Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp1359869ybe; Wed, 11 Sep 2019 13:42:49 -0700 (PDT) X-Google-Smtp-Source: APXvYqzdnSkgVFhiz0wo/3RqcVsnZudvQLoxKHEtZ6pwk0/R9Gz7PawhmHQp3AlZ1rHZgtxjcRy6 X-Received: by 2002:a05:6402:17ae:: with SMTP id j14mr38169073edy.219.1568234569741; Wed, 11 Sep 2019 13:42:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568234569; cv=none; d=google.com; s=arc-20160816; b=qaJvQDWFlvFYLEBKEM/SYH5YXObCIKxh+3ypOc6OhlSqBGeAmUgn9v3pRtjwmSs2GT 0cRGVVTAlnflJZlz46yULWtzk37KcIIQii6Lp8QuqXlDNQnAqMk7f8gNaWqq0gjUOYil 50U56VL4fE8b/M/GZ4lHvDHODcV6gi/bHxC8+11f7Od2F8YeW0g/1/Bq8U5DPKOOs7t+ 7bRnQjtbUE+Xa0Kgqkl+3G0vTBLfat4bvTO+TrFr+M29JDDaD3sqTZeTQ78BLAQrsDyT p4FehSSEZUvthDUUe6C3AQrmg/GbcbVxBEJnus0NlmhOWWUbnOAT50VTxSRzhe43716p Y9Eg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=rezw7QHboi+gYleOESDIUcSAH1WNoKrnm2Mrzqo7930=; b=VzOQmqPXWsluNrnzw2pVURpOKavB9rFR3ieMI0vaILI/wrOCjvu3qc2tHukGVnH7/o yNZKHwnkS0QpklhoNC2rTHuLSbu73RU/ec4foxo6qi/wXmZanjBOVd1a2bQU3KQN19Q9 Dp9bbZu7PKnKDTR9DfQvMpxSEUwA+enG/181cUCug52MfafsyqebxdH2WzTPsfU1x47E HoD5ieDmfPXqDZ4mdOuftKCmTjPYT7/HFMH0AJSYrGOoPHND6ZkUcloK4Ei6o8OeqCzK d5CG0q+aQ/VQS4JbM0924Te97I6wrCH0mP4aCy9WFoh5KkGgtBfjm+Sqow0bmlIn07VW M5xw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id rv26si11788172ejb.354.2019.09.11.13.42.25; Wed, 11 Sep 2019 13:42:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729741AbfIKRqN (ORCPT + 99 others); Wed, 11 Sep 2019 13:46:13 -0400 Received: from mx1.redhat.com ([209.132.183.28]:56044 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729349AbfIKRqN (ORCPT ); Wed, 11 Sep 2019 13:46:13 -0400 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.phx2.redhat.com [10.5.11.15]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id DC0AA2A09B2; Wed, 11 Sep 2019 17:46:12 +0000 (UTC) Received: from asgard.redhat.com (ovpn-112-27.ams2.redhat.com [10.36.112.27]) by smtp.corp.redhat.com (Postfix) with ESMTPS id B484A5D6A5; Wed, 11 Sep 2019 17:46:05 +0000 (UTC) Date: Wed, 11 Sep 2019 18:45:40 +0100 From: Eugene Syromiatnikov To: linux-kernel@vger.kernel.org, Christian Brauner , Oleg Nesterov Cc: Andrew Morton , "Peter Zijlstra (Intel)" , Ingo Molnar , "Dmitry V. Levin" , Eric Biederman Subject: [PATCH v3] fork: check exit_signal passed in clone3() call Message-ID: <4b38fa4ce420b119a4c6345f42fe3cec2de9b0b5.1568223594.git.esyr@redhat.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.15 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.38]); Wed, 11 Sep 2019 17:46:12 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Previously, higher 32 bits of exit_signal fields were lost when copied to the kernel args structure (that uses int as a type for the respective field). Moreover, as Oleg has noted[1], exit_signal is used unchecked, so it has to be checked for sanity before use; for the legacy syscalls, applying CSIGNAL mask guarantees that it is at least non-negative; however, there's no such thing is done in clone3() code path, and that can break at least thread_group_leader. Adding checks that user-passed exit_signal fits into int and passes valid_signal() check solves both of these problems. [1] https://lkml.org/lkml/2019/9/10/467 * kernel/fork.c (copy_clone_args_from_user): Fail with -EINVAL if args.exit_signal is greater than UINT_MAX or is not a valid signal. (_do_fork): Note that exit_signal is expected to be checked for the sanity by the caller. Fixes: 7f192e3cd316 ("fork: add clone3") Reported-by: Oleg Nesterov Co-authored-by: Oleg Nesterov Co-authored-by: Dmitry V. Levin Signed-off-by: Eugene Syromiatnikov --- kernel/fork.c | 11 +++++++++++ 1 file changed, 11 insertions(+) diff --git a/kernel/fork.c b/kernel/fork.c index 2852d0e..f98314b 100644 --- a/kernel/fork.c +++ b/kernel/fork.c @@ -2338,6 +2338,8 @@ struct mm_struct *copy_init_mm(void) * * It copies the process, and if successful kick-starts * it and waits for it to finish using the VM if required. + * + * args->exit_signal is expected to be checked for sanity by the caller. */ long _do_fork(struct kernel_clone_args *args) { @@ -2562,6 +2564,15 @@ noinline static int copy_clone_args_from_user(struct kernel_clone_args *kargs, if (copy_from_user(&args, uargs, size)) return -EFAULT; + /* + * Two separate checks are needed, as valid_signal() takes unsigned long + * as an argument, and struct kernel_clone_args uses int type + * for the exit_signal field. + */ + if (unlikely((args.exit_signal > UINT_MAX) || + !valid_signal(args.exit_signal))) + return -EINVAL; + *kargs = (struct kernel_clone_args){ .flags = args.flags, .pidfd = u64_to_user_ptr(args.pidfd), -- 2.1.4