Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp6576786rwb; Mon, 12 Dec 2022 03:56:52 -0800 (PST) X-Google-Smtp-Source: AA0mqf5wUOaHw8YQOWF756tQi2iKMS0ydBKxJfZApXzcPvV5r7spnAMV1OHr8wfKZY2Ol8lNSa9r X-Received: by 2002:a17:906:814d:b0:7c0:9b4a:76a with SMTP id z13-20020a170906814d00b007c09b4a076amr13747069ejw.28.1670846212292; Mon, 12 Dec 2022 03:56:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670846212; cv=none; d=google.com; s=arc-20160816; b=uEyhV114Y/+fRSwLSLVTm5Jxi3icFeZ5TVjxMxD0HhDJ01JsxdFnViaYWpULBOAWJK LspU3/M/OSdCwXBuZ7CYdJrI5/SJznsyJxahxxJ2yYJRdOqdbUBcTXXs2VG/q8uZGhK+ b7CR0cWRNmS+Mfd599QAXShGh5NVYN/iH6e8K87ieNMdO86KU/4rhWr3m9IR9esFKLL7 HDkbDUAhz8MOCfdCa4Y4GfTgoFL7/mOUz8elI3Fzvdxl96HXk3ZNKXve9ioxRvxZhaHs GWLfVgoW4EcvPYlMXLE3VWQpwxRQiKG2aw6noUpJNlE9V+rCtG5bxm4r0RczLIQhzVrj FjKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:in-reply-to:date:subject :cc:to:from:user-agent:references:dkim-signature; bh=06SKk3+Ze86qUIQMQYOS544icdjYuuKxQBSYDhiuvtQ=; b=i5ZalbzWfse1w6LBkE8fWl5NAQ3ymaEfUu74cH4R8QtGTjbMZXKCfTsG+n+jgMyq26 SQGXLynNNb/0DmMa0vLZ4Nl+gyWDChWAQuo3hhmwWkrR8X5mL81B/iyOCRrqEhnMUk+n TQlvHfedkf99HPgSiJ0JC3kTPdlT4ktOlyH3wqL4Y/vfD8V7/RqCLLPjSF0TpHaNmFmK svhzov+nS49fLwAkieFOvJI4VCX7O1l+7KJ43TqkKm1BsSMA+lXhInPck7hRxOvgXB2n ANHIDiJHyCjb2M8C/LruJjRgPeDY4dxS4FxkXcf+9y13ldOnQ43dxg4w7h08hgs+5nSA 7Kbw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b="gA8s/mVH"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id mp36-20020a1709071b2400b007c0b9466effsi6376780ejc.656.2022.12.12.03.56.34; Mon, 12 Dec 2022 03:56:52 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b="gA8s/mVH"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231882AbiLLLe7 (ORCPT + 75 others); Mon, 12 Dec 2022 06:34:59 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43062 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232081AbiLLLc4 (ORCPT ); Mon, 12 Dec 2022 06:32:56 -0500 Received: from mail-qt1-x82e.google.com (mail-qt1-x82e.google.com [IPv6:2607:f8b0:4864:20::82e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C42C963FC for ; Mon, 12 Dec 2022 03:31:59 -0800 (PST) Received: by mail-qt1-x82e.google.com with SMTP id c7so1123229qtw.8 for ; Mon, 12 Dec 2022 03:31:59 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:message-id:in-reply-to:date:subject:cc:to:from :user-agent:references:from:to:cc:subject:date:message-id:reply-to; bh=06SKk3+Ze86qUIQMQYOS544icdjYuuKxQBSYDhiuvtQ=; b=gA8s/mVH5bAQ+8OyUd2TRqibki/tYQvHDdM9WtPLZwkWOKi+HgQlMcCthHBVeIuHyt 9z7PVHiVcmINs0ZU7SHj22QmA5hr6WjbIVPTrLvoxJjLRebJXE1ARa19r5LXH7te7HzP 4uLi7LS43CBvcU4j8+oZeDA2oKoLmfVaAEirbId7A/0DNoHamSXJ16gcYjuGeSbzgKdn fQQbQEpFzrJQPQNguMowb78OA6J+CB/JCmobR6Tlvo5EyJwExeDYroDrMerjw8ItU2Ss P/dnFUByTNCtxqkUVv65UOUDg+KsiAmUoH1GFtQOvaEuC/jpZVEySYlWFWL6/LbZOUiS iKDg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=mime-version:message-id:in-reply-to:date:subject:cc:to:from :user-agent:references:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=06SKk3+Ze86qUIQMQYOS544icdjYuuKxQBSYDhiuvtQ=; b=E3wAom5c2YaVVtnsiECVCDdxKvz63XUh2i/yLkNSGSrg/YNSzRrUSc024pSbkhs/NO Xp5/ozLUK8XaXSOsNdO0GzAEbMWE2FL7FTJ5Ipak8KWoLmB3J2NCZd5u2v9dRJ9DRKrv 7i1+TLO2j4CQemNHRytZXF48DitXQetqP9sY8/iJHX7MZhVQ4ay4z/TMlUIa7gZ3AnKA fakVPDL175CTioMCAqGUCzUNTJhRgDl/ymKaSLOKGilXMnGQX0QAJpStblVrQG04HVXP wzwYuFB06hqHjPJQs2l1RM8MzRkrmtIqhbjoeOCwHToPmAzNiBaDK2+HY7zRkbnBgSaY TCbA== X-Gm-Message-State: ANoB5plwvHtbjHV5M4kYhXAKigcRgZvMvCCkxxdRPWoZt1pHPGMpHjai UAH0QdjuNGvPiXMkqzDI+TI= X-Received: by 2002:a05:622a:1b92:b0:3a5:1dcb:d231 with SMTP id bp18-20020a05622a1b9200b003a51dcbd231mr29265394qtb.59.1670844718854; Mon, 12 Dec 2022 03:31:58 -0800 (PST) Received: from MBP ([68.74.118.125]) by smtp.gmail.com with ESMTPSA id d12-20020ac8118c000000b0039492d503cdsm5595104qtj.51.2022.12.12.03.31.