Received: by 2002:a25:7ec1:0:0:0:0:0 with SMTP id z184csp1047429ybc; Tue, 12 Nov 2019 13:23:10 -0800 (PST) X-Google-Smtp-Source: APXvYqy9v1dn68ESFMV3TSXUprLVFYczG+W9PT+f6srK19M6lad2pAvZZuxe60WlqaKOsO5jK/S6 X-Received: by 2002:aa7:d697:: with SMTP id d23mr1490194edr.31.1573593790581; Tue, 12 Nov 2019 13:23:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573593790; cv=none; d=google.com; s=arc-20160816; b=lhzLsstxKLi8BGlXp5woH5XodAJsDacZJeBaBGqPXKxuB1ZiXZ8wuB/BuJjKimnho5 o5F2V5lWo3IGsYM3NMiIAbEnC5wFlAGf5gBUgIzhwaVyM8qFsThUI3GFrg2OtUHkCKim I9MrUsaK6gCNyj4Trdjw4wUdw2TuP1LgRwl+SEZ5EBqW8NFrZMmPVxkCZ6vQhVLgCXed l7yKoXlkB7uhAhKoO8rSBTndRroG3UAsiWh3vVJ5CkE01nrwrw+7MhTaLiy5GYgmcRkq Q0HrQp/9TvEbN0gupuEDQQIcIcJwFIW6FScXJzi6+jq0KFt+zpsj1RuY9tUw8v5NFIyJ nyLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=56RmInZgI7Bh5RV3HY6BrZUpnFAVvdE9v++wifdVVbQ=; b=GxtNmBKxhRCe/USa5VAJkgT7KuKdpkQLFkk4woJiVgYL1s5EfrDs6ij9e3QCG08ImM JbDhwJz5q+Zqn2fW7wuouJ7D5gWea5iGh2qNZMeMHowD+qMP4S4TgmfZMtCj6FspYRVG ZVAypSGIUAOu1RY+RbYhyOWP7sq5J06Ygf5uWhbNRmkG2OLc0HBBNtQn/t9bzpes2Xqd XAJWJ+wc2X55jm7RsXDZHxZPlzqCQTj3+8T0qImWlSktvPWgBFCOMGix+wXuC44odA26 VOg+jBuBk1ZEL9SZ/mgeJ3AJ1n/aFj5scp6NGTFfziSFTe81tS+rF0mm5c8D4K3pyZdR LibA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=ZfNUt0qS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h21si14962574edh.110.2019.11.12.13.22.45; Tue, 12 Nov 2019 13:23:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=ZfNUt0qS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727321AbfKLVWA (ORCPT + 99 others); Tue, 12 Nov 2019 16:22:00 -0500 Received: from mail-pg1-f193.google.com ([209.85.215.193]:38983 "EHLO mail-pg1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727187AbfKLVV5 (ORCPT ); Tue, 12 Nov 2019 16:21:57 -0500 Received: by mail-pg1-f193.google.com with SMTP id 29so12684751pgm.6 for ; Tue, 12 Nov 2019 13:21:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to; bh=56RmInZgI7Bh5RV3HY6BrZUpnFAVvdE9v++wifdVVbQ=; b=ZfNUt0qSlG/eNpBtAZ0VTYWsyYp45EI1kg059Eym4v5QX0Rd4eJhUdGDHMn6QKbyy7 rAEVCINxRbPGFWvH2zmErPehM9LKyDLyBoDAInAHNKT4/quKkG/EtZO/FhCOkM/nDfkP OwUp5RB5f4lGpDiCQlYFyWhQBMqbf0YFKIWuU= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to; bh=56RmInZgI7Bh5RV3HY6BrZUpnFAVvdE9v++wifdVVbQ=; b=VZpAjMSZA7eIKB9tNf+5dCKb2dxvGsAbQblrrFG8tDlUouYaZ1OMOJHJ8ig5Gq1rbG 62KXE6/OfUDOleckGekNvwJqMGF8q3n25rNr6p7xaN67mnzNo27bV1RLZc+zP3lV8MFm M3rpJtFLslu3mcBJR4IeYloxfpl/mSnwadcLxluSkmpv0kJHF8iveWO/nxlAWPszZ+m3 KxaVCULkq5PBcBmBzVIiMZs3eYHximUO9IlKXl3qeRxyVHyxH2SjyFgq1JFEZqtxHoS6 Gxnn0boN2MK8vJHrTN8TkkHVIeMkClxQrBhqNqQN4u3PdOzofYAqfvB2gjQgXRQPxRHP YMSQ== X-Gm-Message-State: APjAAAVJgBjarRxl+jbusydxMcjeoJFHqCTNkYN999WHo5unWqaBxxo1 u4zzkA1wIdJH55AnlxlVPn/Y5g== X-Received: by 2002:aa7:8d8b:: with SMTP id i11mr11186741pfr.45.1573593716214; Tue, 12 Nov 2019 13:21:56 -0800 (PST) Received: from www.outflux.net (smtp.outflux.net. [198.145.64.163]) by smtp.gmail.com with ESMTPSA id c21sm19635349pgh.25.2019.11.12.13.21.54 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Nov 2019 13:21:55 -0800 (PST) Date: Tue, 12 Nov 2019 13:21:54 -0800 From: Kees Cook To: Jiri Slaby , Alexander Viro Cc: linux-kernel@vger.kernel.org, David Windsor , Pekka Enberg , David Rientjes , Joonsoo Kim , Andrew Morton , linux-mm@kvack.org, linux-xfs@vger.kernel.org, Linus Torvalds , Andy Lutomirski , Christoph Hellwig , Christoph Lameter , "David S. Miller" , Laura Abbott , Mark Rutland , "Martin K. Petersen" , Paolo Bonzini , Christian Borntraeger , Christoffer Dall , Dave Kleikamp , Jan Kara , Luis de Bethencourt , Marc Zyngier , Rik van Riel , Matthew Garrett , linux-fsdevel@vger.kernel.org, linux-arch@vger.kernel.org, netdev@vger.kernel.org, kernel-hardening@lists.openwall.com, Vlastimil Babka , Michal Kubecek Subject: Re: [kernel-hardening] [PATCH 09/38] usercopy: Mark kmalloc caches as usercopy caches Message-ID: <201911121313.1097D6EE@keescook> References: <1515636190-24061-1-git-send-email-keescook@chromium.org> <1515636190-24061-10-git-send-email-keescook@chromium.org> <9519edb7-456a-a2fa-659e-3e5a1ff89466@suse.cz> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <9519edb7-456a-a2fa-659e-3e5a1ff89466@suse.cz> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Nov 12, 2019 at 08:17:57AM +0100, Jiri Slaby wrote: > On 11. 