[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1386324655.18074.75.camel@localhost.localdomain>
Date: Fri, 06 Dec 2013 11:10:55 +0100
From: Yann Droneaud <ydroneaud@...eya.com>
To: David Miller <davem@...emloft.net>
Cc: netdev@...r.kernel.org, linux-kernel@...r.kernel.org,
viro@...iv.linux.org.uk, Yann Droneaud <ydroneaud@...eya.com>
Subject: Re: [PATCH v2] net: handle error more gracefully in socketpair()
Hi,
Le jeudi 05 décembre 2013 à 19:43 -0500, David Miller a écrit :
> From: Yann Droneaud <ydroneaud@...eya.com>
> Date: Fri, 06 Dec 2013 00:15:31 +0100
>
> > AFAIK, using sys_close() seems to be the exception, and writing the file
> > descriptor before installing it is the more or less the norm.
>
> What other system call in the kernel writes a file descriptor's value
> into the address space of a user process before the file descriptor
> is actually usable?
>
Some carefully chosen examples:
- recvmsg() through
- netlink_recvmsg() / unix_dgram_recvmsg() / unix_stream_recvmsg()
- scm_recv()
- scm_detach_fds(), scm.c:280
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/net/core/scm.c?id=v3.13-rc2#n280
- scm_detach_fds_compat(), compat.c:296
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/net/compat.c?id=v3.13-rc2#n296
- pipe() / pipe2(), pipe.c:969, through
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/fs/pipe.c?id=v3.13-rc2#n969
- __do_pipe_flags, pipe.c:919
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/fs/pipe.c?id=v3.13-rc2#n919
> That's really terrible semantically.
In fact, it's better:
1) get_unused_fd_flags() mark a file descriptor as 'reserved',
so no other syscall would be able to allocate it.
At this point, even if another userspace thread guess the correct
file descriptor number, trying to use it will give it -EBADFD,
since the file descriptor is not tied to a file (see __close_fd(),
open.c:589 for example)
2) file descriptor is wrote in userspace memory, using
put_user()/copy_to_user().
At this point, the userspace (another thread) could potentially
read the memory location and use the file descriptor, but here
again, it will give -EBADFD for the very same reason.
3) fd_install() link the file descriptor to the file.
Now, the userspace (another thread) could read the memory location
and use the file descriptor even if the syscall which create it
haven't return to the userspace caller yet.
If we arrange to put the call to fd_install() in the very last step
of the syscall, the window where the file descriptor is usable by
userspace but not yet validly returned to userspace is very tiny.
In the other hand, when writing the file descriptor in the last step,
eg. doing 1), 3) and 2), it makes possible for userspace to guess and
manipulate the file descriptor while the syscall is not near completion,
eg. kernel could have some things to do on the file, device, socket, ...
before returning to userspace.
In such case, bad things might happen if another userspace thread is
trying to play a bad game with the file descriptor.
BTW I'm not aware of any security implication of this issue, but I think
it's better (safer) to have fd_install() being the very last step of a
syscall. It should be the default good habit when dealing with file
descriptor creation.
Regards.
--
Yann Droneaud
OPTEYA
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists