lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4890E077.30507@gmail.com>
Date:	Wed, 30 Jul 2008 23:43:19 +0200
From:	Jiri Slaby <jirislaby@...il.com>
To:	Anders Johansson <ajohansson@...e.de>
CC:	linux-kernel@...r.kernel.org
Subject: Re: [PATCH] making /proc/<pid>/limits writable

On 07/30/2008 09:57 PM, Anders Johansson wrote:
> (For any replies, please cc. me, because I'm not subscribed)
> 
> Attached is a patch making the limits for a process writable, so it is 
> possible to change the limits of a task other than current.
> 
> There are many reasons why this is desirable. The core limit is to me the most 
> important. If a process hangs, because of some sort of race condition that 
> happens once in a blue moon, and ulimit -c is set to 0, it might take forever 
> to reproduce. It would be nice to be able to change that limit dynamically, to 
> be able to get a core dump.
> 
> Other limits should also be settable, but for now I've only done core size.
> 
> The patch is against 2.6.27-rc1
> 
> btw, in case it isn't painfully obvious: this is my very first kernel patch 
> that isn't a simple one-or-two-line bug fix


diff -ur a/fs/proc/base.c b/fs/proc/base.c
--- a/fs/proc/base.c	2008-07-30 21:44:44.000000000 +0200
+++ b/fs/proc/base.c	2008-07-30 21:53:07.000000000 +0200
@@ -423,6 +423,76 @@

  #endif

+static ssize_t pid_limits_write(struct file *file, const char __user *buf,
+				size_t count, loff_t *offs)
+{
+	int ret = 0;
+	struct task_struct *task;
+
+	if (!count)
+		goto out_no_task;

Mixing decls with code causes warnings.

+	char c;
+	char *s = buf, *tmp;

This is sparse unfriendly. Try to build with C=1. This must have generate a 
compiler warning too (about the const).

+	char buffer[256];
+	unsigned long softlim, hardlim;
+	char hardlim_set = 0;
+
+	task = get_proc_task(file->f_dentry->d_inode);
+	if (!task) {
+		ret = -ESRCH;
+		goto out_no_task;
+	}
+	if (get_user(c, s)) {
+		ret = -EFAULT;
+		goto out;
+	}
+	s += 2;
+	switch (c) {
+		case 'c': {

I think this indent is not scripts/checkpatch.pl compliant as suggested by some 
people already.

+			if (copy_from_user(buffer, s, 255)) {

Hmm, does this work? It should return unable-to-copy bytes which would mean to 
return 255-count-2. Some kind of min(count-2, 255U); is needed here, I think.

+				ret = -EFAULT;
+				goto out;
+			}
+			if (strncmp(buffer, "unlimited", 9) == 0)
+				softlim = RLIM_INFINITY;
+			else {
+				softlim = strict_strtoul(buffer, &tmp, 10);

This doesn't compile, I suppose? Anyway you need buffer[255] = '\0'; somewhere 
before this.

+				if (tmp == buffer) {
+					ret = -EFAULT;
+					goto out;
+				}
+				softlim *= 1024;
+			}
+			if ((tmp - buffer) < count) {

"Use of unitialized value" here? tmp & unlimited path.

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