Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp3010635ybi; Mon, 17 Jun 2019 14:37:35 -0700 (PDT) X-Google-Smtp-Source: APXvYqzctXOPkXIFhrSCeVX+scJX0WyoAEI5ywX8VrbzPclZqP72e+OfBQjIRBzcJVomTGvSIJpb X-Received: by 2002:a17:902:324:: with SMTP id 33mr110193966pld.284.1560807455446; Mon, 17 Jun 2019 14:37:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560807455; cv=none; d=google.com; s=arc-20160816; b=07IShOO+MqHE7RRy7KeeAlSQ4fyY83JkEvNeXzBOBC0Huq+IXWZTqSKD8iaaVjfnuY cTOEIxjYuj+98FC9TPH0Oi0dFPFdzTyKdUGTkI7U3VfuB0JRaYykYSgdAdepSZu0K2qS m/ldtrVgXhEVfRfJFi477If7LiNjJovTB7p2pISx0sELvaEFEOzksSDyjkLct69MG9rf TWwY5ELtYC9p1ykewZMtE+e7FuV2cj0bvbsA7VcGFMUQMOwyqGmUxZIDA9CvqT+f+6pa TRxWJQ/8ftZfA5SHeBGykXevnG3ObHUpXkLgVnNmNMRiK9tt+5aN/EXvd1xTVmeu9BvD bEzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Xe6u1S2Pe1A/zCLSvGmDcTMruU3xHZjoxOhYexy/MxU=; b=vg26WAkghgFn5Z5bCENG8CKR7eA9M2gEI0VBEkv95muTnH21abRnofQ0QVrIn25drm aud7c4pEUM+JNCXJiltEXvZ939AbocGXhQQH3WGfyt85It7YTz8rbk6tEUvNI33XFI7w xuqQxtGpUvJap3A3JjSh87AHcwuH10h4oSM3zMiEV7V43R412lZwjKTSWfj+dVYoFqEA l2nFZJkBOsIvi1HoGoU4p1QG26qOdkGlsjRLKWOAyoT7yODRc2LjaAmYPDf2rIfOQ3vt K/Vqej8YS0/RkxY0O14U3sjZ/dr/PsEZ/Iu9Yqcg64fMZN4okzEdzBgezYubLTsuQzET ZH8Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=PiZh5Zb3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q9si6833746pfl.287.2019.06.17.14.37.20; Mon, 17 Jun 2019 14:37:35 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=PiZh5Zb3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729279AbfFQVVG (ORCPT + 99 others); Mon, 17 Jun 2019 17:21:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:45486 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729267AbfFQVVC (ORCPT ); Mon, 17 Jun 2019 17:21:02 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6C92F2089E; Mon, 17 Jun 2019 21:21:01 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1560806461; bh=H5s03YtNMgZZCgh2/o5/ZQ9c/DeSnUl0LjC1EaxMO9U=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=PiZh5Zb3xRpqlFb0TW9FL5u7oQJVPc/+7r2RJKS5vSClPS2VxAhgMVMBZsWJtmF8F LQY9s2ikw2w/hifxbxPSvpSfbUkvoFZKkgyiLLLqLCnZwvXv5p/Ky0BP0bVRSdyY/q NRe5io3i9KySkZRcyytkGY4OMKKllJccrW/uJjtk= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, syzbot+e4c8abb920efa77bace9@syzkaller.appspotmail.com, Takashi Iwai , Sasha Levin Subject: [PATCH 5.1 043/115] ALSA: seq: Protect in-kernel ioctl calls with mutex Date: Mon, 17 Jun 2019 23:09:03 +0200 Message-Id: <20190617210802.258998943@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190617210759.929316339@linuxfoundation.org> References: <20190617210759.929316339@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit feb689025fbb6f0aa6297d3ddf97de945ea4ad32 ] ALSA OSS sequencer calls the ioctl function indirectly via snd_seq_kernel_client_ctl(). While we already applied the protection against races between the normal ioctls and writes via the client's ioctl_mutex, this code path was left untouched. And this seems to be the cause of still remaining some rare UAF as spontaneously triggered by syzkaller. For the sake of robustness, wrap the ioctl_mutex also for the call via snd_seq_kernel_client_ctl(), too. Reported-by: syzbot+e4c8abb920efa77bace9@syzkaller.appspotmail.com Signed-off-by: Takashi Iwai Signed-off-by: Sasha Levin --- sound/core/seq/seq_clientmgr.c | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/sound/core/seq/seq_clientmgr.c b/sound/core/seq/seq_clientmgr.c index 38e7deab6384..b3280e81bfd1 100644 --- a/sound/core/seq/seq_clientmgr.c +++ b/sound/core/seq/seq_clientmgr.c @@ -2343,14 +2343,19 @@ int snd_seq_kernel_client_ctl(int clientid, unsigned int cmd, void *arg) { const struct ioctl_handler *handler; struct snd_seq_client *client; + int err; client = clientptr(clientid); if (client == NULL) return -ENXIO; for (handler = ioctl_handlers; handler->cmd > 0; ++handler) { - if (handler->cmd == cmd) - return handler->func(client, arg); + if (handler->cmd == cmd) { + mutex_lock(&client->ioctl_mutex); + err = handler->func(client, arg); + mutex_unlock(&client->ioctl_mutex); + return err; + } } pr_debug("ALSA: seq unknown ioctl() 0x%x (type='%c', number=0x%02x)\n", -- 2.20.1