; b=cbcWW+LMYCE89aKhix00E3XWJ5b2WfsqzZRXLeeygEvZSKJjmFI+nhF8nvnxrQoLjr QBJxg61qT/3XXU19dPQfUN+AL2oI+Do5AF3/8GdK4OIZFW78pv7WAjd8U30pTQyxrITq 5gs5HQJeqZphOmz/lO4bNcYEgbRo2ChViYqbfLQceHEeDtwk6UYu/jarsnmP4shpJKji eVW9grdj8PWqWoXmRCWDMN63lMVtx489ZuO7P8q7cnTMJFLGujIpQ5bHGlNACqXIA1nk ABuUF6f093u9QlIm/hIywLtw+oFqfZMLza9YcsyQypDp7qSxhgqp4tTNMoe6XrPzwXmc 3UyQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=iHqOQ7SHfy1EpJlKvMkhxm3g0Q/QnTmtH0Rqb2bYnQk=; b=XJNBfQpJyYDHZPXIC+5QGdMGWFYJmt/cDHU8k4XOIBtbnkV9hNECVSviM34IfRBjni 6asXcMP+egRsItw3Ltw42GiZ33eRUcRlEjc/f+5ZRktYuQYbD+YuSSm3uEHuy9Wxl2Vf ep9toSVHvs+P7uQzFbcafDVznfGrpfnY0jbpsaJ744QvCXHIivQfE0yq55NdfhZlwIwD c4IcWpa+gH/0uvNgqblWuk8RD79yUUxoqWshAUnJNTZxQCQMB5W2ymmUoCwN+QdqJfgS 0xuzl3Sayd5iJjM8EQv+OmJXrlXaPdYLSQ2uY2L57xWzbpnErW2QnVppr4v71gw8OaUh RaGw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i12si3644639pgq.43.2018.03.12.13.17.45; Mon, 12 Mar 2018 13:18:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932501AbeCLUQN (ORCPT + 99 others); Mon, 12 Mar 2018 16:16:13 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:58104 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932440AbeCLUQK (ORCPT ); Mon, 12 Mar 2018 16:16:10 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id F0175EB6E9; Mon, 12 Mar 2018 20:16:09 +0000 (UTC) Received: from llong.com (dhcp-17-75.bos.redhat.com [10.18.17.75]) by smtp.corp.redhat.com (Postfix) with ESMTP id B33BE1102E20; Mon, 12 Mar 2018 20:16:09 +0000 (UTC) From: Waiman Long To: "Luis R. Rodriguez" , Kees Cook Cc: linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, Andrew Morton , Al Viro , Matthew Wilcox , Waiman Long Subject: [PATCH v4 5/6] ipc: Clamp semmni to the real IPCMNI limit Date: Mon, 12 Mar 2018 16:15:43 -0400 Message-Id: <1520885744-1546-6-git-send-email-longman@redhat.com> In-Reply-To: <1520885744-1546-1-git-send-email-longman@redhat.com> References: <1520885744-1546-1-git-send-email-longman@redhat.com> X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Mon, 12 Mar 2018 20:16:10 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Mon, 12 Mar 2018 20:16:10 +0000 (UTC) for IP:'10.11.54.3' DOMAIN:'int-mx03.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'longman@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch clamps the semmni value (fourth element of sem_ctls[] array) to within the [0, IPCMNI] range and prints a warning message once when an out-of-range value is being written. Signed-off-by: Waiman Long --- ipc/ipc_sysctl.c | 13 ++++++++++++- ipc/sem.c | 28 ++++++++++++++++++++++++++++ ipc/util.h | 4 ++++ 3 files changed, 44 insertions(+), 1 deletion(-) diff --git a/ipc/ipc_sysctl.c b/ipc/ipc_sysctl.c index 1955dd4..49cbc43 100644 --- a/ipc/ipc_sysctl.c +++ b/ipc/ipc_sysctl.c @@ -88,12 +88,22 @@ static int proc_ipc_auto_msgmni(struct ctl_table *table, int write, return proc_dointvec_minmax(&ipc_table, write, buffer, lenp, ppos); } +static int proc_ipc_sem_dointvec(struct ctl_table *table, int write, + void __user *buffer, size_t *lenp, loff_t *ppos) +{ + int ret = proc_ipc_dointvec(table, write, buffer, lenp, ppos); + + sem_check_semmni(table, current->nsproxy->ipc_ns); + return ret; +} + #else #define proc_ipc_doulongvec_minmax NULL #define proc_ipc_dointvec NULL #define proc_ipc_dointvec_minmax NULL #define proc_ipc_dointvec_minmax_orphans NULL #define proc_ipc_auto_msgmni NULL +#define proc_ipc_sem_dointvec NULL #endif static int zero; @@ -177,7 +187,8 @@ static int proc_ipc_auto_msgmni(struct ctl_table *table, int write, .data = &init_ipc_ns.sem_ctls, .maxlen = 4*sizeof(int), .mode = 0644, - .proc_handler = proc_ipc_dointvec, + .proc_handler = proc_ipc_sem_dointvec, + .flags = CTL_FLAGS_CLAMP_RANGE, }, #ifdef CONFIG_CHECKPOINT_RESTORE { diff --git a/ipc/sem.c b/ipc/sem.c index a4af049..2b47bc3 100644 --- a/ipc/sem.c +++ b/ipc/sem.c @@ -2337,3 +2337,31 @@ static int sysvipc_sem_proc_show(struct seq_file *s, void *it) return 0; } #endif + +#ifdef CONFIG_PROC_SYSCTL +/* + * Check to see if semmni is out of range and clamp it if necessary. + */ +void sem_check_semmni(struct ctl_table *table, struct ipc_namespace *ns) +{ + bool clamped = false; + + if (!(table->flags & CTL_FLAGS_CLAMP_RANGE)) + return; + + /* + * Clamp semmni to the range [0, IPCMNI]. + */ + if (ns->sc_semmni < 0) { + ns->sc_semmni = 0; + clamped = true; + } + if (ns->sc_semmni > IPCMNI) { + ns->sc_semmni = IPCMNI; + clamped = true; + } + if (clamped) + pr_warn_once("sysctl: \"sem[3]\" was set out of range [%d, %d], clamped to %d.\n", + 0, IPCMNI, ns->sc_semmni); +} +#endif diff --git a/ipc/util.h b/ipc/util.h index 89b8ec1..af57394 100644 --- a/ipc/util.h +++ b/ipc/util.h @@ -206,6 +206,10 @@ int ipcget(struct ipc_namespace *ns, struct ipc_ids *ids, void free_ipcs(struct ipc_namespace *ns, struct ipc_ids *ids, void (*free)(struct ipc_namespace *, struct kern_ipc_perm *)); +#ifdef CONFIG_PROC_SYSCTL +extern void sem_check_semmni(struct ctl_table *table, struct ipc_namespace *ns); +#endif + #ifdef CONFIG_COMPAT #include struct compat_ipc_perm { -- 1.8.3.1