Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp3282409pxu; Sun, 29 Nov 2020 22:07:44 -0800 (PST) X-Google-Smtp-Source: ABdhPJxk5ZVwWQKaY2OIbVG2rYohiGW2BWVNylPBqv15/g/K5xZYdfurppJ92ekombeo+gMSzb5D X-Received: by 2002:a17:906:2683:: with SMTP id t3mr19369020ejc.414.1606716464490; Sun, 29 Nov 2020 22:07:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606716464; cv=none; d=google.com; s=arc-20160816; b=ANbnKpPUooL8RWzRvaTs4Hiq3MMFAjv2R28uXSNSxqX1w0tzp1W14jrCa3sZJNUccq QDyNFB2abqMSnoZbvPKrcYpt4GIfOB0uMaqQJ+8vu3ZIhtgqSLKau77AjJFqxpj0ImtF dDWLeO0pRdCbixZisVJZiLJ1RXKa3T1UnNB3j/BWpPiOl3RC03Ekv+6AmnwHNxL+nPkV mGLlmWc97uWj35dBXSVKoMTeGRoMvZSHcfPucTwzJ/0Y2gD2c78Z5o1jBHIxP18002RT OJbivRhVYDfaptuMf7jEvGGcOlH8BGlOriu2sZZ/p8INldwjuXkUdyN1rEvRS1QY43+6 1K/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:subject:cc:to:from; bh=IOFF3UlfyfQyJrNJuad7C6wv7jr18lJh16ifOe2eGBo=; b=0zrx6bAq5aotake+0ZOGC3nR3CBlzHjYmAZ6kJbm68V3rKwCszlmggaQWQUjha8mdL YmvR7OjVuYgtpa4G+76jXkQOqfcCo8AgqN1iJEYgak4dQSdIR9v9QW128cKaIuIghBVI IgS1x55VXaJSGJw0JAzSO+0bUeET45Lez7qS5T3RBgKV1UePTJAgl5NliHonRxP2IgTx YqCWlnIsNSVufUgNLVCtyQExtDrdTe2x2Gwn/3pwNjje1D9/CJMAIxMB6vB8fMKeS8x2 Is4IZ3Lg+AmNmUowGG42ejUl1mus6GhxX5GPRLK4OtnvXMyi/zNMNOWFz29xh9JEu/kS W5iw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o24si11444041edz.608.2020.11.29.22.07.22; Sun, 29 Nov 2020 22:07:44 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725898AbgK3GBq (ORCPT + 99 others); Mon, 30 Nov 2020 01:01:46 -0500 Received: from atcsqr.andestech.com ([60.248.187.195]:23423 "EHLO ATCSQR.andestech.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725860AbgK3GBp (ORCPT ); Mon, 30 Nov 2020 01:01:45 -0500 X-Greylist: delayed 1765 seconds by postgrey-1.27 at vger.kernel.org; Mon, 30 Nov 2020 01:01:45 EST Received: from ATCSQR.andestech.com (localhost [127.0.0.2] (may be forged)) by ATCSQR.andestech.com with ESMTP id 0AU5WjgV040092 for ; Mon, 30 Nov 2020 13:32:45 +0800 (GMT-8) (envelope-from tesheng@andestech.com) Received: from mail.andestech.com (atcpcs16.andestech.com [10.0.1.222]) by ATCSQR.andestech.com with ESMTP id 0AU5VqLj039951; Mon, 30 Nov 2020 13:31:52 +0800 (GMT-8) (envelope-from tesheng@andestech.com) Received: from atcfdc88.andestech.com (10.0.15.120) by ATCPCS16.andestech.com (10.0.1.222) with Microsoft SMTP Server id 14.3.487.0; Mon, 30 Nov 2020 13:31:25 +0800 From: Eric Lin To: , , , , , , , , , CC: , Eric Lin , Alan Kao Subject: [PATCH] riscv/mm: Prevent kernel module access user-space memory without uaccess routines Date: Mon, 30 Nov 2020 13:30:37 +0800 Message-ID: <20201130053037.27006-1-tesheng@andestech.com> X-Mailer: git-send-email 2.17.0 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.0.15.120] X-DNSRBL: X-MAIL: ATCSQR.andestech.com 0AU5VqLj039951 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In the page fault handler, an access to user-space memory without get/put_user() or copy_from/to_user() routines is not resolved properly. Like arm and other architectures, we need to let it die earlier in page fault handler. Signed-off-by: Eric Lin Cc: Alan Kao --- arch/riscv/mm/fault.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/arch/riscv/mm/fault.c b/arch/riscv/mm/fault.c index 3c8b9e433c67..a452cfa266a2 100644 --- a/arch/riscv/mm/fault.c +++ b/arch/riscv/mm/fault.c @@ -232,6 +232,9 @@ asmlinkage void do_page_fault(struct pt_regs *regs) if (user_mode(regs)) flags |= FAULT_FLAG_USER; + if (!user_mode(regs) && addr < TASK_SIZE && unlikely(!(regs->status & SR_SUM))) + die(regs, "Accessing user space memory without uaccess routines\n"); + perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, addr); if (cause == EXC_STORE_PAGE_FAULT) -- 2.17.0