Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp1830283rwb; Tue, 27 Sep 2022 20:08:29 -0700 (PDT) X-Google-Smtp-Source: AMsMyM56H2++cTzVZGKrzdJocIRIWJI0F5pfywcdC4Ya6uDm11MYvEOstqfI716P//i5BMakvhsU X-Received: by 2002:a62:1e83:0:b0:545:6896:188 with SMTP id e125-20020a621e83000000b0054568960188mr31904155pfe.51.1664334509634; Tue, 27 Sep 2022 20:08:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1664334509; cv=none; d=google.com; s=arc-20160816; b=VlXJoNTC6rrnaIiKvv4/n8ad/SzyW0xNtvmtXlwCQrBwgi6ocKpR4RMilGfyvhZFCA t3QbvQ8Tt+DfWAhtDHaggvq97T3Rb1/5IkMYVFjiRr25Ng499jXx/MAgbC5mXkZL+F0A lWPNKDRhmGewMkzhOgbPrqGs8NVQGe1odW+CPfCH+UhJ4CnUmhRUzglDP2mMek7q61eq ZLnhQvny1gbSYDRnH9JWDbhxIIYcrnkeBnpq0uRUjXRA84pjoUXHXTS6ga7mdbrBgVYH 8MsufQb4DCZCCObZDbmL0MBoAdRbPoxTe7TCgIgzm8leyDBiNm3/7Nf4xcvVM2c0s/B2 pV9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=zekAfieWPgmea/AiVYND9DfsBqXhQTQmbFDx5CQVP3w=; b=BqzqanzpTuHTKcDxxvD6XG490FCIqJFCDoPu/3x6FFazJBqsxmbQugFDaabx8l74/4 EIdLMOrtxzcK2O3+S0osS/p6SQJCsVWwifnZLkloE8rVCGxSVCIB+Mjdv9YGo/2EBvzF U9CzwAe+qUuSsUerdfqeFie6yS5BLhh3o2sg3m7spwngcAJxeRmTnUI0YrLpY4KiTdfC LuVlhI1d9OMiv0/+2w2YouXPoYE9OzWbEaqqM1zWhui1USBoEa/bKApSbfOPKVCE2Ln6 zlV1JNC2O5uWJ+J1MOFu475hCfwpIFasmp6H4yem3AzbcIgPLglDeuNGrxnkPVmyAK9p nRtA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@163.com header.s=s110527 header.b=XRdlKWbS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=163.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id a14-20020a170902b58e00b001767c1aca52si3265425pls.462.2022.09.27.20.08.18; Tue, 27 Sep 2022 20:08:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@163.com header.s=s110527 header.b=XRdlKWbS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=163.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231428AbiI1DAm (ORCPT + 99 others); Tue, 27 Sep 2022 23:00:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43230 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229630AbiI1DAk (ORCPT ); Tue, 27 Sep 2022 23:00:40 -0400 Received: from mail-m974.mail.163.com (mail-m974.mail.163.com [123.126.97.4]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 9664014FE20 for ; Tue, 27 Sep 2022 20:00:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=163.com; s=s110527; h=From:Subject:Date:Message-Id:MIME-Version; bh=zekAf ieWPgmea/AiVYND9DfsBqXhQTQmbFDx5CQVP3w=; b=XRdlKWbSA3yVWvyJsIDRN FHgXyH2SUbbYp3axTvZ0k+97sqEJfnZvdp8AZG7TtYKm38K+Get+wunuMXPLa4C3 71ChWgv/jR+/gYFkAsb7QzBAS2T3dEPTsTI0hXC4ZBawm34rsoRYtYX4YBsI4yFb tcRFTpzxEGwAl/M3bhhYcM= Received: from leanderwang-LC2.localdomain (unknown [111.206.145.21]) by smtp4 (Coremail) with SMTP id HNxpCgCnS+uwuDNjJdmXgQ--.48998S2; Wed, 28 Sep 2022 11:00:01 +0800 (CST) From: Zheng Wang To: gregkh@linuxfoundation.org Cc: dimitri.sivanich@hpe.com, arnd@arndb.de, linux-kernel@vger.kernel.org, hackerzheng666@gmail.com, alex000young@gmail.com, security@kernel.org, Zheng Wang Subject: [PATCH] misc: sgi-gru: fix use after free bugs in gru_set_context_option, gru_fault and gru_handle_user_call_os Date: Wed, 28 Sep 2022 10:59:57 +0800 Message-Id: <20220928025957.1050698-1-zyytlz.wz@163.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-CM-TRANSID: HNxpCgCnS+uwuDNjJdmXgQ--.48998S2 X-Coremail-Antispam: 1Uf129KBjvJXoWxGr4xtF4UKw1fZr4DuFyfWFg_yoWrZr1Dpa 12g348ArW3XF4rurs7ta1kWFW3Ca48JFW5Gr9rtwnY9w4FyFs8GryDJas0qr4DurW0qr4a yF4rtFnI9an0gaUanT9S1TB71UUUUUUqnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDUYxBIdaVFxhVjvjDU0xZFpf9x0ziaiiDUUUUU= X-Originating-IP: [111.206.145.21] X-CM-SenderInfo: h2113zf2oz6qqrwthudrp/1tbiXBGKU1Xl4T+VYgAAsN X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Gts may be freed in gru_check_chiplet_assignment. The caller still use it after that, UAF happens. Fix it by introducing a return value to see if it's in error path or not. Free the gts in