linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [2.4 patch] fix for memory corruption from /proc/kcore access
@ 2005-02-03  2:19 Ernie Petrides
  2005-02-03 15:16 ` Marcelo Tosatti
  0 siblings, 1 reply; 2+ messages in thread
From: Ernie Petrides @ 2005-02-03  2:19 UTC (permalink / raw)
  To: Marcelo Tosatti; +Cc: Ernie Petrides, linux-kernel

Hi, Marcelo.  A fairly nasty memory corruption potential exists when
/proc/kcore is accessed and there are at least 62 vmalloc'd areas.

The problem is that get_kcore_size() does not properly account for
the elf_prstatus, elf_prpsinfo, and task_struct structure sizes in
the fabricated ELF header, and then elf_kcore_store_hdr() and its
associated calls to storenote() will possibly overrun the "elf_buf"
buffer allocated by read_kcore().  Because the requested buffer size
is rounded up to a page multiple, only certain ranges of counts of
vmalloc'd areas will actually lead to a memory corruption.  When it
does happen, usually the end of the /proc/kcore reader's task_struct
ends up being copied into a slab page (or sometimes into a data page)
causing a kernel crash (or data corruption) at a later point in time.

The 1st hunk of the patch below fixes this problem.  The latter 3
hunks correct the "p_filesz" value for the note section (which is
already initialized to 0 on line 232) as stored in the ELF header,
but these hunks are not necessary to fix the corruption possiblity.

The fix is already in 2.6.

Cheers.  -ernie



--- linux-2.4.29/fs/proc/kcore.c.orig	2004-08-07 19:26:06.000000000 -0400
+++ linux-2.4.29/fs/proc/kcore.c	2005-02-02 19:52:50.000000000 -0500
@@ -136,7 +136,10 @@ static unsigned long get_kcore_size(int 
 	}
 	*elf_buflen =	sizeof(struct elfhdr) + 
 			(*num_vma + 2)*sizeof(struct elf_phdr) + 
-			3 * sizeof(struct memelfnote);
+			3 * (sizeof(struct elf_note) + 4) +
+			sizeof(struct elf_prstatus) +
+			sizeof(struct elf_prpsinfo) +
+			sizeof(struct task_struct);
 	*elf_buflen = PAGE_ALIGN(*elf_buflen);
 	return (size - PAGE_OFFSET + *elf_buflen);
 }
@@ -279,7 +282,7 @@ static void elf_kcore_store_hdr(char *bu
 
 	memset(&prstatus, 0, sizeof(struct elf_prstatus));
 
-	nhdr->p_filesz	= notesize(&notes[0]);
+	nhdr->p_filesz += notesize(&notes[0]);
 	bufp = storenote(&notes[0], bufp);
 
 	/* set up the process info */
@@ -296,7 +299,7 @@ static void elf_kcore_store_hdr(char *bu
 	strcpy(prpsinfo.pr_fname, "vmlinux");
 	strncpy(prpsinfo.pr_psargs, saved_command_line, ELF_PRARGSZ);
 
-	nhdr->p_filesz	= notesize(&notes[1]);
+	nhdr->p_filesz += notesize(&notes[1]);
 	bufp = storenote(&notes[1], bufp);
 
 	/* set up the task structure */
@@ -305,7 +308,7 @@ static void elf_kcore_store_hdr(char *bu
 	notes[2].datasz	= sizeof(struct task_struct);
 	notes[2].data	= current;
 
-	nhdr->p_filesz	= notesize(&notes[2]);
+	nhdr->p_filesz += notesize(&notes[2]);
 	bufp = storenote(&notes[2], bufp);
 
 } /* end elf_kcore_store_hdr() */

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [2.4 patch] fix for memory corruption from /proc/kcore access
  2005-02-03  2:19 [2.4 patch] fix for memory corruption from /proc/kcore access Ernie Petrides
@ 2005-02-03 15:16 ` Marcelo Tosatti
  0 siblings, 0 replies; 2+ messages in thread
From: Marcelo Tosatti @ 2005-02-03 15:16 UTC (permalink / raw)
  To: Ernie Petrides; +Cc: linux-kernel


