[PATCH printk v3 6/6] printk: syslog: close window between wait and read

From: John Ogness
Date: Thu Jun 24 2021 - 07:12:09 EST


Syslog's SYSLOG_ACTION_READ is supposed to block until the next
syslog record can be read, and then it should read that record.
However, because @syslog_lock is not held between waking up and
reading the record, another reader could read the record first,
thus causing SYSLOG_ACTION_READ to return with a value of 0, never
having read _anything_.

By holding @syslog_lock between waking up and reading, it can be
guaranteed that SYSLOG_ACTION_READ blocks until it successfully
reads a syslog record (or a real error occurs).

Signed-off-by: John Ogness <john.ogness@xxxxxxxxxxxxx>
---
kernel/printk/printk.c | 50 +++++++++++++++++++++++++++++++-----------
1 file changed, 37 insertions(+), 13 deletions(-)

diff --git a/kernel/printk/printk.c b/kernel/printk/printk.c
index 90954cb5a0ab..4737804d6c6d 100644
--- a/kernel/printk/printk.c
+++ b/kernel/printk/printk.c
@@ -1486,6 +1486,7 @@ static int syslog_print(char __user *buf, int size)
struct printk_record r;
char *text;
int len = 0;
+ u64 seq;

text = kmalloc(CONSOLE_LOG_MAX, GFP_KERNEL);
if (!text)
@@ -1493,11 +1494,38 @@ static int syslog_print(char __user *buf, int size)

prb_rec_init_rd(&r, &info, text, CONSOLE_LOG_MAX);

- while (size > 0) {
+ /* Get a consistent copy of @syslog_seq. */
+ mutex_lock(&syslog_lock);
+ seq = syslog_seq;
+ mutex_unlock(&syslog_lock);
+
+ /* Wait for the @syslog_seq record to be available. */
+ for (;;) {
+ len = wait_event_interruptible(log_wait, prb_read_valid(prb, seq, NULL));
+ if (len)
+ goto out;
+
+ /*
+ * @syslog_seq may have changed while waiting. If so, wait
+ * for the new @syslog_seq record.
+ */
+
+ mutex_lock(&syslog_lock);
+ if (syslog_seq == seq)
+ break;
+ seq = syslog_seq;
+ mutex_unlock(&syslog_lock);
+ }
+
+ /*
+ * @syslog_lock is held when entering the read loop to prevent
+ * another reader from modifying @syslog_seq.
+ */
+
+ for (;;) {
size_t n;
size_t skip;

- mutex_lock(&syslog_lock);
if (!prb_read_valid(prb, syslog_seq, &r)) {
mutex_unlock(&syslog_lock);
break;
@@ -1542,8 +1570,13 @@ static int syslog_print(char __user *buf, int size)
len += n;
size -= n;
buf += n;
- }

+ if (!size)
+ break;
+
+ mutex_lock(&syslog_lock);
+ }
+out:
kfree(text);
return len;
}
@@ -1614,7 +1647,6 @@ int do_syslog(int type, char __user *buf, int len, int source)
bool clear = false;
static int saved_console_loglevel = LOGLEVEL_DEFAULT;
int error;
- u64 seq;

error = check_syslog_permissions(type, source);
if (error)
@@ -1632,15 +1664,6 @@ int do_syslog(int type, char __user *buf, int len, int source)
return 0;
if (!access_ok(buf, len))
return -EFAULT;
-
- /* Get a consistent copy of @syslog_seq. */
- mutex_lock(&syslog_lock);
- seq = syslog_seq;
- mutex_unlock(&syslog_lock);
-
- error = wait_event_interruptible(log_wait, prb_read_valid(prb, seq, NULL));
- if (error)
- return error;
error = syslog_print(buf, len);
break;
/* Read/clear last kernel messages */
@@ -1707,6 +1730,7 @@ int do_syslog(int type, char __user *buf, int len, int source)
} else {
bool time = syslog_partial ? syslog_time : printk_time;
unsigned int line_count;
+ u64 seq;

prb_for_each_info(syslog_seq, prb, seq, &info,
&line_count) {
--
2.20.1