Received: by 10.213.65.68 with SMTP id h4csp271978imn; Mon, 12 Mar 2018 13:19:53 -0700 (PDT) X-Google-Smtp-Source: AG47ELusb7iISet7nCFyy0F/s1rq6p8SwRHyXgNZHBOPjRHClpVrw/dZTSaUSZI13BL4FeSgHyuy X-Received: by 10.101.93.17 with SMTP id e17mr7759999pgr.239.1520885993487; Mon, 12 Mar 2018 13:19:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1520885993; cv=none; d=google.com; s=arc-20160816; b=c/iKIeFTmnP5v1VHiPoqJ3f85yEm666RGIOEX9CEZmHTIBk/ftLcLn9CtmdShtBjdk gcuEsQAGgBztttG9iSdfMonWzuFP4YVvMAYgnEt6KVDkH1jcAZruBPTcAhkc62dgP8+b 8Cn/uBoO44fqe+gHFwAW+BG0gg/bp+XRuqRXm+hPHjGmahSA7Qyh01FFaO/vX20NpVOd 252BL9zU9LZk8BrQ6Tqs0vwBgJG/JxoLlES6LqLmax318c2L9xkCJUhC4q823ZZE/llY tZQbUrKltuuyjr9mVQURSWfx/uui3b6CRHQlnyrm97YSX5IAXqmDHZBkEAqCy2Jlzq2F POjw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=yfUa8FuQ3C5vpv30CHHBclQJyJA5Nzt7hnKXVnAccb4=; b=fGfpyOTew+tb5pRGzNLSmVvuKXM1izy5QBfip6fySXml1Nbg3o7ieLb1jmykFZZ0FH zrYH4L+fSHSrs9CJqi3IvVT354CFW6rls6TedRQVt26cwhwhXBgB7h6Ge6KLC8PUIOYF B6WSzOcfXO70gpc4FZR6wQfr2sL7T6p18uGOl9fYUtgoclXtHhTLSqhUPBhrOt5sde06 la3W0hi4iehKfRRKqUomVKUryghXokJKhXShlcWW1lDELji7x5UOe15pcuN+fcgHfBL8 UTAJZxoTiupTAgJuV/tK287W4yix7z1VkZvcN2v7dODrKOkFEJMCBu1fTZjFfYBx3i5w Yk+Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c13-v6si6504113plo.537.2018.03.12.13.19.38; Mon, 12 Mar 2018 13:19:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932327AbeCLURv (ORCPT + 99 others); Mon, 12 Mar 2018 16:17:51 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:58092 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932222AbeCLUQJ (ORCPT ); Mon, 12 Mar 2018 16:16:09 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id D6CF0EAEA2; Mon, 12 Mar 2018 20:16:08 +0000 (UTC) Received: from llong.com (dhcp-17-75.bos.redhat.com [10.18.17.75]) by smtp.corp.redhat.com (Postfix) with ESMTP id 9E0381134CD3; Mon, 12 Mar 2018 20:16:08 +0000 (UTC) From: Waiman Long To: "Luis R. Rodriguez" , Kees Cook Cc: linux-kernel@vger.kernel.org, linux-fsdevel@vger.kernel.org, Andrew Morton , Al Viro , Matthew Wilcox , Waiman Long Subject: [PATCH v4 1/6] sysctl: Add flags to support min/max range clamping Date: Mon, 12 Mar 2018 16:15:39 -0400 Message-Id: <1520885744-1546-2-git-send-email-longman@redhat.com> In-Reply-To: <1520885744-1546-1-git-send-email-longman@redhat.com> References: <1520885744-1546-1-git-send-email-longman@redhat.com> X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Mon, 12 Mar 2018 20:16:08 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.1]); Mon, 12 Mar 2018 20:16:08 +0000 (UTC) for IP:'10.11.54.3' DOMAIN:'int-mx03.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'longman@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org When minimum/maximum values are specified for a sysctl parameter in the ctl_table structure with proc_dointvec_minmax() handler, update to that parameter will fail with error if the given value is outside of the required range. There are use cases where it may be better to clamp the value of the sysctl parameter to the given range without failing the update, especially if the users are not aware of the actual range limits. Reading the value back after the update will now be a good practice to see if the provided value exceeds the range limits. To provide this less restrictive form of range checking, a new flags field is added to the ctl_table structure. When the CTL_FLAGS_CLAMP_RANGE flag is set in the ctl_table entry, any update from the userspace will be clamped to the given range without error if either the proc_dointvec_minmax() or the proc_douintvec_minmax() handlers is used. Signed-off-by: Waiman Long --- include/linux/sysctl.h | 15 +++++++++++++++ kernel/sysctl.c | 48 +++++++++++++++++++++++++++++++++++++++--------- 2 files changed, 54 insertions(+), 9 deletions(-) diff --git a/include/linux/sysctl.h b/include/linux/sysctl.h index b769ecf..963e363 100644 --- a/include/linux/sysctl.h +++ b/include/linux/sysctl.h @@ -116,6 +116,7 @@ struct ctl_table void *data; int maxlen; umode_t mode; + unsigned int flags; struct ctl_table *child; /* Deprecated */ proc_handler *proc_handler; /* Callback for text formatting */ struct ctl_table_poll *poll; @@ -123,6 +124,20 @@ struct ctl_table void *extra2; } __randomize_layout; +/** + * enum ctl_table_flags - flags for the ctl table (struct ctl_table.flags) + * + * @CTL_FLAGS_CLAMP_RANGE: Set to indicate that the entry should be + * flexibly clamped to min/max range in case the user provided + * an incorrect value. + */ +enum ctl_table_flags { + CTL_FLAGS_CLAMP_RANGE = BIT(0), + __CTL_FLAGS_MAX = BIT(1), +}; + +#define CTL_TABLE_FLAGS_ALL (__CTL_FLAGS_MAX - 1) + struct ctl_node { struct rb_node node; struct ctl_table_header *header; diff --git a/kernel/sysctl.c b/kernel/sysctl.c index d2aa6b4..3d65f41 100644 --- a/kernel/sysctl.c +++ b/kernel/sysctl.c @@ -2504,6 +2504,7 @@ static int proc_dointvec_minmax_sysadmin(struct ctl_table *table, int write, * struct do_proc_dointvec_minmax_conv_param - proc_dointvec_minmax() range checking structure * @min: pointer to minimum allowable value * @max: pointer to maximum allowable value + * @flags: pointer to flags * * The do_proc_dointvec_minmax_conv_param structure provides the * minimum and maximum values for doing range checking for those sysctl @@ -2512,6 +2513,7 @@ static int proc_dointvec_minmax_sysadmin(struct ctl_table *table, int write, struct do_proc_dointvec_minmax_conv_param { int *min; int *max; + unsigned int *flags; }; static int do_proc_dointvec_minmax_conv(bool *negp, unsigned long *lvalp, @@ -2521,9 +2523,21 @@ static int do_proc_dointvec_minmax_conv(bool *negp, unsigned long *lvalp, struct do_proc_dointvec_minmax_conv_param *param = data; if (write) { int val = *negp ? -*lvalp : *lvalp; - if ((param->min && *param->min > val) || - (param->max && *param->max < val)) - return -EINVAL; + bool clamp = param->flags && + (*param->flags & CTL_FLAGS_CLAMP_RANGE); + + if (param->min && *param->min > val) { + if (clamp) + val = *param->min; + else + return -EINVAL; + } + if (param->max && *param->max < val) { + if (clamp) + val = *param->max; + else + return -EINVAL; + } *valp = val; } else { int val = *valp; @@ -2552,7 +2566,8 @@ static int do_proc_dointvec_minmax_conv(bool *negp, unsigned long *lvalp, * This routine will ensure the values are within the range specified by * table->extra1 (min) and table->extra2 (max). * - * Returns 0 on success or -EINVAL on write when the range check fails. + * Returns 0 on success or -EINVAL on write when the range check fails + * without the CTL_FLAGS_CLAMP_RANGE flag. */ int proc_dointvec_minmax(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) @@ -2560,6 +2575,7 @@ int proc_dointvec_minmax(struct ctl_table *table, int write, struct do_proc_dointvec_minmax_conv_param param = { .min = (int *) table->extra1, .max = (int *) table->extra2, + .flags = &table->flags, }; return do_proc_dointvec(table, write, buffer, lenp, ppos, do_proc_dointvec_minmax_conv, ¶m); @@ -2569,6 +2585,7 @@ int proc_dointvec_minmax(struct ctl_table *table, int write, * struct do_proc_douintvec_minmax_conv_param - proc_douintvec_minmax() range checking structure * @min: pointer to minimum allowable value * @max: pointer to maximum allowable value + * @flags: pointer to flags * * The do_proc_douintvec_minmax_conv_param structure provides the * minimum and maximum values for doing range checking for those sysctl @@ -2577,6 +2594,7 @@ int proc_dointvec_minmax(struct ctl_table *table, int write, struct do_proc_douintvec_minmax_conv_param { unsigned int *min; unsigned int *max; + unsigned int *flags; }; static int do_proc_douintvec_minmax_conv(unsigned long *lvalp, @@ -2587,14 +2605,24 @@ static int do_proc_douintvec_minmax_conv(unsigned long *lvalp, if (write) { unsigned int val = *lvalp; + bool clamp = param->flags && + (*param->flags & CTL_FLAGS_CLAMP_RANGE); if (*lvalp > UINT_MAX) return -EINVAL; - if ((param->min && *param->min > val) || - (param->max && *param->max < val)) - return -ERANGE; - + if (param->min && *param->min > val) { + if (clamp) + val = *param->min; + else + return -ERANGE; + } + if (param->max && *param->max < val) { + if (clamp) + val = *param->max; + else + return -ERANGE; + } *valp = val; } else { unsigned int val = *valp; @@ -2621,7 +2649,8 @@ static int do_proc_douintvec_minmax_conv(unsigned long *lvalp, * check for UINT_MAX to avoid having to support wrap around uses from * userspace. * - * Returns 0 on success or -ERANGE on write when the range check fails. + * Returns 0 on success or -ERANGE on write when the range check fails + * without the CTL_FLAGS_CLAMP_RANGE flag. */ int proc_douintvec_minmax(struct ctl_table *table, int write, void __user *buffer, size_t *lenp, loff_t *ppos) @@ -2629,6 +2658,7 @@ int proc_douintvec_minmax(struct ctl_table *table, int write, struct do_proc_douintvec_minmax_conv_param param = { .min = (unsigned int *) table->extra1, .max = (unsigned int *) table->extra2, + .flags = &table->flags, }; return do_proc_douintvec(table, write, buffer, lenp, ppos, do_proc_douintvec_minmax_conv, ¶m); -- 1.8.3.1