Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4025592ybl; Mon, 3 Feb 2020 11:05:41 -0800 (PST) X-Google-Smtp-Source: APXvYqw/YCzM8xAi/dKl8mxTmeerMWpPTXlg9jASZ3TGbo1QyQHrFco690E1T/1VI7hh4h9fS8O2 X-Received: by 2002:a05:6830:1389:: with SMTP id d9mr7950611otq.174.1580756741447; Mon, 03 Feb 2020 11:05:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580756741; cv=none; d=google.com; s=arc-20160816; b=CEVAoXF9uPAhjHjzdgCh1zADUH+Fsk1hTJli6RDgnjm56H3jvVelMb5dBGc0402H4n 0n2nUZWDkCv2+zQrkEbl/7hHbL0w7NwuuuawiNvyyY2DYBwiYpGoaiZrPqltY/VQb9LL xfjrRcrj0/IeNWyyOrYIpxKuy989lhSo3hSXIAfoqtE9OzJqBVnaq0T/f+l7iOYuxF03 HPomCNqpLtkCrX2kxWvPjaUQ8ZSohfUMinV6yTDGiLMPb84pycp9BPEjUFr7SpycfNxo qRq59P3KzRePsx4iRwgNGadpBmonllCvfxXRxCeas2VTEo3Jw6sGnHbJgZ3+uG1SBxnf Aepg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=+iUL/Xeo1QmD6Jys3qVeRLkMxBBlUsXAw2wzAtd0khc=; b=y1/1SSYhTrIPc1o845kjs+FFxQH7zdkJ/QvKf9MyQ3+jIrN1omqUrSRdObLEzA7h/Q aeUdfzcGY6XAShZrhXsw98UwrYhBiga/u2nBafI6dje3CWOWh2XIVFe1qUteEU1vQJtF g5CQy0tzFOkbucLbq1IGvIjnjwQwrgqt52Z+F/q2HW4Ddi2S56QuhWA4qHFzL/YTplha pjqZ1CBgFzO3Fs0qE3W+LPEyKfn8f+pzteDHUBsz4vpAGmjlHtUqkL6AtwBwKl4TVy2B o9GQt9Ii3OgV9utJumy1/0tBn2rh6XB+mmyA6gUXAOOFADuOaQ1j0xL1xMDc54ozRU1v k6sg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ks1FpNP+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f5si9968131otp.129.2020.02.03.11.05.29; Mon, 03 Feb 2020 11:05:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ks1FpNP+; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730368AbgBCQcI (ORCPT + 99 others); Mon, 3 Feb 2020 11:32:08 -0500 Received: from mail.kernel.org ([198.145.29.99]:45674 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730358AbgBCQcG (ORCPT ); Mon, 3 Feb 2020 11:32:06 -0500 Received: from localhost (unknown [104.132.45.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1431E21582; Mon, 3 Feb 2020 16:32:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1580747525; bh=0ZbjyXeSGqs3vPWbhO5WXJOnQJXkUM8xCFg3+RP15C8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ks1FpNP+d7HKkrR96E1h2JK/kqvycXj/CRQUuYdtO9gVzg4C6TzXB0ozmJ8Bsuieu HlqKngsHh2NZyvnkfMx2lCm84K3Hb4YoBF9Yc1RQkg+g24lflR7xM8ltNCt+hf7SIj EJCIAHBhDIMBu35GI1gXLDrK0RQ0mdM3Oz5UB2jg= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Mathieu Desnoyers , "Peter Zijlstra (Intel)" , Linus Torvalds , Thomas Gleixner , Ingo Molnar , Sasha Levin Subject: [PATCH 4.19 30/70] rseq: Unregister rseq for clone CLONE_VM Date: Mon, 3 Feb 2020 16:19:42 +0000 Message-Id: <20200203161916.905521381@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200203161912.158976871@linuxfoundation.org> References: <20200203161912.158976871@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mathieu Desnoyers [ Upstream commit 463f550fb47bede3a5d7d5177f363a6c3b45d50b ] It has been reported by Google that rseq is not behaving properly with respect to clone when CLONE_VM is used without CLONE_THREAD. It keeps the prior thread's rseq TLS registered when the TLS of the thread has moved, so the kernel can corrupt the TLS of the parent. The approach of clearing the per task-struct rseq registration on clone with CLONE_THREAD flag is incomplete. It does not cover the use-case of clone with CLONE_VM set, but without CLONE_THREAD. Here is the rationale for unregistering rseq on clone with CLONE_VM flag set: 1) CLONE_THREAD requires CLONE_SIGHAND, which requires CLONE_VM to be set. Therefore, just checking for CLONE_VM covers all CLONE_THREAD uses. There is no point in checking for both CLONE_THREAD and CLONE_VM, 2) There is the possibility of an unlikely scenario where CLONE_SETTLS is used without CLONE_VM. In order to be an issue, it would require that the rseq TLS is in a shared memory area. I do not plan on adding CLONE_SETTLS to the set of clone flags which unregister RSEQ, because it would require that we also unregister RSEQ on set_thread_area(2) and arch_prctl(2) ARCH_SET_FS for completeness. So rather than doing a partial solution, it appears better to let user-space explicitly perform rseq unregistration across clone if needed in scenarios where CLONE_VM is not set. Signed-off-by: Mathieu Desnoyers Signed-off-by: Peter Zijlstra (Intel) Cc: Linus Torvalds Cc: Peter Zijlstra Cc: Thomas Gleixner Link: https://lkml.kernel.org/r/20191211161713.4490-3-mathieu.desnoyers@efficios.com Signed-off-by: Ingo Molnar Signed-off-by: Sasha Levin --- include/linux/sched.h | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/include/linux/sched.h b/include/linux/sched.h index 20f5ba262cc0d..0530de9a4efcc 100644 --- a/include/linux/sched.h +++ b/include/linux/sched.h @@ -1843,11 +1843,11 @@ static inline void rseq_migrate(struct task_struct *t) /* * If parent process has a registered restartable sequences area, the - * child inherits. Only applies when forking a process, not a thread. + * child inherits. Unregister rseq for a clone with CLONE_VM set. */ static inline void rseq_fork(struct task_struct *t, unsigned long clone_flags) { - if (clone_flags & CLONE_THREAD) { + if (clone_flags & CLONE_VM) { t->rseq = NULL; t->rseq_len = 0; t->rseq_sig = 0; -- 2.20.1