lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20110621133205.32304.82464.stgit@warthog.procyon.org.uk>
Date:	Tue, 21 Jun 2011 14:32:05 +0100
From:	David Howells <dhowells@...hat.com>
To:	torvalds@...l.org, akpm@...ux-foundation.org
Cc:	keyrings@...ux-nfs.org, linux-security-module@...r.kernel.org,
	linux-kernel@...r.kernel.org, David Howells <dhowells@...hat.com>,
	Jeff Layton <jlayton@...hat.com>
Subject: [PATCH] KEYS: Fix error handling in construct_key_and_link()

Fix error handling in construct_key_and_link().  If construct_alloc_key()
returns an error, it shouldn't pass out through the normal path as the
key_serial() called by the kleave() statement will oops when it gets an error
code in the pointer:

BUG: unable to handle kernel paging request at ffffffffffffff84
IP: [<ffffffff8120b401>] request_key_and_link+0x4d7/0x52f
PGD 1a05067 PUD 1a06067 PMD 0
Oops: 0000 [#1] SMP
CPU 0
Modules linked in: cifs nls_utf8 fscache sunrpc ipx p8022 psnap llc p8023 rose ax25 joydev i2c_piix4 i2c_core virtio_balloon virtio_net virtio_blk [last unloaded: cifs]

Pid: 6888, comm: mount.cifs Not tainted 3.0-0.rc3.git5.1.fc16.x86_64 #1 Bochs Bochs
RIP: 0010:[<ffffffff8120b401>]  [<ffffffff8120b401>] request_key_and_link+0x4d7/0x52f
RSP: 0018:ffff8800314fd9d8  EFLAGS: 00010282
RAX: ffffffffffffff00 RBX: ffffffffffffff80 RCX: 000000000000000a
RDX: 0000000000000000 RSI: ffffffff81a59c90 RDI: ffff88003b2aa180
RBP: ffff8800314fda78 R08: 0000000000000002 R09: 0000000000000000
R10: 0000ffff00066c0a R11: 0000000000000001 R12: ffffffffa01017a0
R13: ffff88003b2aa180 R14: ffff880032525600 R15: ffffffff81a5a518
FS:  00007f8353a09740(0000) GS:ffff88003fa00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003b
CR2: ffffffffffffff84 CR3: 000000003b821000 CR4: 00000000000006f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
Process mount.cifs (pid: 6888, threadinfo ffff8800314fc000, task ffff88003aa9c7a0)
Stack:
 0000000000000000 0000000000000000 0000000000000000 ffffffff8125be28
 ffffffffa00ff5a7 0000000000000000 0000000000000000 ffffffff81a5a500
 ffffffffa00ff5dd ffff8800326f7d68 ffffff8000000000 0000000000000000
Call Trace:
 [<ffffffff8125be28>] ? vsnprintf+0x3c5/0x401
 [<ffffffff8120b52c>] request_key+0x41/0x75
 [<ffffffffa00ed6e8>] cifs_get_spnego_key+0x206/0x226 [cifs]
 [<ffffffffa00eb0c9>] CIFS_SessSetup+0x511/0x1234 [cifs]
 [<ffffffff81085bea>] ? trace_hardirqs_off+0xd/0xf
 [<ffffffffa00d9799>] cifs_setup_session+0x90/0x1ae [cifs]
 [<ffffffffa00d9c02>] cifs_get_smb_ses+0x34b/0x40f [cifs]
 [<ffffffffa00d9e05>] cifs_mount+0x13f/0x504 [cifs]
 [<ffffffff81261e71>] ? __raw_spin_lock_init+0x31/0x52
 [<ffffffffa00caabb>] cifs_do_mount+0xc4/0x672 [cifs]
 [<ffffffff810f08ea>] ? __free_pages+0x26/0x2f
 [<ffffffff810f093a>] ? free_pages+0x47/0x4c
 [<ffffffff81212829>] ? selinux_sb_copy_data+0x192/0x1ab
 [<ffffffff8113ae8c>] mount_fs+0x69/0x155
 [<ffffffff81104750>] ? __alloc_percpu+0x10/0x12
 [<ffffffff8114ff0e>] vfs_kern_mount+0x63/0xa0
 [<ffffffff81150be2>] do_kern_mount+0x4d/0xdf
 [<ffffffff81152278>] do_mount+0x63c/0x69f
 [<ffffffff8115255c>] sys_mount+0x88/0xc2
 [<ffffffff814fbdc2>] system_call_fastpath+0x16/0x1b

Signed-off-by: David Howells <dhowells@...hat.com>
Acked-by: Jeff Layton <jlayton@...hat.com>
---

 security/keys/request_key.c |    3 ++-
 1 files changed, 2 insertions(+), 1 deletions(-)

diff --git a/security/keys/request_key.c b/security/keys/request_key.c
index 8e319a4..8246532 100644
--- a/security/keys/request_key.c
+++ b/security/keys/request_key.c
@@ -469,7 +469,7 @@ static struct key *construct_key_and_link(struct key_type *type,
 	} else if (ret == -EINPROGRESS) {
 		ret = 0;
 	} else {
-		key = ERR_PTR(ret);
+		goto couldnt_alloc_key;
 	}
 
 	key_put(dest_keyring);
@@ -479,6 +479,7 @@ static struct key *construct_key_and_link(struct key_type *type,
 construction_failed:
 	key_negate_and_link(key, key_negative_timeout, NULL, NULL);
 	key_put(key);
+couldnt_alloc_key:
 	key_put(dest_keyring);
 	kleave(" = %d", ret);
 	return ERR_PTR(ret);

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