Received: by 2002:a05:6602:2086:0:0:0:0 with SMTP id a6csp4389915ioa; Wed, 27 Apr 2022 02:46:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwm1WIKT0LleMCfbRdUydtkdsWAoaST1wBA+rFvraKF+CfTGtTj8gdwZlG3yy6lZoja4XNt X-Received: by 2002:a17:90a:7e97:b0:1d2:7bcb:ee78 with SMTP id j23-20020a17090a7e9700b001d27bcbee78mr32254446pjl.40.1651052810504; Wed, 27 Apr 2022 02:46:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1651052810; cv=none; d=google.com; s=arc-20160816; b=msNl4Dw7KxImniaQhWI9PhIXje+RuFM+edWrRdyz7WJJ4mTPhK7NVuOEFXuEPBhVNV 8IBu3cfk3oD84WJ5u05wwqyAS/q0otMqUMFdR0fIYbZMdeZgR8Q2NQ+D1FuiZZDi0WfA hjoJLLB3bDAGfjtec7MyRH6wmra/Hjc8UUT/kHfRbeVeLYnjk1Q72AlYeTI4TyCtHl76 E6vK7rZagOluC8Rf9BfL0lQVUdVCsJZVR8jTIKXtGr1tk6t88VkAtVwWALnpA9DtgAl7 mVynfU0F4nt05IW23NnpZK3VkdjmLVJ9R7CyO/A7jaKhmzkAWtDQ7m50ZB/yTSQtakP4 ZVbQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=qwksdRpUlSuuWw1pxLBKhXiKlPkBnGHl88zbVVW36PY=; b=OCsKUo+KOP9l+BL7+fy4DwnFIS11lVKIMF+dBqagQkO8QZRUL6F1NWo+F9OB5ixstV F7b2nJUgMaFmYCYiMCNJ3RQUXvcqD2kUPS2bHMOek+X1QYbzSVr0msrbwc/xJvDBooIH ckCg3B7iUNCUag3muIMoGhdJ1iqJ6ECdwO3dDDDx0rJNmeFblIOH0dZAVjS7XNZlUWuk uQCDrnsuTwxDhYLwUPvbesCAXQ5QzpnHKEwgW4PXDDyvdzSeRGY4e/5xoRcRvQAnXEHL NRhox/QbO93/WFIMivm0jpVMSns+iNxwx5XsHA7tyFnJSv0FVsdI+ijJZwo4PYamiRXg STbw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=bsJROiRO; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id d185-20020a6336c2000000b00398729a9c16si1052031pga.271.2022.04.27.02.46.49 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 27 Apr 2022 02:46:50 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=bsJROiRO; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 51F7528CFD3; Wed, 27 Apr 2022 02:20:23 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1358613AbiD0HO0 (ORCPT + 99 others); Wed, 27 Apr 2022 03:14:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33870 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242219AbiD0HOY (ORCPT ); Wed, 27 Apr 2022 03:14:24 -0400 Received: from mail-qt1-x833.google.com (mail-qt1-x833.google.com [IPv6:2607:f8b0:4864:20::833]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 412D938BC5 for ; Wed, 27 Apr 2022 00:11:14 -0700 (PDT) Received: by mail-qt1-x833.google.com with SMTP id f14so559563qtq.1 for ; Wed, 27 Apr 2022 00:11:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=qwksdRpUlSuuWw1pxLBKhXiKlPkBnGHl88zbVVW36PY=; b=bsJROiROPQI0CsqMnAU6Zn7PpVxK7aTUo+iIBZoUNDEIFoqqMoAIb+ro5u2z39wvn+ ZpnnaPrlsPavmtXobVUPXO7DinfDMHRXTYhe1D7GPwqq1Iiue7gYtYrfmgyBNzqlFYcQ 52iWjNSjM9V9cjATe8QeqZs9VyFE1KaXI7ItMzVouBWAdWHU3FEtLFzMveTBPP2tlmFY VGd+s0jj+Os3pyDguKVysA/u8eytIqIFuM+3iBIKmCfAFAnHRaZ7UtcJmyWRI5ZjofjS /Ge00AoCsaES6hu+sPktSVptY3wMwIRjcZu7WtwtPOvcY7AlqzsOySbXPALHoLlfkjXG VoeQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=qwksdRpUlSuuWw1pxLBKhXiKlPkBnGHl88zbVVW36PY=; b=2N92Ojwxrkbedzb6LjdOsfneBSz9nMeYUJzbNhXQ91TgOSclAtefYBfsMJhwH2YccP 1Z55MCKzV5umzLj3FpduA+sVvvyGGhbqFqeCHthaOMcTpIcdi1La/+fRSn9MooYMqINR lJRDfT1SAy9A3ICSNZ64BfMJ2N3aK5YP2suUi42b0EKGTs6emc7yMf4VzRB9lvSU5SLC Cm8zZ6zC/otRgsxchaqWfQVnVgaszlA1fxVyIAELui/4PqjyxJGZD2dut/yW/g2qrVe8 WA7haVkDgc+7iLgJPgqz7308Qz6LT2tUTV6vSIe72HgF6H1WMCYIIqQPkWHAckAeu44F +MJQ== X-Gm-Message-State: AOAM532H6sJQ5qog5BahTOUCCoGPBjIti76OYljPx+kNm6hysDc0qZoX mT5o4knVvmYNAj9wkDZuPCs= X-Received: by 2002:a05:622a:58e:b0:2f3:81c7:cc59 with SMTP id c14-20020a05622a058e00b002f381c7cc59mr2565899qtb.614.1651043473412; Wed, 27 Apr 2022 00:11:13 -0700 (PDT) Received: from localhost.localdomain ([193.203.214.57]) by smtp.gmail.com with ESMTPSA id y13-20020a05622a164d00b002f1ff52c518sm9238002qtj.28.2022.04.27.00.11.09 