Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp1228510ybx; Thu, 31 Oct 2019 07:31:36 -0700 (PDT) X-Google-Smtp-Source: APXvYqzbvuPsl+HFL6TzBJG/asi8UvyB81uzrGxxd1SDElCowbtp1l1By06gyXcSobFSjW/OoGEy X-Received: by 2002:a05:6402:20c:: with SMTP id t12mr6413026edv.109.1572532296149; Thu, 31 Oct 2019 07:31:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572532296; cv=none; d=google.com; s=arc-20160816; b=jkMZ9wP0Mezb6bZkLokqCqFn46GSysHToJU19pL+pPOSCZcZTjtXd9K7KZQpMnVfh5 GRBTY69E9PGcyOW/z4sCFT5pXX5cBc6vVEpJwJI/9ocuXEeQZ18d8a+wnxNRJFbbEacK KqKpnkLx1rP44EpHsazPe9f92WHIxyinFyz2gyZmeXIj3wskJ6qvbTcwCNCWK/x82YgE AtvKVQuBFEg8HWK8UpbtSzV5PFvLvo+4q7NexkVcf4HVH55ETuz82cL3yGiwJ6LApNgB Ets8VDFJwH0g5RZWnc1omim637AIOQWBMZQRTdYxAEUpWP6vY1r2By51B5vlpF9skexH QA9Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :content-language:accept-language:in-reply-to:references:message-id :date:thread-index:thread-topic:subject:cc:to:from; bh=F/fG8Hi4mYqlVYbwpOGkhRML/TY+fmK81tV62YG60DY=; b=xh52kQ6/Zqq+g0Q3UG2Wjm+T+3zaDMXiirpCY5OIy6eQrxue+Mw3rJLVGyyp3IeHuP 3yQiIy3olW8C/6oyKY/yW6WD5q7gPSkj/CClimFPKliKV8RNFkeUuWntePmXEJ6VPegX Skkz8ra7GCNgOyvPdlWhkbdU2hUCKywq0aJuz9uqBj/Tjibs9Gx6eMgn9p/3fqxqg+sN CRYxUWfdMYGk/ezubUDoNYa3Qtcw8bQS22JEmiP2ZV3naEZbF64hlNpAPPpaYRoHG5AL v4bXmGzk1U6VWI0+nZAAWGNycWVZaU3QrZYRIyewpX6gOrTdlh6AMBrg3O7o3oONVgAo eGIg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f25si1929875ejw.85.2019.10.31.07.31.11; Thu, 31 Oct 2019 07:31:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728040AbfJaO1k convert rfc822-to-8bit (ORCPT + 99 others); Thu, 31 Oct 2019 10:27:40 -0400 Received: from eu-smtp-delivery-151.mimecast.com ([207.82.80.151]:56480 "EHLO eu-smtp-delivery-151.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727742AbfJaO1k (ORCPT ); Thu, 31 Oct 2019 10:27:40 -0400 Received: from AcuMS.aculab.com (156.67.243.126 [156.67.243.126]) (Using TLS) by relay.mimecast.com with ESMTP id uk-mta-70-YU6WXDc2PrG1nexM6IIzbw-1; Thu, 31 Oct 2019 14:27:31 +0000 Received: from AcuMS.Aculab.com (fd9f:af1c:a25b:0:43c:695e:880f:8750) by AcuMS.aculab.com (fd9f:af1c:a25b:0:43c:695e:880f:8750) with Microsoft SMTP Server (TLS) id 15.0.1347.2; Thu, 31 Oct 2019 14:27:30 +0000 Received: from AcuMS.Aculab.com ([fe80::43c:695e:880f:8750]) by AcuMS.aculab.com ([fe80::43c:695e:880f:8750%12]) with mapi id 15.00.1347.000; Thu, 31 Oct 2019 14:27:30 +0000 From: David Laight To: 'Christian Brauner' , "linux-kernel@vger.kernel.org" , Florian Weimer , GNU C Library CC: Arnd Bergmann , Kees Cook , "Jann Horn" , David Howells , Ingo Molnar , Oleg Nesterov , Linus Torvalds , Peter Zijlstra , "linux-api@vger.kernel.org" , "stable@vger.kernel.org" Subject: RE: [PATCH] clone3: validate stack arguments Thread-Topic: [PATCH] clone3: validate stack arguments Thread-Index: AQHVj99vS5K32QXnq0iIRbo0zlqhOad0zlFw Date: Thu, 31 Oct 2019 14:27:30 +0000 Message-ID: <7f59e7e573aa40f08cb0e465d8d0150e@AcuMS.aculab.com> References: <20191031113608.20713-1-christian.brauner@ubuntu.com> In-Reply-To: <20191031113608.20713-1-christian.brauner@ubuntu.com> Accept-Language: en-GB, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.202.205.107] MIME-Version: 1.0 X-MC-Unique: YU6WXDc2PrG1nexM6IIzbw-1 X-Mimecast-Spam-Score: 0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From Christian Brauner > Sent: 31 October 2019 11:36 > > Validate the stack arguments and setup the stack depening on whether or not > it is growing down or up. > ... > -static bool clone3_args_valid(const struct kernel_clone_args *kargs) > +/** > + * clone3_stack_valid - check and prepare stack > + * @kargs: kernel clone args > + * > + * Verify that the stack arguments userspace gave us are sane. > + * In addition, set the stack direction for userspace since it's easy for us to > + * determine. > + */ > +static inline bool clone3_stack_valid(struct kernel_clone_args *kargs) > +{ > + if (kargs->stack == 0) { > + if (kargs->stack_size > 0) > + return false; > + } else { > + if (kargs->stack_size == 0) > + return false; > + > + if (!access_ok((void __user *)kargs->stack, kargs->stack_size)) > + return false; Does access_ok() do anything useful here? It only verifies that the buffer isn't in kernel space. David - Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1 1PT, UK Registration No: 1397386 (Wales)