Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp205361pxj; Tue, 18 May 2021 01:13:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxtYnGoYlZ8mMLuzGM7+1QvPlfzLHLXDAm67nkMsmjv6dIO7DdaYKiz+cPOddv+s4Bbm1H+ X-Received: by 2002:a92:c50c:: with SMTP id r12mr3168783ilg.281.1621325587327; Tue, 18 May 2021 01:13:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621325587; cv=none; d=google.com; s=arc-20160816; b=LxBVvpeAKAWxND6tCfbbJWwmnqeNSTbcMLN7v9jYdbc73mMjeStcPEKO6M+9EdraCR Pu9IXF2X1jAJuapn47SDxkbqNYD6HXRDMY0ejYl1h+k8zjKK6af3xRhUMzYpDavjxlGB N9Uzl/9jErLmXyXXZUHhhA8cguADurHydp5zkbEMa1lq8n3999xlJ54WdEBsDW/dyCgy JsYS+aD5gB/oniT2Blqls7AT5cXXVMfgg9wI3aE4Hld93Y4nhg6/iJ8lIVnGAl/TCzf1 gMEUJj6xByUD7/1fU3g1l+AElBOG1cgvrLizb9jMlS126jWiZC9jl5yUTZQ0paieW/UC 34wA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Sj6HLBgxbBqPYrWnlRm5D/OjjOnWA2r+2oAs192x9Gg=; b=Jp5KxKmlRPM5ndimFRcTcpTV1/Y07ml9IYBKJ7DL3RnSv/qS4I7ih74G1M+xzqM9Yy DW6b2r6sPjHUhICpRUhBhNcvdrj+r3D7OxVtCWeIEZ433hhO/lsP+tA8fX+Uzs6AJ5TQ KSKFaMPIxifbH+AyCiVPmEduPRtOqpQnyw2L4i3UI+L4GFHlH0ndm7M776GTKqzyQASR a19vR/YzksnFAcxa6thsZpsI1vw2q2+GbjoBfhvPFKkJVWLTB2V/540Pr7nEK/XaCOXn ud56XaTdjjzICcnkaG9v0SGjq//PQaBNpPrnwtbjZESEAG/JU02v0i96ABkuuwwEDeQV s76g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=UNBW77YZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q8si21607249ior.12.2021.05.18.01.12.40; Tue, 18 May 2021 01:13:07 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=UNBW77YZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S242144AbhEQO7R (ORCPT + 99 others); Mon, 17 May 2021 10:59:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:42676 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242123AbhEQOt4 (ORCPT ); Mon, 17 May 2021 10:49:56 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 4E1FB6121F; Mon, 17 May 2021 14:22:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1621261375; bh=4SUyrWMklPhz6u+2+ZQbOuVSYJvmj9deWcfZDult3CM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=UNBW77YZPR2sPeqCLm7UrntaK81PLmMWbnSde/qrgZ3cL66kK+kXamDVofUO3NiMy 5vyhMEHY0yi1f92nMHBT93gGKK9tr63H5nl0LpZZYNac19LmRksO4z/SoEM/bxnc6s 9kBDjG+90SiBjKTkSlxaKiTu8Wb5WuV5oQgi1bAs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sergei Trofimovich , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 5.11 107/329] ia64: module: fix symbolizer crash on fdescr Date: Mon, 17 May 2021 16:00:18 +0200 Message-Id: <20210517140305.741769528@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210517140302.043055203@linuxfoundation.org> References: <20210517140302.043055203@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sergei Trofimovich [ Upstream commit 99e729bd40fb3272fa4b0140839d5e957b58588a ] Noticed failure as a crash on ia64 when tried to symbolize all backtraces collected by page_owner=on: $ cat /sys/kernel/debug/page_owner CPU: 1 PID: 2074 Comm: cat Not tainted 5.12.0-rc4 #226 Hardware name: hp server rx3600, BIOS 04.03 04/08/2008 ip is at dereference_module_function_descriptor+0x41/0x100 Crash happens at dereference_module_function_descriptor() due to use-after-free when dereferencing ".opd" section header. All section headers are already freed after module is laoded successfully. To keep symbolizer working the change stores ".opd" address and size after module is relocated to a new place and before section headers are discarded. To make similar errors less obscure module_finalize() now zeroes out all variables relevant to module loading only. Link: https://lkml.kernel.org/r/20210403074803.3309096-1-slyfox@gentoo.org Signed-off-by: Sergei Trofimovich Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- arch/ia64/include/asm/module.h | 6 +++++- arch/ia64/kernel/module.c | 29 +++++++++++++++++++++++++---- 2 files changed, 30 insertions(+), 5 deletions(-) diff --git a/arch/ia64/include/asm/module.h b/arch/ia64/include/asm/module.h index 5a29652e6def..7271b9c5fc76 100644 --- a/arch/ia64/include/asm/module.h +++ b/arch/ia64/include/asm/module.h @@ -14,16 +14,20 @@ struct elf64_shdr; /* forward declration */ struct mod_arch_specific { + /* Used only at module load time. */ struct elf64_shdr *core_plt; /* core PLT section */ struct elf64_shdr *init_plt; /* init PLT section */ struct elf64_shdr *got; /* global offset table */ struct elf64_shdr *opd; /* official procedure descriptors */ struct elf64_shdr *unwind; /* unwind-table section */ unsigned long gp; /* global-pointer for module */ + unsigned int next_got_entry; /* index of next available got entry */ + /* Used at module run and cleanup time. */ void *core_unw_table; /* core unwind-table cookie returned by unwinder */ void *init_unw_table; /* init unwind-table cookie returned by unwinder */ - unsigned int next_got_entry; /* index of next available got entry */ + void *opd_addr; /* symbolize uses .opd to get to actual function */ + unsigned long opd_size; }; #define ARCH_SHF_SMALL SHF_IA_64_SHORT diff --git a/arch/ia64/kernel/module.c b/arch/ia64/kernel/module.c index 00a496cb346f..2cba53c1da82 100644 --- a/arch/ia64/kernel/module.c +++ b/arch/ia64/kernel/module.c @@ -905,9 +905,31 @@ register_unwind_table (struct module *mod) int module_finalize (const Elf_Ehdr *hdr, const Elf_Shdr *sechdrs, struct module *mod) { + struct mod_arch_specific *mas = &mod->arch; + DEBUGP("%s: init: entry=%p\n", __func__, mod->init); - if (mod->arch.unwind) + if (mas->unwind) register_unwind_table(mod); + + /* + * ".opd" was already relocated to the final destination. Store + * it's address for use in symbolizer. + */ + mas->opd_addr = (void *)mas->opd->sh_addr; + mas->opd_size = mas->opd->sh_size; + + /* + * Module relocation was already done at this point. Section + * headers are about to be deleted. Wipe out load-time context. + */ + mas->core_plt = NULL; + mas->init_plt = NULL; + mas->got = NULL; + mas->opd = NULL; + mas->unwind = NULL; + mas->gp = 0; + mas->next_got_entry = 0; + return 0; } @@ -926,10 +948,9 @@ module_arch_cleanup (struct module *mod) void *dereference_module_function_descriptor(struct module *mod, void *ptr) { - Elf64_Shdr *opd = mod->arch.opd; + struct mod_arch_specific *mas = &mod->arch; - if (ptr < (void *)opd->sh_addr || - ptr >= (void *)(opd->sh_addr + opd->sh_size)) + if (ptr < mas->opd_addr || ptr >= mas->opd_addr + mas->opd_size) return ptr; return dereference_function_descriptor(ptr); -- 2.30.2