Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1759800AbYFEDFp (ORCPT ); Wed, 4 Jun 2008 23:05:45 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1750769AbYFEDFf (ORCPT ); Wed, 4 Jun 2008 23:05:35 -0400 Received: from mx1.redhat.com ([66.187.233.31]:47542 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750751AbYFEDFf (ORCPT ); Wed, 4 Jun 2008 23:05:35 -0400 Subject: Re: BUG: unable to handle kernel NULL pointer dereference (drm_getunique) From: Dave Airlie To: Johannes Weiner Cc: Sitsofe Wheeler , linux-kernel@vger.kernel.org In-Reply-To: <87wsl4aaft.fsf@saeurebad.de> References: <87y75kaeg7.fsf@saeurebad.de> <87wsl4aaft.fsf@saeurebad.de> Content-Type: text/plain Date: Thu, 05 Jun 2008 13:05:29 +1000 Message-Id: <1212635129.24094.11.camel@clockmaker.usersys.redhat.com> Mime-Version: 1.0 X-Mailer: Evolution 2.22.1 (2.22.1-2.fc9) Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 7013 Lines: 162 On Thu, 2008-06-05 at 04:21 +0200, Johannes Weiner wrote: > Hi, > > Johannes Weiner writes: > > > Hi, > > > > Sitsofe Wheeler writes: > > > >> While flipping back and forth between the vts/Xorg and doing iperf test > >> over the wifi connection the following error appeared in next-20080604. > >> > >> [ 4305.767435] BUG: unable to handle kernel NULL pointer dereference at 00000000 > >> [ 4305.767452] IP: [] drm_getunique+0xc/0x30 > >> [ 4305.767466] *pde = 00000000 > >> [ 4305.767474] Oops: 0000 [#1] SMP DEBUG_PAGEALLOC > >> [ 4305.767483] last sysfs file: /sys/devices/system/cpu/cpu1/cache/index2/shared_cpu_map > >> [ 4305.767492] Modules linked in: > >> [ 4305.767498] > >> [ 4305.767503] Pid: 8373, comm: unix2_chkpwd Tainted: G W (2.6.26-rc4-next-20080604skw #177) > >> [ 4305.767513] EIP: 0060:[] EFLAGS: 00210246 CPU: 0 > >> [ 4305.767521] EIP is at drm_getunique+0xc/0x30 > >> [ 4305.767527] EAX: f7d8ea70 EBX: 00000000 ECX: 00000028 EDX: 00000000 > >> [ 4305.767535] ESI: f7d8ea70 EDI: 00005401 EBP: ed383f34 ESP: ed383f2c > >> [ 4305.767543] DS: 007b ES: 007b FS: 00d8 GS: 0033 SS: 0068 > >> [ 4305.767550] Process unix2_chkpwd (pid: 8373, ti=ed382000 task=f6efdee0 task.ti=ed382000) > >> [ 4305.767558] Stack: 00000000 c04940a4 ed383f58 c0250637 f1e03f50 f7d8ea70 f7d8eaf0 c02511c8 > >> [ 4305.767574] c04944c4 d603b200 bfda0500 ed383f74 c017ebba bfda0500 00005401 d603b200 > >> [ 4305.767589] d603b200 bfda0500 ed383f98 c017ee0a 00000001 ffffffea f1c0c100 ed383fb0 > >> [ 4305.767605] Call Trace: > >> [ 4305.767611] [] ? drm_ioctl+0x1b0/0x225 > >> [ 4305.767622] [] ? drm_getunique+0x0/0x30 > >> [ 4305.767632] [] ? vfs_ioctl+0x4e/0x67 > >> [ 4305.767643] [] ? do_vfs_ioctl+0x237/0x245 > >> [ 4305.767652] [] ? sys_ioctl+0x2c/0x48 > >> [ 4305.767661] [] ? sysenter_past_esp+0x6a/0xa5 > > > > Hm, in drm_getunique, dev is not NULL as it was already dereferenced in > > drm_ioctl. file_priv is not used at all. So only data is left. > > > > data is kdata in drm_ioctl and only NULL if the ioctl request is neither > > input nor output. > > > > I have not found a check on cmd in the callpath that would filter out > > malformed requests. So the user would be allowed to pass in a valid > > request number with wrong flags here, correct? > > > > Hannes > > > > --- > > drm: check ioctl direction before dispatching > > > > The userland might specify a valid ioctl request number with a wrong > > direction. Precheck the direction of the dispatcher function beforehand > > because we prepare arguments based on this parameter and the dispatched > > function relies on them being valid. > > > > Signed-off-by: Johannes Weiner > > CC: David Airlie > > --- > > > > Compile-time tested only! > > Make that run-time