Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp4781751pxb; Tue, 25 Jan 2022 19:30:15 -0800 (PST) X-Google-Smtp-Source: ABdhPJyjditOxLDSV/eHKuUzuxy6Z35sh80EsEtbW3exRmEL2d3GeA/OFFqd9lQhYZUdoY4T+KTJ X-Received: by 2002:a17:906:3bd6:: with SMTP id v22mr18592901ejf.625.1643167815362; Tue, 25 Jan 2022 19:30:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643167815; cv=none; d=google.com; s=arc-20160816; b=q+W2QiPm00xg9yJ7lkv2a4PnpYC6wXFx/yEOu/rbYfA19441b/gjl3PAlOKw6K0HX9 g5SAi1vhD+Zsiq24HtbaJk+DfyVdKz7PFmPrLbvhe5YSan5DuGzHxMfMz1AeUc3847kz DJCIlsKn0RWY7KFVtK27uBEeTGf/gtxrowkfl8Ach1WLqyrbkVHcSyhUZKXP9g7yMfOd 1287Fv4Jj1IWDjDOmeFlT1OwJoSMDwKQ99VbMmF7QZQFFKv0DxR7SiSMsDLeds3Cs1jO 2y8O826kkWYqGIkJ3Oq9/mtzmtbiqoFOWudS720IoXjxR7xPu+q1ZPdb4GKMw03rNVhr S6Ow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:mime-version:message-id:date :dkim-signature; bh=Lok6oxADWNe/Lq9Bd8BF739UQWqpIq0qYKa/bk6A5N0=; b=q5A/nNx3l3JeV1/rgHNfzWTAtKMvpazEVVmg8rWAUEBO8a5EZtkj5U1Ei/x8KVRJyp A79ZvRFNZFqVUOYsySpJ/s1PQTbxwZA6AdGIZIfvC/m6WvMHnbRlXu8stolyXKIkDVSw /wU3wAAVT7c59o6uFrcqcLcz6MGeMQ7cmbpSow9FeD5F2WrhmEm7umaLQ7g4VPVyw6aE mGP2JBlTacrcqhoa/89HYP5WtTQK1UWjgs3NbUgk6Fy0KvHYira1McGITo0seWVuG+R9 Y9ZR0B5z+9X+RT7Ay9FB0cdmWK67DbRk9c0zAnodqO9pxBy8yKPMCEMieXkh2FQIBKOz N29Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=Q7l+l0kO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e2si581466ejs.401.2022.01.25.19.29.51; Tue, 25 Jan 2022 19:30:15 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=Q7l+l0kO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231225AbiAYSXl (ORCPT + 99 others); Tue, 25 Jan 2022 13:23:41 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35096 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230429AbiAYSWf (ORCPT ); Tue, 25 Jan 2022 13:22:35 -0500 Received: from mail-yb1-xb49.google.com (mail-yb1-xb49.google.com [IPv6:2607:f8b0:4864:20::b49]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 41D90C061753 for ; Tue, 25 Jan 2022 10:22:35 -0800 (PST) Received: by mail-yb1-xb49.google.com with SMTP id d65-20020a256844000000b00614359972a6so33918284ybc.16 for ; Tue, 25 Jan 2022 10:22:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:message-id:mime-version:subject:from:to:cc; bh=Lok6oxADWNe/Lq9Bd8BF739UQWqpIq0qYKa/bk6A5N0=; b=Q7l+l0kOp7iAA251LRk5qfU1ONabSuPZAiJwgqqdIvUyhHRq5IpqYE0NG2FjMa8LI3 BOf0LsBOrb5++slHn79YerH9uoCp11FPSy6Bk1I2YWasaNbov63mEXtyjagbrQdhbk4u d+ykI49DmoF40J+nuy6z7Uni3moA4qm18Mo2TtKprOXdqOWQIHq+zsvKbQg7QOwlD5MZ 2x0eWn+SQcCkXLrY9t+ikn9LW98pTC2sJf36jaM0RVFCl7BKt0YN5QzVBzk660JBKU78 OmF/S/Yf/V7V4h6eZhc5o7qKII3l+IRuydkfe4u8z2fWazTlYOqNaDTs5rcXCVUfusb1 TAVg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:message-id:mime-version:subject:from:to:cc; bh=Lok6oxADWNe/Lq9Bd8BF739UQWqpIq0qYKa/bk6A5N0=; b=LXGZ08bpReZAOyV8Io1XHuwyI1toalnKk4MLO19Q8dw4WX9R/7dXPdiwOUxlGrEHj/ yYsSGjUBwK1FJjLk77xAHd7lJiIvgPwpeG4lxAHtq6G9hcu8XKyOfmdkj/QeErsCCie3 peLNxXgcpJXNeykfRbSqC6q/hdf8Goaqf5TnQBYoCXSK/QbbroGSAApreX3bd7P/QBA2 xjt1G9fkjfwLCKEU4ltegKS/wN+6OBCupp4WVNbr9bGPMrPmDtfBvOFTCc2LbVOTdRHk ZfCVeaxbvonEHC9Oe93noMJB6Sn8qBohe6r6fgBgngbSUfySYBkbeI+A+BjsIiP0kYJI DBWQ== X-Gm-Message-State: AOAM533MNd14mFVNpZKkVZe+iylr/RU1Eb+I3TPeFnApI+w623UQ3MNA SnmH7R7HsABm1dodGyMBuSfoFxGthG4w X-Received: from eugenis.svl.corp.google.com ([2620:15c:2ce:200:d947:cd1e:4976:2712]) (user=eugenis job=sendgmr) by 2002:a05:6902:47:: with SMTP id m7mr33544786ybh.69.1643134954491; Tue, 25 Jan 2022 10:22:34 -0800 (PST) Date: Tue, 25 Jan 2022 10:22:17 -0800 Message-Id: <20220125182217.2605202-1-eugenis@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.35.0.rc0.227.g00780c9af4-goog Subject: [PATCH v2] arm64: extable: fix load_unaligned_zeropad() reg indices From: Evgenii Stepanov To: Catalin Marinas , Will Deacon , Mark Rutland , Ard Biesheuvel , Robin Murphy , Jisheng Zhang Cc: linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Evgenii Stepanov , stable@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In ex_handler_load_unaligned_zeropad() we erroneously extract the data and addr register indices from ex->type rather than ex->data. As ex->type will contain EX_TYPE_LOAD_UNALIGNED_ZEROPAD (i.e. 4): * We'll always treat X0 as the address register, since EX_DATA_REG_ADDR is extracted from bits [9:5]. Thus, we may attempt to dereference an arbitrary address as X0 may hold an arbitrary value. * We'll always treat X4 as the data register, since EX_DATA_REG_DATA is extracted from bits [4:0]. Thus we will corrupt X4 and cause arbitrary behaviour within load_unaligned_zeropad() and its caller. Fix this by extracting both values from ex->data as originally intended. On an MTE-enabled QEMU image we are hitting the following crash: Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000 Call trace: fixup_exception+0xc4/0x108 __do_kernel_fault+0x3c/0x268 do_tag_check_fault+0x3c/0x104 do_mem_abort+0x44/0xf4 el1_abort+0x40/0x64 el1h_64_sync_handler+0x60/0xa0 el1h_64_sync+0x7c/0x80 link_path_walk+0x150/0x344 path_openat+0xa0/0x7dc do_filp_open+0xb8/0x168 do_sys_openat2+0x88/0x17c __arm64_sys_openat+0x74/0xa0 invoke_syscall+0x48/0x148 el0_svc_common+0xb8/0xf8 do_el0_svc+0x28/0x88 el0_svc+0x24/0x84 el0t_64_sync_handler+0x88/0xec el0t_64_sync+0x1b4/0x1b8 Code: f8695a69 71007d1f 540000e0 927df12a (f940014a) Fixes: 753b32368705 ("arm64: extable: add load_unaligned_zeropad() handler") Cc: # 5.16.x Reviewed-by: Mark Rutland Signed-off-by: Evgenii Stepanov --- arch/arm64/mm/extable.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/arch/arm64/mm/extable.c b/arch/arm64/mm/extable.c index c0181e60cc98..489455309695 100644 --- a/arch/arm64/mm/extable.c +++ b/arch/arm64/mm/extable.c @@ -40,8 +40,8 @@ static bool ex_handler_load_unaligned_zeropad(const struct exception_table_entry *ex, struct pt_regs *regs) { - int reg_data = FIELD_GET(EX_DATA_REG_DATA, ex->type); - int reg_addr = FIELD_GET(EX_DATA_REG_ADDR, ex->type); + int reg_data = FIELD_GET(EX_DATA_REG_DATA, ex->data); + int reg_addr = FIELD_GET(EX_DATA_REG_ADDR, ex->data); unsigned long data, addr, offset; addr = pt_regs_read_reg(regs, reg_addr); -- 2.35.0.rc0.227.g00780c9af4-goog