01. 18, 3:02, Kees Cook wrote: > > From: David Windsor > > > > Mark the kmalloc slab caches as entirely whitelisted. These caches > > are frequently used to fulfill kernel allocations that contain data > > to be copied to/from userspace. Internal-only uses are also common, > > but are scattered in the kernel. For now, mark all the kmalloc caches > > as whitelisted. > > > > This patch is modified from Brad Spengler/PaX Team's PAX_USERCOPY > > whitelisting code in the last public patch of grsecurity/PaX based on my > > understanding of the code. Changes or omissions from the original code are > > mine and don't reflect the original grsecurity/PaX code. > > > > Signed-off-by: David Windsor > > [kees: merged in moved kmalloc hunks, adjust commit log] > > Cc: Pekka Enberg > > Cc: David Rientjes > > Cc: Joonsoo Kim > > Cc: Andrew Morton > > Cc: linux-mm@kvack.org > > Cc: linux-xfs@vger.kernel.org > > Signed-off-by: Kees Cook > > Acked-by: Christoph Lameter > > --- > > mm/slab.c | 3 ++- > > mm/slab.h | 3 ++- > > mm/slab_common.c | 10 ++++++---- > > 3 files changed, 10 insertions(+), 6 deletions(-) > > > > diff --git a/mm/slab.c b/mm/slab.c > > index b9b0df620bb9..dd367fe17a4e 100644 > > --- a/mm/slab.c > > +++ b/mm/slab.c > ... > > @@ -1098,7 +1099,8 @@ void __init setup_kmalloc_cache_index_table(void) > > static void __init new_kmalloc_cache(int idx, slab_flags_t flags) > > { > > kmalloc_caches[idx] = create_kmalloc_cache(kmalloc_info[idx].name, > > - kmalloc_info[idx].size, flags); > > + kmalloc_info[idx].size, flags, 0, > > + kmalloc_info[idx].size); > > } > > > > /* > > @@ -1139,7 +1141,7 @@ void __init create_kmalloc_caches(slab_flags_t flags) > > > > BUG_ON(!n); > > kmalloc_dma_caches[i] = create_kmalloc_cache(n, > > - size, SLAB_CACHE_DMA | flags); > > + size, SLAB_CACHE_DMA | flags, 0, 0); > > Hi, > > was there any (undocumented) reason NOT to mark DMA caches as usercopy? > > We are seeing this on s390x: > > > usercopy: Kernel memory overwrite attempt detected to SLUB object > 'dma-kmalloc-1k' (offset 0, size 11)! > > ------------[ cut here ]------------ > > kernel BUG at mm/usercopy.c:99! Interesting! I believe the rationale was that if the region is used for DMA, allowing direct access to it from userspace could be prone to races. > See: > https://bugzilla.suse.com/show_bug.cgi?id=1156053 For context from the bug, the trace is: (<0000000000386c5a> usercopy_abort+0xa2/0xa8) <000000000036097a> __check_heap_object+0x11a/0x120 <0000000000386b3a> __check_object_size+0x18a/0x208 <000000000079b4ba> skb_copy_datagram_from_iter+0x62/0x240 <000003ff804edd5c> iucv_sock_sendmsg+0x1fc/0x858 ?af_iucv? <0000000000785894> sock_sendmsg+0x54/0x90 <0000000000785944> sock_write_iter+0x74/0xa0 <000000000038a3f0> new_sync_write+0x110/0x180 <000000000038d42e> vfs_write+0xa6/0x1d0 <000000000038d748> ksys_write+0x60/0xe8 <000000000096a660> system_call+0xdc/0x2e0 I know Al worked on fixing up usercopy checking for iters. I wonder if there is redundant checking happening here? i.e. haven't iters already done object size verifications, so they're not needed during iter copy helpers? > This indeed fixes it: > --- a/mm/slab_common.c > +++ b/mm/slab_common.c > @@ -1290,7 +1290,8 @@ void __init create_kmalloc_caches(slab_flags_t flags) > kmalloc_caches[KMALLOC_DMA][i] = > create_kmalloc_cache( > kmalloc_info[i].name[KMALLOC_DMA], > kmalloc_info[i].size, > - SLAB_CACHE_DMA | flags, 0, 0); > + SLAB_CACHE_DMA | flags, 0, > + kmalloc_info[i].size); > } > } > #endif How is iucv the only network protocol that has run into this? Do others use a bounce buffer? -- Kees Cook