Hi Ernie,

On Wed, Feb 02, 2005 at 09:19:54PM -0500, Ernie Petrides wrote:
> Hi, Marcelo.  A fairly nasty memory corruption potential exists when
> /proc/kcore is accessed and there are at least 62 vmalloc'd areas.
> 
> The problem is that get_kcore_size() does not properly account for
> the elf_prstatus, elf_prpsinfo, and task_struct structure sizes in
> the fabricated ELF header, and then elf_kcore_store_hdr() and its
> associated calls to storenote() will possibly overrun the "elf_buf"
> buffer allocated by read_kcore().  Because the requested buffer size
> is rounded up to a page multiple, only certain ranges of counts of
> vmalloc'd areas will actually lead to a memory corruption.  When it
> does happen, usually the end of the /proc/kcore reader's task_struct
> ends up being copied into a slab page (or sometimes into a data page)
> causing a kernel crash (or data corruption) at a later point in time.

Ouch.

> The 1st hunk of the patch below fixes this problem.  The latter 3
> hunks correct the "p_filesz" value for the note section (which is
> already initialized to 0 on line 232) as stored in the ELF header,
> but these hunks are not necessary to fix the corruption possiblity.

Looks OK to me. 

> The fix is already in 2.6.

Applied, cheers!

> 
> Cheers.  -ernie
> 
> 
> 
> --- linux-2.4.29/fs/proc/kcore.c.orig	2004-08-07 19:26:06.000000000 -0400
> +++ linux-2.4.29/fs/proc/kcore.c	2005-02-02 19:52:50.000000000 -0500
> @@ -136,7 +136,10 @@ static unsigned long get_kcore_size(int 
>  	}
>  	*elf_buflen =	sizeof(struct elfhdr) + 
>  			(*num_vma + 2)*sizeof(struct elf_phdr) + 
> -			3 * sizeof(struct memelfnote);
> +			3 * (sizeof(struct elf_note) + 4) +
> +			sizeof(struct elf_prstatus) +
> +			sizeof(struct elf_prpsinfo) +
> +			sizeof(struct task_struct);
>  	*elf_buflen = PAGE_ALIGN(*elf_buflen);
>  	return (size - PAGE_OFFSET + *elf_buflen);
>  }
> @@ -279,7 +282,7 @@ static void elf_kcore_store_hdr(char *bu
>  
>  	memset(&prstatus, 0, sizeof(struct elf_prstatus));
>  
> -	nhdr->p_filesz	= notesize(&notes[0]);
> +	nhdr->p_filesz += notesize(&notes[0]);
>  	bufp = storenote(&notes[0], bufp);
>  
>  	/* set up the process info */
> @@ -296,7 +299,7 @@ static void elf_kcore_store_hdr(char *bu
>  	strcpy(prpsinfo.pr_fname, "vmlinux");
>  	strncpy(prpsinfo.pr_psargs, saved_command_line, ELF_PRARGSZ);
>  
> -	nhdr->p_filesz	= notesize(&notes[1]);
> +	nhdr->p_filesz += notesize(&notes[1]);
>  	bufp = storenote(&notes[1], bufp);
>  
>  	/* set up the task structure */
> @@ -305,7 +308,7 @@ static void elf_kcore_store_hdr(char *bu
>  	notes[2].datasz	= sizeof(struct task_struct);
>  	notes[2].data	= current;
>  
> -	nhdr->p_filesz	= notesize(&notes[2]);
> +	nhdr->p_filesz += notesize(&notes[2]);
>  	bufp = storenote(&notes[2], bufp);
>  
>  } /* end elf_kcore_store_hdr() */

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2005-02-03 18:30 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2005-02-03  2:19 [2.4 patch] fix for memory corruption from /proc/kcore access Ernie Petrides
2005-02-03 15:16 ` Marcelo Tosatti

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).