Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp5641405imu; Mon, 26 Nov 2018 03:24:16 -0800 (PST) X-Google-Smtp-Source: AFSGD/UVyru1oLdj3uxcAvZi19RmiPnCqT9AKWZvZH9AoCQbvYJ0+qeZ4If1rCUClZvqYwp4IUhX X-Received: by 2002:a63:741:: with SMTP id 62mr23831368pgh.352.1543231456372; Mon, 26 Nov 2018 03:24:16 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543231456; cv=none; d=google.com; s=arc-20160816; b=d6Tu0PA1T+YIeRH+rLDcPdb3Lr5khmZZ14m5lq9eVMwU/nwCoFZJzEhwgAGhwbvPdq EDl9zB/idZlb5LMPuqOUdGdy7Az5u1IKe8jUmo2426dzF9xnHfNDhu9PDrODuhpmM+ON tfsxwwqQP5SfpdZ/0CS9K++RvaYwywDdOxCK/2Gk0Y8c7c8ZxE5MUAl7iNEztvmhMVCZ RGqrgzsmEj1W5m+2uzUZvc+agLeqD6zLizTSp2SOneF8pawzMJ6o5VaeUFXEAnVcm7XN qr8/YIEEdnvDhy2be2jB1gOibow9SOLgw93gmTQQHUQjUzRTa08Tby3lM1k+1vdIigD3 SPDg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ylWYMd+kNZZgOuwbwdffEHQcBxFWPa0n07Y3bvH6a/w=; b=HzjctTxUcnn4Z6GaLCMfV3taq+I4aRUeEdnGJQ77atBbHqFk2U6/LhD8lX2O/AguEY GHzwP1LP5+hedjy8hpmLxDeaAWv9yTKjL7kz3uXXjSkolX88d4DD55suNLe1SEgplr3W MIZhKmPPcd+N26sqCnevoGhg/Vr98knzix8dbofcy/EDvRjkPaNyfp/bjHJszGhZaqAL 2aZdPnIBrNBAUhsz5iVNtyojtDgkKxg2Anapf0jmfDvUv/q5k4xB8/XmfbA9kWYmLspl N2Ky0G6Im3o/2Tia48YVmn/0M9+mEB9Q8647Wl69LynR0OYX/pei4XlCjUXTsvczikbz tcrw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YNdTxMG2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x5-v6si10954pfx.74.2018.11.26.03.24.00; Mon, 26 Nov 2018 03:24:16 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YNdTxMG2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728671AbeKZVuv (ORCPT + 99 others); Mon, 26 Nov 2018 16:50:51 -0500 Received: from mail.kernel.org ([198.145.29.99]:60142 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726176AbeKZVuv (ORCPT ); Mon, 26 Nov 2018 16:50:51 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DCDF92089F; Mon, 26 Nov 2018 10:57:05 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1543229826; bh=nfp57tl1S8Irp1jZHj5Le78Hq5WQqgujMx2ziPsfyrc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=YNdTxMG2FVE3Pi/2ydnnN9eq3NS7vhUBtyvmhe0Tso4PQdIIM8swN3dwN13mGNcYj uPDf5j+m6MHsNn2pGbvKOZiV7Nt0lk7BVqfvzdO6hPg9XNqOCvppACAXRUVIzZ8Kr6 62Jx9hfU+HXDXCSsQaSDAXKgl/5+wGAFTTmlKYXM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Taehee Yoo , Pablo Neira Ayuso , Sasha Levin Subject: [PATCH 4.9 17/46] netfilter: xt_IDLETIMER: add sysfs filename checking routine Date: Mon, 26 Nov 2018 11:51:06 +0100 Message-Id: <20181126105047.820918357@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181126105045.447291262@linuxfoundation.org> References: <20181126105045.447291262@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 54451f60c8fa061af9051a53be9786393947367c ] When IDLETIMER rule is added, sysfs file is created under /sys/class/xt_idletimer/timers/ But some label name shouldn't be used. ".", "..", "power", "uevent", "subsystem", etc... So that sysfs filename checking routine is needed. test commands: %iptables -I INPUT -j IDLETIMER --timeout 1 --label "power" splat looks like: [95765.423132] sysfs: cannot create duplicate filename '/devices/virtual/xt_idletimer/timers/power' [95765.433418] CPU: 0 PID: 8446 Comm: iptables Not tainted 4.19.0-rc6+ #20 [95765.449755] Call Trace: [95765.449755] dump_stack+0xc9/0x16b [95765.449755] ? show_regs_print_info+0x5/0x5 [95765.449755] sysfs_warn_dup+0x74/0x90 [95765.449755] sysfs_add_file_mode_ns+0x352/0x500 [95765.449755] sysfs_create_file_ns+0x179/0x270 [95765.449755] ? sysfs_add_file_mode_ns+0x500/0x500 [95765.449755] ? idletimer_tg_checkentry+0x3e5/0xb1b [xt_IDLETIMER] [95765.449755] ? rcu_read_lock_sched_held+0x114/0x130 [95765.449755] ? __kmalloc_track_caller+0x211/0x2b0 [95765.449755] ? memcpy+0x34/0x50 [95765.449755] idletimer_tg_checkentry+0x4e2/0xb1b [xt_IDLETIMER] [ ... ] Fixes: 0902b469bd25 ("netfilter: xtables: idletimer target implementation") Signed-off-by: Taehee Yoo Signed-off-by: Pablo Neira Ayuso Signed-off-by: Sasha Levin --- net/netfilter/xt_IDLETIMER.c | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) diff --git a/net/netfilter/xt_IDLETIMER.c b/net/netfilter/xt_IDLETIMER.c index bb5d6a058fb7..921c9bd7e1e7 100644 --- a/net/netfilter/xt_IDLETIMER.c +++ b/net/netfilter/xt_IDLETIMER.c @@ -116,6 +116,22 @@ static void idletimer_tg_expired(unsigned long data) schedule_work(&timer->work); } +static int idletimer_check_sysfs_name(const char *name, unsigned int size) +{ + int ret; + + ret = xt_check_proc_name(name, size); + if (ret < 0) + return ret; + + if (!strcmp(name, "power") || + !strcmp(name, "subsystem") || + !strcmp(name, "uevent")) + return -EINVAL; + + return 0; +} + static int idletimer_tg_create(struct idletimer_tg_info *info) { int ret; @@ -126,6 +142,10 @@ static int idletimer_tg_create(struct idletimer_tg_info *info) goto out; } + ret = idletimer_check_sysfs_name(info->label, sizeof(info->label)); + if (ret < 0) + goto out_free_timer; + sysfs_attr_init(&info->timer->attr.attr); info->timer->attr.attr.name = kstrdup(info->label, GFP_KERNEL); if (!info->timer->attr.attr.name) { -- 2.17.1