diff options
author | Kees Cook <keescook@chromium.org> | 2017-08-02 16:32:21 -0400 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2017-08-02 20:16:12 -0400 |
commit | ade9f91b32b964e83d294f4973d50083b08ef6fc (patch) | |
tree | bd40eaa291b03bb8a46188358cf9f4f74064de5c /ipc | |
parent | 89affbf5d9ebb15c6460596822e8857ea2f9e735 (diff) |
ipc: add missing container_of()s for randstruct
When building with the randstruct gcc plugin, the layout of the IPC
structs will be randomized, which requires any sub-structure accesses to
use container_of(). The proc display handlers were missing the needed
container_of()s since the iterator is passing in the top-level struct
kern_ipc_perm.
This would lead to crashes when running the "lsipc" program after the
system had IPC registered (e.g. after starting up Gnome):
general protection fault: 0000 [#1] PREEMPT SMP
...
RIP: 0010:shm_add_rss_swap.isra.1+0x13/0xa0
...
Call Trace:
sysvipc_shm_proc_show+0x5e/0x150
sysvipc_proc_show+0x1a/0x30
seq_read+0x2e9/0x3f0
...
Link: http://lkml.kernel.org/r/20170730205950.GA55841@beast
Fixes: 3859a271a003 ("randstruct: Mark various structs for randomization")
Signed-off-by: Kees Cook <keescook@chromium.org>
Reported-by: Dominik Brodowski <linux@dominikbrodowski.net>
Acked-by: Davidlohr Bueso <dave@stgolabs.net>
Acked-by: Manfred Spraul <manfred@colorfullife.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Diffstat (limited to 'ipc')
-rw-r--r-- | ipc/msg.c | 3 | ||||
-rw-r--r-- | ipc/sem.c | 3 | ||||
-rw-r--r-- | ipc/shm.c | 4 |
3 files changed, 7 insertions, 3 deletions
@@ -1034,7 +1034,8 @@ void msg_exit_ns(struct ipc_namespace *ns) | |||
1034 | static int sysvipc_msg_proc_show(struct seq_file *s, void *it) | 1034 | static int sysvipc_msg_proc_show(struct seq_file *s, void *it) |
1035 | { | 1035 | { |
1036 | struct user_namespace *user_ns = seq_user_ns(s); | 1036 | struct user_namespace *user_ns = seq_user_ns(s); |
1037 | struct msg_queue *msq = it; | 1037 | struct kern_ipc_perm *ipcp = it; |
1038 | struct msg_queue *msq = container_of(ipcp, struct msg_queue, q_perm); | ||
1038 | 1039 | ||
1039 | seq_printf(s, | 1040 | seq_printf(s, |
1040 | "%10d %10d %4o %10lu %10lu %5u %5u %5u %5u %5u %5u %10lu %10lu %10lu\n", | 1041 | "%10d %10d %4o %10lu %10lu %5u %5u %5u %5u %5u %5u %10lu %10lu %10lu\n", |
@@ -2179,7 +2179,8 @@ void exit_sem(struct task_struct *tsk) | |||
2179 | static int sysvipc_sem_proc_show(struct seq_file *s, void *it) | 2179 | static int sysvipc_sem_proc_show(struct seq_file *s, void *it) |
2180 | { | 2180 | { |
2181 | struct user_namespace *user_ns = seq_user_ns(s); | 2181 | struct user_namespace *user_ns = seq_user_ns(s); |
2182 | struct sem_array *sma = it; | 2182 | struct kern_ipc_perm *ipcp = it; |
2183 | struct sem_array *sma = container_of(ipcp, struct sem_array, sem_perm); | ||
2183 | time_t sem_otime; | 2184 | time_t sem_otime; |
2184 | 2185 | ||
2185 | /* | 2186 | /* |
@@ -1380,9 +1380,11 @@ SYSCALL_DEFINE1(shmdt, char __user *, shmaddr) | |||
1380 | static int sysvipc_shm_proc_show(struct seq_file *s, void *it) | 1380 | static int sysvipc_shm_proc_show(struct seq_file *s, void *it) |
1381 | { | 1381 | { |
1382 | struct user_namespace *user_ns = seq_user_ns(s); | 1382 | struct user_namespace *user_ns = seq_user_ns(s); |
1383 | struct shmid_kernel *shp = it; | 1383 | struct kern_ipc_perm *ipcp = it; |
1384 | struct shmid_kernel *shp; | ||
1384 | unsigned long rss = 0, swp = 0; | 1385 | unsigned long rss = 0, swp = 0; |
1385 | 1386 | ||
1387 | shp = container_of(ipcp, struct shmid_kernel, shm_perm); | ||
1386 | shm_add_rss_swap(shp, &rss, &swp); | 1388 | shm_add_rss_swap(shp, &rss, &swp); |
1387 | 1389 | ||
1388 | #if BITS_PER_LONG <= 32 | 1390 | #if BITS_PER_LONG <= 32 |