Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp6033470ybe; Tue, 10 Sep 2019 12:28:15 -0700 (PDT) X-Google-Smtp-Source: APXvYqxk6pBdJ9z9LaNWAvLn7mI+K/ZdtkZ+ZRFzKFtlC7xRAmlXNZqTuRtI0ccFUc0XnR7tPPwt X-Received: by 2002:a17:906:d9d9:: with SMTP id qk25mr27272048ejb.275.1568143695696; Tue, 10 Sep 2019 12:28:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568143695; cv=none; d=google.com; s=arc-20160816; b=WU6vGbJ1MIWaRPQ74oTqJ09to4E5jVkIRfz9E5lf1ykPUExrSzXFEpSO6y0op4NUO3 joV4vi5z5OVx/wQe23hZZ4glKkFml2tbNQhdgsPMNeflolBgEt4uoIPlMHBeeyEm/Ykh rCZy/baAUjz1HK2Ja21LYyo/uTeVzFAvLVDzNIE5VNhwbITYClzq+DKSoK3TBbqH//QG BLCyql48RkaUVZmQcJHFOYpiC9nueJze4h2ZTFy49P9//by6EPG2ZEn8q+vSKiTz4DMm 4p99jYmmwDI9vr4UpUXKKmP3EbU5eKL3IOvoqn/mXydjILdXhrs22yHxGuIOJM6qKHuF TTTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:content-disposition :mime-version:message-id:subject:cc:to:from:date; bh=GNFTLjCDI8aOeTbWlu+UWJD8f4dkDUszlg2e8ICtO9Q=; b=ZX2MBSLinKeu5pciQDo1xKTYP2Lq+WKCyFbAJGF2AyzGDpsI16o4vRIeVB3JtlQ3NQ 4Z3SLy+SNu9cXC5KhAoAnePplLr+AC81LaOlLxFz97sjzCjqous3xtFXsNE04RgoM+KB IiLhjKB0/GXPzDBjQFif+/DCKf3PR4Z2MX0mY7rHQSx/FnsBLgCJkdoOd6Olwqgi7KUr vMDSmz1iQ57OlD4dMB4+GC7GfnKNFaShAismngroALTNwbD2XRCuLDM/S+hc7QC3rivC 3H+xJFRfxy3LWpyrAtLIiU04IlFPJagTn6Ox85YuMUjQhdPTLLwCBBGKcJFQLxCBUpp9 ZUfQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t25si9247572eju.221.2019.09.10.12.27.51; Tue, 10 Sep 2019 12:28:15 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728371AbfIJR7X (ORCPT + 99 others); Tue, 10 Sep 2019 13:59:23 -0400 Received: from mx1.redhat.com ([209.132.183.28]:48424 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726524AbfIJR7X (ORCPT ); Tue, 10 Sep 2019 13:59:23 -0400 Received: from smtp.corp.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id BE1CA10CC207; Tue, 10 Sep 2019 17:59:22 +0000 (UTC) Received: from asgard.redhat.com (ovpn-112-20.ams2.redhat.com [10.36.112.20]) by smtp.corp.redhat.com (Postfix) with ESMTPS id C640260BF7; Tue, 10 Sep 2019 17:59:17 +0000 (UTC) Date: Tue, 10 Sep 2019 18:58:52 +0100 From: Eugene Syromiatnikov To: linux-kernel@vger.kernel.org, Christian Brauner , Oleg Nesterov Cc: Andrew Morton , "Peter Zijlstra (Intel)" , Ingo Molnar , "Dmitry V. Levin" , Eric Biederman Subject: [PATCH v2] fork: check exit_signal passed in clone3() call Message-ID: <20190910175852.GA15572@asgard.redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.5.23 (2014-03-12) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.12 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.6.2 (mx1.redhat.com [10.5.110.65]); Tue, 10 Sep 2019 17:59:22 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Previously, higher 32 bits of exit_signal fields were lost when copied to the kernel args structure (that uses int as a type for the respective field). Moreover, as Oleg has noted[1], exit_signal is used unchecked, so it has to be checked for sanity before use; for the legacy syscalls, applying CSIGNAL mask guarantees that it is at least non-negative; however, there's no such thing is done in clone3() code path, and that can break at least thread_group_leader. Checking user-passed exit_signal against ~CSIGNAL mask solves both of these problems. [1] https://lkml.org/lkml/2019/9/10/467 * kernel/fork.c (copy_clone_args_from_user): Fail with -EINVAL if args.exit_signal has bits set outside CSIGNAL mask. (_do_fork): Note that exit_signal is expected to be checked for the sanity by the caller. Fixes: 7f192e3cd316 ("fork: add clone3") Reported-by: Oleg Nesterov Signed-off-by: Eugene Syromiatnikov --- kernel/fork.c | 12 ++++++++++++ 1 file changed, 12 insertions(+) diff --git a/kernel/fork.c b/kernel/fork.c index 2852d0e..9dee2ab 100644 --- a/kernel/fork.c +++ b/kernel/fork.c @@ -2338,6 +2338,8 @@ struct mm_struct *copy_init_mm(void) * * It copies the process, and if successful kick-starts * it and waits for it to finish using the VM if required. + * + * args->exit_signal is expected to be checked for sanity by the caller. */ long _do_fork(struct kernel_clone_args *args) { @@ -2562,6 +2564,16 @@ noinline static int copy_clone_args_from_user(struct kernel_clone_args *kargs, if (copy_from_user(&args, uargs, size)) return -EFAULT; + /* + * exit_signal is confined to CSIGNAL mask in legacy syscalls, + * so it is used unchecked deeper in syscall handling routines; + * moreover, copying to struct kernel_clone_args.exit_signals + * trims higher 32 bits, so it is has to be checked that they + * are zero. + */ + if (unlikely(args.exit_signal & ~((u64)CSIGNAL))) + return -EINVAL; + *kargs = (struct kernel_clone_args){ .flags = args.flags, .pidfd = u64_to_user_ptr(args.pidfd), -- 2.1.4