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 12 Dec 2022 03:31:58 -0800 (PST) References: <20221115140233.21981-1-schspa@gmail.com> User-agent: mu4e 1.8.10; emacs 28.2 From: Schspa Shi To: Luis Chamberlain Cc: mingo@redhat.com, peterz@infradead.org, juri.lelli@redhat.com, vincent.guittot@linaro.org, dietmar.eggemann@arm.com, rostedt@goodmis.org, bsegall@google.com, mgorman@suse.de, bristot@redhat.com, vschneid@redhat.com, linux-kernel@vger.kernel.org, syzbot+10d19d528d9755d9af22@syzkaller.appspotmail.com, syzbot+70d5d5d83d03db2c813d@syzkaller.appspotmail.com, syzbot+83cb0411d0fcf0a30fc1@syzkaller.appspotmail.com Subject: Re: [PATCH] umh: fix UAF when the process is being killed Date: Mon, 12 Dec 2022 19:04:29 +0800 In-reply-to: Message-ID: MIME-Version: 1.0 Content-Type: text/plain X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Luis Chamberlain writes: > On Mon, Dec 05, 2022 at 07:38:21PM +0800, Schspa Shi wrote: >> >> Schspa Shi writes: >> >> > When the process is killed, wait_for_completion_state will return with >> > -ERESTARTSYS, and the completion variable in the stack will be freed. > > There is no free'ing here, it's just not availabel anymore, which is > different. > No, the whole thread stack will be freed when the process died. There will be some cases where it will be released. It will be more accurate to modify it to be unavailable. >> > If the user-mode thread is complete at the same time, there will be a UAF. >> > >> > Please refer to the following scenarios. >> > T1 T2 >> > ------------------------------------------------------------------ >> > call_usermodehelper_exec >> > call_usermodehelper_exec_async >> > << do something >> >> > umh_complete(sub_info); >> > comp = xchg(&sub_info->complete, NULL); >> > /* we got the completion */ >> > << context switch >> The sub_info->complete will be set to NULL. >> > >> > << Being killed >> >> > retval = wait_for_completion_state(sub_info->complete, state); >> > if (!retval) >> > goto wait_done; >> > >> > if (wait & UMH_KILLABLE) { >> > /* umh_complete() will see NULL and free sub_info */ >> > if (xchg(&sub_info->complete, NULL)) >> > goto unlock; >> > << we can't got the completion >> > > I'm sorry I don't understand what you tried to say here, we can't got? > In this scenario, the sub_info->complete will be NULL, at the call_usermodehelper_exec_async, and we will go to the unlock branch here. >> > } >> > .... >> > unlock: >> > helper_unlock(); >> > return retval; >> > } >> > >> > /** >> > * the completion variable in stack is end of life cycle. >> > * and maybe freed due to process is recycled. >> > */ >> > --------UAF here---------- >> > if (comp) >> > complete(comp); >> > >> > To fix it, we can put the completion variable in the subprocess_info >> > variable. >> > >> > Reported-by: syzbot+10d19d528d9755d9af22@syzkaller.appspotmail.com >> > Reported-by: syzbot+70d5d5d83d03db2c813d@syzkaller.appspotmail.com >> > Reported-by: syzbot+83cb0411d0fcf0a30fc1@syzkaller.appspotmail.com >> > >> > Signed-off-by: Schspa Shi >> > --- >> > include/linux/umh.h | 1 + >> > kernel/umh.c | 6 +++--- >> > 2 files changed, 4 insertions(+), 3 deletions(-) >> > >> > diff --git