tested, also. This does not just affect linux-next. > The following program oopses my box running Linus' current git: > > #include > #include > #include > > #include > > #define DRM_DFILE "/dev/dri/card0" > #define DRM_IOCTL_CAPUT _IO(DRM_IOCTL_BASE, 0x01) > > int main(void) > { > int fd = open(DRM_DFILE, O_RDONLY); > > if (fd < 0) > return 1; > > ioctl(fd, DRM_IOCTL_CAPUT); > perror("ioctl"); > close(fd); > return 0; > } > > -> > > [ 714.581505] BUG: unable to handle kernel NULL pointer dereference at 00000000 > [ 714.583459] IP: [] drm_getunique+0x11/0x40 > [ 714.585460] *pde = 00000000 > [ 714.587389] Oops: 0000 [#1] PREEMPT > [ 714.588271] Modules linked in: snd_intel8x0 snd_ac97_codec ac97_bus snd_pcm snd_page_alloc > [ 714.588271] > [ 714.588271] Pid: 1339, comm: break-drm Not tainted (2.6.26-rc4-00232-gedeb280 #43) > [ 714.588271] EIP: 0060:[] EFLAGS: 00010282 CPU: 0 > [ 714.588271] EIP is at drm_getunique+0x11/0x40 > [ 714.588271] EAX: cf861000 EBX: 00000000 ECX: 00000000 EDX: 00000000 > [ 714.588271] ESI: cf861000 EDI: cfa87700 EBP: 00000000 ESP: cecc3f20 > [ 714.588271] DS: 007b ES: 007b FS: 0000 GS: 0033 SS: 0068 > [ 714.588271] Process break-drm (pid: 1339, ti=cecc2000 task=cf9a6dc0 task.ti=cecc2000) > [ 714.588271] Stack: c027d480 cf861000 c027c592 ced53b7c b7fc00d0 c0159f3b ced53b7c 000000ce > [ 714.588271] 00000000 00000000 00006401 00000000 cf861024 c04730a0 ced33700 bf965788 > [ 714.588271] 00006401 c017aea8 bf965788 ced33700 ced33700 00000003 cecc2000 c017b0fb > [ 714.588271] Call Trace: > [ 714.588271] [] drm_getunique+0x0/0x40 > [ 714.588271] [] drm_ioctl+0x1a2/0x2e0 > [ 714.588271] [] handle_mm_fault+0xeb/0x5e0 > [ 714.588271] [] vfs_ioctl+0x78/0x90 > [ 714.588271] [] do_vfs_ioctl+0x23b/0x2c0 > [ 714.588271] [] do_sys_open+0xba/0xe0 > [ 714.588271] [] sys_ioctl+0x3d/0x70 > [ 714.588271] [] syscall_call+0x7/0xb > [ 714.588271] ======================= > [ 714.588271] Code: 8b 04 24 e8 e2 1b 12 00 31 c0 5b 5b 5e 5f 5d c3 8d 76 00 8d bc 27 00 00 00 00 83 ec 08 89 1c 24 89 d3 89 74 24 04 89 c6 8b 48 04 <39> 0a 73 11 89 0b 31 d2 8b 1c 24 89 d0 8b 74 24 04 83 c4 08 c3 > [ 714.588271] EIP: [] drm_getunique+0x11/0x40 SS:ESP 0068:cecc3f20 > [ 714.659745] ---[ end trace fd8339ca8c62cb63 ]--- > [ 714.663840] [drm:drm_release] *ERROR* Device busy: 1 0 > > My patch fixes this, but here is a better one that checks the whole cmd > against the allowed one. Otherwise, it would be possible to trap the > kernel into allocating 2^15-1 bytes through kmalloc, too, at least on > this configuration here with _IOC_SIZEBITS == 14. > > --- > drm: sanity-check ioctl request > > drm_ioctl looks up a dispatcher function for special ioctls but it does > not precheck the commands against the registered ones, allowing users to > pass bogus values and potentially oops the kernel, as happened to > Sitsofe Wheeler who reported this bug. > > This patch checks the incoming ioctl command against the defined ones > before dispatching to the handler. > This patch will break some other parts of the DRM interface, I'll try and come up with one that is less likely do stop all the drivers working. The problem is there are binaries out there with bad userspace ioctl bits.. What I'll change it to do is at least allocate the size from the kernel definition not what the user passed in. The big problem we have with malformed requests is that userspace asks for one thing and expects another, so I should key the userspace from the ioctl nr and use the kernel side definitions to decide the other bits. Clearly the drm code isn't doing that now. Thanks, Dave. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/