caller if gru_check_chiplet_assignment check failed. Fixes: 55484c45dbec ("gru: allow users to specify gru chiplet 2") Reported-by: Zheng Wang Signed-off-by: Zheng Wang --- drivers/misc/sgi-gru/grufault.c | 14 ++++++++++++-- drivers/misc/sgi-gru/grumain.c | 17 +++++++++++++---- drivers/misc/sgi-gru/grutables.h | 2 +- 3 files changed, 26 insertions(+), 7 deletions(-) diff --git a/drivers/misc/sgi-gru/grufault.c b/drivers/misc/sgi-gru/grufault.c index d7ef61e602ed..2b5b049fbd38 100644 --- a/drivers/misc/sgi-gru/grufault.c +++ b/drivers/misc/sgi-gru/grufault.c @@ -656,7 +656,9 @@ int gru_handle_user_call_os(unsigned long cb) if (ucbnum >= gts->ts_cbr_au_count * GRU_CBR_AU_SIZE) goto exit; - gru_check_context_placement(gts); + ret = gru_check_context_placement(gts); + if (ret) + goto err; /* * CCH may contain stale data if ts_force_cch_reload is set. @@ -677,6 +679,10 @@ int gru_handle_user_call_os(unsigned long cb) exit: gru_unlock_gts(gts); return ret; +err: + gru_unlock_gts(gts); + gru_unload_context(gts, 1); + return -EINVAL; } /* @@ -874,7 +880,7 @@ int gru_set_context_option(unsigned long arg) } else { gts->ts_user_blade_id = req.val1; gts->ts_user_chiplet_id = req.val0; - gru_check_context_placement(gts); + ret = gru_check_context_placement(gts); } break; case sco_gseg_owner: @@ -889,6 +895,10 @@ int gru_set_context_option(unsigned long arg) ret = -EINVAL; } gru_unlock_gts(gts); + if (ret) { + gru_unload_context(gts, 1); + ret = -EINVAL; + } return ret; } diff --git a/drivers/misc/sgi-gru/grumain.c b/drivers/misc/sgi-gru/grumain.c index 9afda47efbf2..79903cf7e706 100644 --- a/drivers/misc/sgi-gru/grumain.c +++ b/drivers/misc/sgi-gru/grumain.c @@ -716,9 +716,10 @@ static int gru_check_chiplet_assignment(struct gru_state *gru, * chiplet. Misassignment can occur if the process migrates to a different * blade or if the user changes the selected blade/chiplet. */ -void gru_check_context_placement(struct gru_thread_state *gts) +int gru_check_context_placement(struct gru_thread_state *gts) { struct gru_state *gru; + int ret = 0; /* * If the current task is the context owner, verify that the @@ -727,14 +728,16 @@ void gru_check_context_placement(struct gru_thread_state *gts) */ gru = gts->ts_gru; if (!gru || gts->ts_tgid_owner != current->tgid) - return; + return ret; if (!gru_check_chiplet_assignment(gru, gts)) { STAT(check_context_unload); - gru_unload_context(gts, 1); + ret = -EINVAL; } else if (gru_retarget_intr(gts)) { STAT(check_context_retarget_intr); } + + return ret; } @@ -919,6 +922,7 @@ vm_fault_t gru_fault(struct vm_fault *vmf) struct gru_thread_state *gts; unsigned long paddr, vaddr; unsigned long expires; + int ret; vaddr = vmf->address; gru_dbg(grudev, "vma %p, vaddr 0x%lx (0x%lx)\n", @@ -934,7 +938,12 @@ vm_fault_t gru_fault(struct vm_fault *vmf) mutex_lock(>s->ts_ctxlock); preempt_disable(); - gru_check_context_placement(gts); + ret = gru_check_context_placement(gts); + if (ret) { + mutex_unlock(>s->ts_ctxlock); + gru_unload_context(gts, 1); + return ret; + } if (!gts->ts_gru) { STAT(load_user_context); diff --git a/drivers/misc/sgi-gru/grutables.h b/drivers/misc/sgi-gru/grutables.h index 5efc869fe59a..f4a5a787685f 100644 --- a/drivers/misc/sgi-gru/grutables.h +++ b/drivers/misc/sgi-gru/grutables.h @@ -632,7 +632,7 @@ extern int gru_user_flush_tlb(unsigned long arg); extern int gru_user_unload_context(unsigned long arg); extern int gru_get_exception_detail(unsigned long arg); extern int gru_set_context_option(unsigned long address); -extern void gru_check_context_placement(struct gru_thread_state *gts); +extern int gru_check_context_placement(struct gru_thread_state *gts); extern int gru_cpu_fault_map_id(void); extern struct vm_area_struct *gru_find_vma(unsigned long vaddr); extern void gru_flush_all_tlb(struct gru_state *gru); -- 2.25.1