a/include/linux/umh.h b/include/linux/umh.h >> > index 5d1f6129b847..801f7efbc825 100644 >> > --- a/include/linux/umh.h >> > +++ b/include/linux/umh.h >> > @@ -20,6 +20,7 @@ struct file; >> > struct subprocess_info { >> > struct work_struct work; >> > struct completion *complete; >> > + struct completion done; >> > const char *path; >> > char **argv; >> > char **envp; >> > diff --git a/kernel/umh.c b/kernel/umh.c >> > index 850631518665..3ed39956c777 100644 >> > --- a/kernel/umh.c >> > +++ b/kernel/umh.c >> > @@ -380,6 +380,7 @@ struct subprocess_info *call_usermodehelper_setup(const char *path, char **argv, >> > sub_info->cleanup = cleanup; >> > sub_info->init = init; >> > sub_info->data = data; >> > + init_completion(&sub_info->done); >> > out: >> > return sub_info; >> > } >> > @@ -405,7 +406,6 @@ EXPORT_SYMBOL(call_usermodehelper_setup); >> > int call_usermodehelper_exec(struct subprocess_info *sub_info, int wait) >> > { >> > unsigned int state = TASK_UNINTERRUPTIBLE; >> > - DECLARE_COMPLETION_ONSTACK(done); >> > int retval = 0; >> > >> > if (!sub_info->path) { >> > @@ -431,7 +431,7 @@ int call_usermodehelper_exec(struct subprocess_info *sub_info, int wait) >> > * This makes it possible to use umh_complete to free >> > * the data structure in case of UMH_NO_WAIT. >> > */ >> > - sub_info->complete = (wait == UMH_NO_WAIT) ? NULL : &done; >> > + sub_info->complete = (wait == UMH_NO_WAIT) ? NULL : &sub_info->done; >> > sub_info->wait = wait; >> > >> > queue_work(system_unbound_wq, &sub_info->work); >> > @@ -444,7 +444,7 @@ int call_usermodehelper_exec(struct subprocess_info *sub_info, int wait) >> > if (wait & UMH_FREEZABLE) >> > state |= TASK_FREEZABLE; >> > >> > - retval = wait_for_completion_state(&done, state); >> > + retval = wait_for_completion_state(sub_info->complete, state); >> > if (!retval) >> > goto wait_done; >> >> Hi Luis Chamberlain: >> >> Could you help to review this patch? I'm not sure why we define the >> amount of completion here on the stack. But this UAF can be fixed by >> moving the completion variable to the heap. > > It would seem to me that if this is an issue other areas would have > similar races as well, so I was hard pressed about the approach / fix. > I think other modules will have similar bugs, but this is a limitation on the use of the DECLARE_COMPLETION_ONSTACK macro, and it has been specifically stated in the completion's documentation. There is the description from completion's documentation: Note that when using completion objects as local variables you must be acutely aware of the short life time of the function stack: the function must not return to a calling context until all activities (such as waiting threads) have ceased and the completion object is completely unused. > Wouldn't something like this be a bit more explicit about ensuring > we don't let the work item race beyond? > > diff --git a/kernel/umh.c b/kernel/umh.c > index 850631518665..55fc698115a7 100644 > --- a/kernel/umh.c > +++ b/kernel/umh.c > @@ -447,6 +447,8 @@ int call_usermodehelper_exec(struct subprocess_info *sub_info, int wait) > retval = wait_for_completion_state(&done, state); > if (!retval) > goto wait_done; > + else if (retval == -ERESTARTSYS) > + cancel_work_sync(&sub_info->work); > I think this modification will make UMH_KILLABLE useless, we have to wait for this task to complete, even if it is killed. > if (wait & UMH_KILLABLE) { > /* umh_complete() will see NULL and free sub_info */ -- BRs Schspa Shi