Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp4776651yba; Tue, 30 Apr 2019 04:19:03 -0700 (PDT) X-Google-Smtp-Source: APXvYqwDRzemanHsQxNYmjwV9DxQxlHr3vfOeYLyfwpHvA12XZSG4Bgz/AwQaDDdqjRBg0caNdD5 X-Received: by 2002:a17:902:aa96:: with SMTP id d22mr28653359plr.259.1556623143529; Tue, 30 Apr 2019 04:19:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556623143; cv=none; d=google.com; s=arc-20160816; b=VNt9IaJB2xl8h7CUJJXJCKtv4gWppclApD4AHFeJyUKvalmdjxfzGVjs02s+Hz91PB CcVxn3d4+/YcD8V6J77wT0ux2pGzUUQjJkpE43t+oIrj+Cy4dsJICUE23fOVDXfDUy0C 6SoLEMUEagjrG4mJ+f5USwX0IvqXfe1AuxvKZxU03iUzVDCN/wlYu9Wr8uedh9RamxOd oekBz+Xieg1Xu10X5s6Jz+5O2O48YRmiokvWc3PqxqmllcL9Ja/ypjR8IGE9YATSkKqA ZO+iCB039rdjuOqbJk7TqBsVgcHzSHHat96wb8AqcY42uWP7P6V8YPU8Y0qnG50Z4qeY 9BJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition :content-transfer-encoding:mime-version:robot-unsubscribe:robot-id :git-commit-id:subject:to:references:in-reply-to:reply-to:cc :message-id:from:date:dkim-signature:dkim-filter; bh=XYgoeYjtRGBWmjtJBHBeUqBDcK5YVuAc6FWnDPx/HOQ=; b=mqENVLz20zffgtRJo3bEmjluiDMvH2Ib/woLbBc5XineOp8PjaXN3Hc//SwEGxLCoi f8F0Wl5Nq/cVPmFzykBWJPOv5CLkirlkd4Ap/eeqGVrycqwu2Xr6N9jHas8yeaBTjFij QbRVTHxydzSl/8PmElq8ChQSP8vBkAJfmYXMmfrSD/0AhZ+57ulgc5n6dCK6m/TtBUuB EyNf+bHPWNtXsu4ru4Jkzt91dnbYzPae50Bge4tM+C6CRL/NPRAajYmb9Zi8+7jUMUIE gTusv/UdeWViRFoikEwBpIoPb4B8bRtL2E2ORak1RWeq2peFu3lozPHGS7Kh/vFx+erW +hSA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@zytor.com header.s=2019041745 header.b="meG/Gu/l"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zytor.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u20si37029993pfh.211.2019.04.30.04.18.46; Tue, 30 Apr 2019 04:19:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@zytor.com header.s=2019041745 header.b="meG/Gu/l"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=zytor.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727693AbfD3LRP (ORCPT + 99 others); Tue, 30 Apr 2019 07:17:15 -0400 Received: from terminus.zytor.com ([198.137.202.136]:43595 "EHLO terminus.zytor.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727524AbfD3LRN (ORCPT ); Tue, 30 Apr 2019 07:17:13 -0400 Received: from terminus.zytor.com (localhost [127.0.0.1]) by terminus.zytor.com (8.15.2/8.15.2) with ESMTPS id x3UBFEt41346558 (version=TLSv1.3 cipher=TLS_AES_256_GCM_SHA384 bits=256 verify=NO); Tue, 30 Apr 2019 04:15:14 -0700 DKIM-Filter: OpenDKIM Filter v2.11.0 terminus.zytor.com x3UBFEt41346558 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=zytor.com; s=2019041745; t=1556622915; bh=XYgoeYjtRGBWmjtJBHBeUqBDcK5YVuAc6FWnDPx/HOQ=; h=Date:From:Cc:Reply-To:In-Reply-To:References:To:Subject:From; b=meG/Gu/lXrE/l4zwnMvymYjspiqwDdqz2joU3PT6uH4A2tbGM0Kp19RZ9sy1zpBPm RWPrXo6Au3IbIoO4hl8ZkDqsUp9VDf3DR/3MStW8/THufv3M1DVqZFKLtVaqy5wke3 CPmqpseDkBX28BMoP7DyYIMAoiQYnyS2L43sOdgJr5er8rfy+PmFG9ApKXUhvBTsTG ShgEpo3uKPxRdqP9PX7Rtzu9LtUM0eZbaYvUDe+c8gNUI3q7rALn8/oyGkr1aSVj99 TUNgfHxLtUymbYQQwr+RG2Ni+Xfsa+y3gdQ/AUFAPCiWAGMJIZV1QELrMOVwxXc9r3 /74FII+qqoScA== Received: (from tipbot@localhost) by terminus.zytor.com (8.15.2/8.15.2/Submit) id x3UBFDKG1346555; Tue, 30 Apr 2019 04:15:13 -0700 Date: Tue, 30 Apr 2019 04:15:13 -0700 X-Authentication-Warning: terminus.zytor.com: tipbot set sender to tipbot@zytor.com using -f From: tip-bot for Nadav Amit Message-ID: Cc: