Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp4476779ybz; Tue, 28 Apr 2020 11:58:11 -0700 (PDT) X-Google-Smtp-Source: APiQypJ1OOEbepyAWyILVSkuAziZzVv/B7713Lse1UdyGilUQJuJ2SQwT0QwFASSWpmOCqiTA5GH X-Received: by 2002:a17:906:3198:: with SMTP id 24mr24181147ejy.39.1588100291758; Tue, 28 Apr 2020 11:58:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588100291; cv=none; d=google.com; s=arc-20160816; b=m0FVc617a3S2wXl5Cwm1UmHoW0Hlrz4uuc6a+sLDYNnPw7eg/SdTRmrejjyEzOtNsd 02AAX/HnBSWWVlb5qjFK/2SpUKE3lhBvuMo4reTb9HqecVH3a6TWU4J/ffYvmDnUm/sE HywDezcQ0atXAzydwhOTnj3fKA2AN+iq+eNgLJknwcjHqS0CKB9NFI8e3tPV/GFhsatV Ol4btZpQeg7rcsqs8gabJSGKMMGZHn0t5ynkMqXUY+fcMq9jPaPeJVM6VjsRHAjAP7RK xkgXmPE6rW8pegr3yvmGhE/RQEXGR75av6pEvKtDSugGJoyyj44lFutav/JqfPZNbYAt DcHg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=xy0t1s8GIJON+e5jtefzq5/SLNFvhskFZ6kMYlrJdbI=; b=DkZAcuAMPOtf86map89rKIAGAwcuKBmCgJxDC9yk1vlpX8A8jva0uV64cM5AFZn6JA d1jLeoa+GbO9MMSHvU628/2BCrpt/zY6wyxit++SasjviDhLK9bWRKiSzEHuFuqqc9n4 yXZlnst1TYGDy1FimGpjA+vGkGtnNt0GPDp/uhWGui7QD+3T/MumkIzFvXU5tdklMPCO GGjQ8v8Ju7j/F4kwb+SC0U6JllSxImKFR0UfU7vfFL4g8f/tFJ7MqxB5jBUI7tHmD1g8 xnMMVfOR2q8YXywH+uZ7DsY8F4kJWcAMNQ05Ef7lanxTjYXlQ3Mv+rR/3nCJw/3YfoGf P96A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=u2EUKn+V; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id me19si2338098ejb.140.2020.04.28.11.57.47; Tue, 28 Apr 2020 11:58:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=u2EUKn+V; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729657AbgD1SbU (ORCPT + 99 others); Tue, 28 Apr 2020 14:31:20 -0400 Received: from mail.kernel.org ([198.145.29.99]:46748 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729646AbgD1SbS (ORCPT ); Tue, 28 Apr 2020 14:31:18 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 610A02076A; Tue, 28 Apr 2020 18:31:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588098678; bh=Hk13QinprYZgIRF1dgkDe9eApvGfNPRK3fwtpheysR4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=u2EUKn+VomXgMUugW9EevGGkRilep+w+aHSb7Uh4Uo8anToX7F7X9LE/nNJr8KMAn oJHASAt65Bc661QBBWP0VvV191cQCazw9GxrgyC8cm082AM7VBT2RFBc2QLsnKYcAV SxH5+KoHiX47pLImO1xtvR9sYw4LYOOZkhPTi4TY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jann Horn , Andrew Morton , Alexei Starovoitov , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , Andrii Nakryiko , John Fastabend , KP Singh , Linus Torvalds Subject: [PATCH 5.6 097/167] vmalloc: fix remap_vmalloc_range() bounds checks Date: Tue, 28 Apr 2020 20:24:33 +0200 Message-Id: <20200428182237.414442594@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200428182225.451225420@linuxfoundation.org> References: <20200428182225.451225420@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jann Horn commit bdebd6a2831b6fab69eb85cee74a8ba77f1a1cc2 upstream. remap_vmalloc_range() has had various issues with the bounds checks it promises to perform ("This function checks that addr is a valid vmalloc'ed area, and that it is big enough to cover the vma") over time, e.g.: - not detecting pgoff< Signed-off-by: Andrew Morton Cc: stable@vger.kernel.org Cc: Alexei Starovoitov Cc: Daniel Borkmann Cc: Martin KaFai Lau Cc: Song Liu Cc: Yonghong Song Cc: Andrii Nakryiko Cc: John Fastabend Cc: KP Singh Link: http://lkml.kernel.org/r/20200415222312.236431-1-jannh@google.com Signed-off-by: Linus Torvalds Signed-off-by: Greg Kroah-Hartman --- fs/proc/vmcore.c | 5 +++-- include/linux/vmalloc.h | 2 +- mm/vmalloc.c | 16 +++++++++++++--- samples/vfio-mdev/mdpy.c | 2 +- 4 files changed, 18 insertions(+), 7 deletions(-) --- a/fs/proc/vmcore.c +++ b/fs/proc/vmcore.c @@ -266,7 +266,8 @@ static int vmcoredd_mmap_dumps(struct vm if (start < offset + dump->size) { tsz = min(offset + (u64)dump->size - start, (u64)size); buf = dump->buf + start - offset; - if (remap_vmalloc_range_partial(vma, dst, buf, tsz)) { + if (remap_vmalloc_range_partial(vma, dst, buf, 0, + tsz)) { ret = -EFAULT; goto out_unlock; } @@ -624,7 +625,7 @@ static int mmap_vmcore(struct file *file tsz = min(elfcorebuf_sz + elfnotes_sz - (size_t)start, size); kaddr = elfnotes_buf + start - elfcorebuf_sz - vmcoredd_orig_sz; if (remap_vmalloc_range_partial(vma, vma->vm_start + len, - kaddr, tsz)) + kaddr, 0, tsz)) goto fail; size -= tsz; --- a/include/linux/vmalloc.h +++ b/include/linux/vmalloc.h @@ -137,7 +137,7 @@ extern void vunmap(const void *addr); extern int remap_vmalloc_range_partial(struct vm_area_struct *vma, unsigned long uaddr, void *kaddr, - unsigned long size); + unsigned long pgoff, unsigned long size); extern int remap_vmalloc_range(struct vm_area_struct *vma, void *addr, unsigned long pgoff); --- a/mm/vmalloc.c +++ b/mm/vmalloc.c @@ -34,6 +34,7 @@ #include #include #include +#include #include #include @@ -3054,6 +3055,7 @@ finished: * @vma: vma to cover * @uaddr: target user address to start at * @kaddr: virtual address of vmalloc kernel memory + * @pgoff: offset from @kaddr to start at * @size: size of map area * * Returns: 0 for success, -Exxx on failure @@ -3066,9 +3068,15 @@ finished: * Similar to remap_pfn_range() (see mm/memory.c) */ int remap_vmalloc_range_partial(struct vm_area_struct *vma, unsigned long uaddr, - void *kaddr, unsigned long size) + void *kaddr, unsigned long pgoff, + unsigned long size) { struct vm_struct *area; + unsigned long off; + unsigned long end_index; + + if (check_shl_overflow(pgoff, PAGE_SHIFT, &off)) + return -EINVAL; size = PAGE_ALIGN(size); @@ -3082,8 +3090,10 @@ int remap_vmalloc_range_partial(struct v if (!(area->flags & (VM_USERMAP | VM_DMA_COHERENT))) return -EINVAL; - if (kaddr + size > area->addr + get_vm_area_size(area)) + if (check_add_overflow(size, off, &end_index) || + end_index > get_vm_area_size(area)) return -EINVAL; + kaddr += off; do { struct page *page = vmalloc_to_page(kaddr); @@ -3122,7 +3132,7 @@ int remap_vmalloc_range(struct vm_area_s unsigned long pgoff) { return remap_vmalloc_range_partial(vma, vma->vm_start, - addr + (pgoff << PAGE_SHIFT), + addr, pgoff, vma->vm_end - vma->vm_start); } EXPORT_SYMBOL(remap_vmalloc_range); --- a/samples/vfio-mdev/mdpy.c +++ b/samples/vfio-mdev/mdpy.c @@ -418,7 +418,7 @@ static int mdpy_mmap(struct mdev_device return -EINVAL; return remap_vmalloc_range_partial(vma, vma->vm_start, - mdev_state->memblk, + mdev_state->memblk, 0, vma->vm_end - vma->vm_start); }