Received: by 10.192.165.148 with SMTP id m20csp4147363imm; Mon, 30 Apr 2018 12:39:06 -0700 (PDT) X-Google-Smtp-Source: AB8JxZrEW4azNZUkodB3VNCApw7E1Xk9DMmZtgnTf10ml80jtN38PtXeZh57fW8zhExY9kD6jGKd X-Received: by 2002:a17:902:9a48:: with SMTP id x8-v6mr9436488plv.244.1525117146063; Mon, 30 Apr 2018 12:39:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525117146; cv=none; d=google.com; s=arc-20160816; b=P22LJPMCL97InxF9kytOrEqt6nIpYsuIQytSmVAtLzjlrm4+tSODmpa44WThUnbRQz mPCuixDKwGwMHrMFOEWzNazxCAlyL8QgteKN4BF3fYerX6NXstcMXfN6DAp44mJLFUDY vnrFMvKCFWcJE4J3S4nl5BWL0qo19eFPEtztUQZpTpmNFaOyopn1rFtnrgiDYHa4zHiG HqocrlDCrAO6wbHEEaiIYqndM38o5H5UdEyVWdr3kVvLQhe3E+35E/+m8lmLyxAhxAYY 68yWfJrEnpVGIogeGRvzRo3bIDSXzc4BnWBJzqxo3dkiNzK1MA2kEG919JJwuUdTReZM vGXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from:dmarc-filter :arc-authentication-results; bh=6R9Og3qVgjfLzH/90ShcVVyLnox5KMBd0h/CUQZkl6Q=; b=X9oUIbvUw6eDBiR/EYN4TH/7IKwRMAAc95D3VFOYeR4d5ELmzFtw+NfVFtnV1rWZtM EFloW6REOEboPi2HgyPBFSLghgaOTe1zguWzd+r9csuCZB3nK+TyNAo4BiYjmGBoFfdt 5VX1SOTdobOa2/OrpshAJUxP4dHRoHhvHlNIc0RKuCX5howXsoberQZaqQ+dYNKHrdDL nr46EWdIzRNfxvAkumTN5qJ4YFgNwNmrsx2rnR96IVlgq80VxnIVKp/VXceKbNEW5mLG jdrWQ44uGecRvelp1q8Vidk0XMIXfYA9y/7iW8551mnsRowd+fSFBODCMlbEq7iiwp9E JCmw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g63si8113179pfd.93.2018.04.30.12.38.51; Mon, 30 Apr 2018 12:39:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756622AbeD3Til (ORCPT + 99 others); Mon, 30 Apr 2018 15:38:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:36528 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756368AbeD3T2h (ORCPT ); Mon, 30 Apr 2018 15:28:37 -0400 Received: from localhost (unknown [104.132.1.102]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BA07B22DC1; Mon, 30 Apr 2018 19:28:36 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org BA07B22DC1 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=linuxfoundation.org Authentication-Results: mail.kernel.org; spf=fail smtp.mailfrom=gregkh@linuxfoundation.org From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+40b7287c2dc987c48c81@syzkaller.appspotmail.com, Tetsuo Handa , Jiri Slaby , Dmitry Vyukov , Johannes Weiner , Alan Cox , Christoph Hellwig , Michal Hocko Subject: [PATCH 4.16 034/113] tty: Avoid possible error pointer dereference at tty_ldisc_restore(). Date: Mon, 30 Apr 2018 12:24:05 -0700 Message-Id: <20180430184016.495545202@linuxfoundation.org> X-Mailer: git-send-email 2.17.0 In-Reply-To: <20180430184015.043892819@linuxfoundation.org> References: <20180430184015.043892819@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.16-stable review patch. If anyone has any objections, please let me know. ------------------ From: Tetsuo Handa commit 598c2d41ff44889dd8eced4f117403e472158d85 upstream. syzbot is reporting crashes [1] triggered by memory allocation failure at tty_ldisc_get() from tty_ldisc_restore(). While syzbot stops at WARN_ON() due to panic_on_warn == true, panic_on_warn == false will after all trigger an OOPS by dereferencing old->ops->num if IS_ERR(old) == true. We can simplify tty_ldisc_restore() as three calls (old->ops->num, N_TTY, N_NULL) to tty_ldisc_failto() in addition to avoiding possible error pointer dereference. If someone reports kernel panic triggered by forcing all memory allocations for tty_ldisc_restore() to fail, we can consider adding __GFP_NOFAIL for tty_ldisc_restore() case. [1] https://syzkaller.appspot.com/bug?id=6ac359c61e71d22e06db7f8f88243feb11d927e7 Reported-by: syzbot+40b7287c2dc987c48c81@syzkaller.appspotmail.com Signed-off-by: Tetsuo Handa Cc: Greg Kroah-Hartman Cc: Jiri Slaby Cc: Dmitry Vyukov Cc: Johannes Weiner Cc: Alan Cox Cc: Christoph Hellwig Cc: Michal Hocko Cc: stable Signed-off-by: Greg Kroah-Hartman --- drivers/tty/tty_ldisc.c | 13 +++++-------- 1 file changed, 5 insertions(+), 8 deletions(-) --- a/drivers/tty/tty_ldisc.c +++ b/drivers/tty/tty_ldisc.c @@ -527,19 +527,16 @@ static int tty_ldisc_failto(struct tty_s static void tty_ldisc_restore(struct tty_struct *tty, struct tty_ldisc *old) { /* There is an outstanding reference here so this is safe */ - old = tty_ldisc_get(tty, old->ops->num); - WARN_ON(IS_ERR(old)); - tty->ldisc = old; - tty_set_termios_ldisc(tty, old->ops->num); - if (tty_ldisc_open(tty, old) < 0) { - tty_ldisc_put(old); + if (tty_ldisc_failto(tty, old->ops->num) < 0) { + const char *name = tty_name(tty); + + pr_warn("Falling back ldisc for %s.\n", name); /* The traditional behaviour is to fall back to N_TTY, we want to avoid falling back to N_NULL unless we have no choice to avoid the risk of breaking anything */ if (tty_ldisc_failto(tty, N_TTY) < 0 && tty_ldisc_failto(tty, N_NULL) < 0) - panic("Couldn't open N_NULL ldisc for %s.", - tty_name(tty)); + panic("Couldn't open N_NULL ldisc for %s.", name); } }