From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751314AbeBUUEG (ORCPT ); Wed, 21 Feb 2018 15:04:06 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:59674 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750805AbeBUUEF (ORCPT ); Wed, 21 Feb 2018 15:04:05 -0500 Date: Wed, 21 Feb 2018 12:04:03 -0800 From: Andrew Morton To: Alexey Dobriyan Cc: linux-kernel@vger.kernel.org, avagin@virtuozzo.com, viro@zeniv.linux.org.uk Subject: Re: [PATCH v2] proc: fix /proc/*/map_files lookup some more Message-Id: <20180221120403.504b7f1c814618bac39bb78b@linux-foundation.org> In-Reply-To: <20180221195340.GA28911@avx2> References: <20180221184411.GA25924@avx2> <20180221185143.GJ30522@ZenIV.linux.org.uk> <20180221195340.GA28911@avx2> X-Mailer: Sylpheed 3.6.0 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 21 Feb 2018 22:53:40 +0300 Alexey Dobriyan wrote: > I totally forgot that _parse_integer() accepts arbitrary amount of > leading zeroes leading to the following: > > OK > # readlink /proc/1/map_files/56427ecba000-56427eddc000 > /lib/systemd/systemd > > bogus > # readlink /proc/1/map_files/00000000000056427ecba000-56427eddc000 > /lib/systemd/systemd > # readlink /proc/1/map_files/56427ecba000-00000000000056427eddc000 > /lib/systemd/systemd > > ... > > --- a/fs/proc/base.c > +++ b/fs/proc/base.c > @@ -1916,6 +1916,8 @@ static int dname_to_vma_addr(struct dentry *dentry, > unsigned long long sval, eval; > unsigned int len; > > + if (str[0] == '0' && str[1]) > + return -EINVAL; > len = _parse_integer(str, 16, &sval); > if (len & KSTRTOX_OVERFLOW) > return -EINVAL; > @@ -1927,6 +1929,8 @@ static int dname_to_vma_addr(struct dentry *dentry, > return -EINVAL; > str++; > > + if (str[0] == '0' && str[1]) > + return -EINVAL; > len = _parse_integer(str, 16, &eval); > if (len & KSTRTOX_OVERFLOW) > return -EINVAL; I don't know this code and I'm all confused. - why is the code designed to accept addresses of "0"? - how do we know that the first digit of a VMA address will never be 0?