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 27 Apr 2022 00:11:12 -0700 (PDT) From: cgel.zte@gmail.com X-Google-Original-From: xu.xin16@zte.com.cn To: glider@google.com, elver@google.com, akpm@linux-foundation.org Cc: dvyukov@google.com, kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, linux-mm@kvack.org, xu xin , Zeal Robot Subject: [PATCH] mm/kfence: fix a potential NULL pointer dereference Date: Wed, 27 Apr 2022 07:11:00 +0000 Message-Id: <20220427071100.3844081-1-xu.xin16@zte.com.cn> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.7 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: xu xin In __kfence_free(), the returned 'meta' from addr_to_metadata() might be NULL just as the implementation of addr_to_metadata() shows. Let's add a check of the pointer 'meta' to avoid NULL pointer dereference. The patch brings three changes: 1. Add checks in both kfence_free() and __kfence_free(); 2. kfence_free is not inline function any longer and new inline function '__try_free_kfence_meta' is introduced. 3. The check of is_kfence_address() is not required for __kfence_free() now because __kfence_free has done the check in addr_to_metadata(); Reported-by: Zeal Robot Signed-off-by: xu xin --- include/linux/kfence.h | 10 ++-------- mm/kfence/core.c | 30 +++++++++++++++++++++++++++--- 2 files changed, 29 insertions(+), 11 deletions(-) diff --git a/include/linux/kfence.h b/include/linux/kfence.h index 726857a4b680..fbf6391ab53c 100644 --- a/include/linux/kfence.h +++ b/include/linux/kfence.h @@ -160,7 +160,7 @@ void *kfence_object_start(const void *addr); * __kfence_free() - release a KFENCE heap object to KFENCE pool * @addr: object to be freed * - * Requires: is_kfence_address(addr) + * Requires: is_kfence_address(addr), but now it's unnecessary * * Release a KFENCE object and mark it as freed. */ @@ -179,13 +179,7 @@ void __kfence_free(void *addr); * allocator's free codepath. The allocator must check the return value to * determine if it was a KFENCE object or not. */ -static __always_inline __must_check bool kfence_free(void *addr) -{ - if (!is_kfence_address(addr)) - return false; - __kfence_free(addr); - return true; -} +bool __must_check kfence_free(void *addr); /** * kfence_handle_page_fault() - perform page fault handling for KFENCE pages diff --git a/mm/kfence/core.c b/mm/kfence/core.c index 6e69986c3f0d..1405585369b3 100644 --- a/mm/kfence/core.c +++ b/mm/kfence/core.c @@ -1048,10 +1048,10 @@ void *kfence_object_start(const void *addr) return meta ? (void *)meta->addr : NULL; } -void __kfence_free(void *addr) -{ - struct kfence_metadata *meta = addr_to_metadata((unsigned long)addr); +/* Require: meta is not NULL*/ +static __always_inline void __try_free_kfence_meta(struct kfence_metadata *meta) +{ #ifdef CONFIG_MEMCG KFENCE_WARN_ON(meta->objcg); #endif @@ -1067,6 +1067,30 @@ void __kfence_free(void *addr) kfence_guarded_free(addr, meta, false); } +void __kfence_free(void *addr) +{ + struct kfence_metadata *meta = addr_to_metadata((unsigned long)addr); + + if (!meta) { + kfence_report_error(addr, false, NULL, NULL, KFENCE_ERROR_INVALID); + return; + } + + __try_free_kfence_meta(meta); +} + +bool __must_check kfence_free(void *addr) +{ + struct kfence_metadata *meta = addr_to_metadata((unsigned long)addr); + + if (!meta) + return false; + + __try_free_kfence_meta(meta); + + return true; +} + bool kfence_handle_page_fault(unsigned long addr, bool is_write, struct pt_regs *regs) { const int page_index = (addr - (unsigned long)__kfence_pool) / PAGE_SIZE; -- 2.25.1