luto@kernel.org, namit@vmware.com, linux_dti@icloud.com, ard.biesheuvel@linaro.org, will.deacon@arm.com, jannh@google.com, riel@surriel.com, rick.p.edgecombe@intel.com, kernel-hardening@lists.openwall.com, torvalds@linux-foundation.org, linux-kernel@vger.kernel.org, daniel@iogearbox.net, deneen.t.dock@intel.com, tglx@linutronix.de, ast@kernel.org, akpm@linux-foundation.org, mingo@kernel.org, kristen@linux.intel.com, peterz@infradead.org, bp@alien8.de, hpa@zytor.com, dave.hansen@linux.intel.com Reply-To: deneen.t.dock@intel.com, tglx@linutronix.de, ast@kernel.org, mingo@kernel.org, akpm@linux-foundation.org, namit@vmware.com, luto@kernel.org, ard.biesheuvel@linaro.org, linux_dti@icloud.com, will.deacon@arm.com, jannh@google.com, riel@surriel.com, rick.p.edgecombe@intel.com, kernel-hardening@lists.openwall.com, torvalds@linux-foundation.org, linux-kernel@vger.kernel.org, daniel@iogearbox.net, bp@alien8.de, hpa@zytor.com, dave.hansen@linux.intel.com, kristen@linux.intel.com, peterz@infradead.org In-Reply-To: <20190426001143.4983-24-namit@vmware.com> References: <20190426001143.4983-24-namit@vmware.com> To: linux-tip-commits@vger.kernel.org Subject: [tip:x86/mm] bpf: Fail bpf_probe_write_user() while mm is switched Git-Commit-ID: c7b6f29b6257532792fc722b68fcc0e00b5a856c X-Mailer: tip-git-log-daemon Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=UTF-8 Content-Disposition: inline X-Spam-Status: No, score=-1.0 required=5.0 tests=ALL_TRUSTED,BAYES_00, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, FREEMAIL_FORGED_REPLYTO,T_DATE_IN_FUTURE_96_Q autolearn=no autolearn_force=no version=3.4.2 X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on terminus.zytor.com Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit-ID: c7b6f29b6257532792fc722b68fcc0e00b5a856c Gitweb: https://git.kernel.org/tip/c7b6f29b6257532792fc722b68fcc0e00b5a856c Author: Nadav Amit AuthorDate: Thu, 25 Apr 2019 17:11:43 -0700 Committer: Ingo Molnar CommitDate: Tue, 30 Apr 2019 12:37:48 +0200 bpf: Fail bpf_probe_write_user() while mm is switched When using a temporary mm, bpf_probe_write_user() should not be able to write to user memory, since user memory addresses may be used to map kernel memory. Detect these cases and fail bpf_probe_write_user() in such cases. Suggested-by: Jann Horn Reported-by: Jann Horn Signed-off-by: Nadav Amit Signed-off-by: Rick Edgecombe Signed-off-by: Peter Zijlstra (Intel) Cc: Cc: Cc: Cc: Cc: Cc: Cc: Cc: Alexei Starovoitov Cc: Andy Lutomirski Cc: Borislav Petkov Cc: Daniel Borkmann Cc: Dave Hansen Cc: H. Peter Anvin Cc: Linus Torvalds Cc: Rik van Riel Cc: Thomas Gleixner Link: https://lkml.kernel.org/r/20190426001143.4983-24-namit@vmware.com Signed-off-by: Ingo Molnar --- kernel/trace/bpf_trace.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c index d64c00afceb5..94b0e37d90ef 100644 --- a/kernel/trace/bpf_trace.c +++ b/kernel/trace/bpf_trace.c @@ -14,6 +14,8 @@ #include #include +#include + #include "trace_probe.h" #include "trace.h" @@ -163,6 +165,10 @@ BPF_CALL_3(bpf_probe_write_user, void *, unsafe_ptr, const void *, src, * access_ok() should prevent writing to non-user memory, but in * some situations (nommu, temporary switch, etc) access_ok() does * not provide enough validation, hence the check on KERNEL_DS. + * + * nmi_uaccess_okay() ensures the probe is not run in an interim + * state, when the task or mm are switched. This is specifically + * required to prevent the use of temporary mm. */ if (unlikely(in_interrupt() || @@ -170,6 +176,8 @@ BPF_CALL_3(bpf_probe_write_user, void *, unsafe_ptr, const void *, src, return -EPERM; if (unlikely(uaccess_kernel())) return -EPERM; + if (unlikely(!nmi_uaccess_okay())) + return -EPERM; if (!access_ok(unsafe_ptr, size)) return -EPERM;