Received: by 2002:a25:e7d8:0:0:0:0:0 with SMTP id e207csp2470811ybh; Mon, 9 Mar 2020 06:34:51 -0700 (PDT) X-Google-Smtp-Source: ADFU+vs4xi1Fjs8S1kphm+3cEgHtKdywczGNSt4Jgm5cqezLL76WoB4X79G2q6F97THVnsdzlMOU X-Received: by 2002:a9d:12a3:: with SMTP id g32mr13365645otg.111.1583760891749; Mon, 09 Mar 2020 06:34:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1583760891; cv=none; d=google.com; s=arc-20160816; b=wcYO/7gyec0VpNqzkjFV0HbIzS8NXgW9waafTbuv66d13oKd6i0YP3LPW+6sW8WX1L fbJfe8EUNEzw5RZnoRD9qr9OdHMHaEm+RTMF+9T0RooSsW8oR/i8V3B6zO4yjztrCXN2 uXEa4lCBgpg4Qwzwn+vfLKhHtAOm2eHGzWF2iGJoDXdx5tzKHUH+NCgm/81/XJJ2dA1G a5vmbqtPa5eh6AJWRYYBX1PNvbc2WDwTi2/fyquClrjfqGx3gX74RsFoZJqOvqHKn9J5 Dsb+dV6FVpFemHR5ymDQ7fGS4t9k13xs2dH1PvQnv8Ku9mPeEP16r5DXK0nPvqKzv+r5 8JWw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from; bh=rdmGHANiuT+duUh6ADPrIlM67KaJkUnXOZvsXqBHVus=; b=CyOddmxwuTbyuIp4VIsCF4wHNKXu22Jhgh4tQR5/9HsbtBhSnIEGvhPCQEYS2H0nPs BHv+wRV1f8Al1nffmrP+zmi3OKKcXkRA/1b5RVoZEV/6jAb9/J/79lzuwgb//e2894xs EtAM6nJU1CQnZKtx0xRlVRhl6bQdPS5O1fMpxfK2eU/yfkRzZ59Wuh+DyHbwylTq3yVi Ad/VmrcCjjr3//IlzjohlL5GzM3QCylg8UhRmcpH11GmCrUYdmO0amrVvcImMrW61wey khCgSOzniwtAMoz03HGujL/Y4S+/h9iUPi4f0UwWxX/aSl/ObvIkDHzR0yPQY+KIhsyF moTQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r16si564281otn.199.2020.03.09.06.34.34; Mon, 09 Mar 2020 06:34:51 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726704AbgCINcl (ORCPT + 99 others); Mon, 9 Mar 2020 09:32:41 -0400 Received: from szxga04-in.huawei.com ([45.249.212.190]:11610 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726427AbgCINcl (ORCPT ); Mon, 9 Mar 2020 09:32:41 -0400 Received: from DGGEMS404-HUB.china.huawei.com (unknown [172.30.72.60]) by Forcepoint Email with ESMTP id 24BECA8427454E02611F; Mon, 9 Mar 2020 21:32:09 +0800 (CST) Received: from huawei.com (10.90.53.225) by DGGEMS404-HUB.china.huawei.com (10.3.19.204) with Microsoft SMTP Server id 14.3.487.0; Mon, 9 Mar 2020 21:31:59 +0800 From: Cheng Jian To: CC: , , , , , , , Subject: [PATCH v2] kretprobe: check re-registration of the same kretprobe earlier Date: Mon, 9 Mar 2020 21:39:13 +0800 Message-ID: <1583761153-13876-1-git-send-email-cj.chengjian@huawei.com> X-Mailer: git-send-email 2.7.4 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.90.53.225] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Our system encountered a use-after-free when re-register the same kretprobe, it access the kretprobe_instance in rp->free_instances which has been released already. Prevent re-registration has been implemented for kprobe before, but it's too late for kretprobe. We must check the re-registration before re-initializing the kretprobe, otherwise it will destroy the data and struct of the kretprobe registered, it can lead to use-after-free, memory leak, system crash, and even other unexpected behaviors. Use check_kprobe_rereg() to check re-registration, also give a warning message. Signed-off-by: Cheng Jian Acked-by: Masami Hiramatsu --- kernel/kprobes.c | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/kernel/kprobes.c b/kernel/kprobes.c index 2625c24..9cb2a0d 100644 --- a/kernel/kprobes.c +++ b/kernel/kprobes.c @@ -1946,6 +1946,14 @@ int register_kretprobe(struct kretprobe *rp) } } + /* + * Return error if it's being re-registered, + * also give a warning message to the developer. + */ + ret = check_kprobe_rereg(&rp->kp); + if (WARN_ON(ret)) + return ret; + rp->kp.pre_handler = pre_handler_kretprobe; rp->kp.post_handler = NULL; rp->kp.fault_handler = NULL; -- 2.7.4