Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp162385rwb; Wed, 14 Dec 2022 15:30:21 -0800 (PST) X-Google-Smtp-Source: AA0mqf5cvjhx16hS/IuYOGiIXA+tPA5Il3ZrnmWAPaAmZ+lKNyjvpXU1ZlGWE8/kMAe3ZPtnonKH X-Received: by 2002:a17:906:4d8f:b0:7c0:e535:13fc with SMTP id s15-20020a1709064d8f00b007c0e53513fcmr28787825eju.37.1671060621058; Wed, 14 Dec 2022 15:30:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1671060621; cv=none; d=google.com; s=arc-20160816; b=wvUOURCuHInexIw9xv6oFV/PmkT6vAn+nqMDP3K27wTD6KjOlAjF/E0QAQJTTrp80n +ZIUkPoTvBefi/6L0NSl8b9d0Kzou0cz1x/yKL1e2cQEA4GeyLD0Qs6UJN8sMFxC2iVt cmwyxlnTDfjJohE0/9zN83436ziwLNxlZN4vVc4YzyDKd3wrjDQkJpA2yYPrkIIT2lGm V25evbhyBPKktbvLurTyhw2Hz8nCRSSHjveYjSW2pN2sbfIyFFgxq/97w8youRn7nJns MOzCMp2bJnL+XjXx9NHk30Heuhv7FiLKB60MKQLLUY4C0KR8ZV3jGWEudo6fr7eji2ut nGfA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :content-language:references:cc:to:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=C4PlJ3Sy7zWtp1PRUv3TzmsgmH1qPuEi2ojtvvgE5Ao=; b=UMGloWuBpBfilpTdu9WvYkP7vZB+y8Bs9iokgCx5OPIaNbeQl7L58sc+T8JGRVDCWR /KF+9qadjiWbedOrIx+NA/PFn4JEsnEpBigroh3zIpjsTzlxxIj7B1TpAthHZcxhuOzV +Ufvqd9dyD6cklE+eSTSxIbgEEf6jdHLQdJHlMNFqdONQDvWnk2xKGZIogpHxXFl7+pr 7Gapsv+TWIFzJrkIPngBKFgsXlbeEGOrTqxNGHC+RnIQAWJzEVrbwt7G7kZWNRvwsLwg NJe2Krds4XkN6x4kY8OHbDxz6YIaqwINATJSYavo+YTbQBD4KFZ4tfT+6MsAcMQ6yrBV 1Wag== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=bombadil.20210309 header.b=OrKgF8eN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id qf36-20020a1709077f2400b007c0abf0760fsi13539897ejc.54.2022.12.14.15.29.46; Wed, 14 Dec 2022 15:30:21 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=bombadil.20210309 header.b=OrKgF8eN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229757AbiLNXQb (ORCPT + 70 others); Wed, 14 Dec 2022 18:16:31 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48196 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229511AbiLNXQ2 (ORCPT ); Wed, 14 Dec 2022 18:16:28 -0500 Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:3::133]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 853702CC9B; Wed, 14 Dec 2022 15:16:26 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding: Content-Type:In-Reply-To:From:References:Cc:To:Subject:MIME-Version:Date: Message-ID:Sender:Reply-To:Content-ID:Content-Description; bh=C4PlJ3Sy7zWtp1PRUv3TzmsgmH1qPuEi2ojtvvgE5Ao=; b=OrKgF8eNHEWDfiaSD2I6V6hj+H BP/ZjuxCLXtd6cJzTazwX/1XnUHqYEV+bisGpK5c3q+6znFwNPIbbGsx/bjfKzhzqwEFhHVD8Q1wT FsYWWJk5kU7zzVb21/+wrwwNgfiXQpEcKf60UWbYde1BJO3bsPglEG3niZLM+5zGjryzkj4JrU0Mm JNYQYxzHWUcGKIqvgWjap/XA/UtFdSyZ+nU+hvPe7+Fi5AZCj01Bbhg2BqfbsYKyE1jY+CRePZC2i sX8aqTk5/A9SCv9j6ihrvVzpaCibkvszVQH/HklNsIsFR0LiRRKNMfJNqUkGWd6STIrK+Z+8cf4/a cLBPkwtA==; Received: from [2601:1c2:d80:3110::a2e7] by bombadil.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux)) id 1p5az9-004BzT-MS; Wed, 14 Dec 2022 23:16:23 +0000 Message-ID: <7a2bbeed-59c2-024f-4778-3f4db3d7beaa@infradead.org> Date: Wed, 14 Dec 2022 15:16:22 -0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.5.1 Subject: Re: [RFC PATCH] mm/mempolicy: Fix memory leak in set_mempolicy_home_node system call To: Mathieu Desnoyers , Andrew Morton Cc: linux-kernel@vger.kernel.org, "Aneesh Kumar K . V" , Ben Widawsky , Dave Hansen , Feng Tang , Michal Hocko , Andrea Arcangeli , Mel Gorman , Mike Kravetz , Vlastimil Babka , Andi Kleen , Dan Williams , Huang Ying , linux-api@vger.kernel.org, stable@vger.kernel.org References: <20221214222110.200487-1-mathieu.desnoyers@efficios.com> Content-Language: en-US From: Randy Dunlap In-Reply-To: <20221214222110.200487-1-mathieu.desnoyers@efficios.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12/14/22 14:21, Mathieu Desnoyers wrote: > When encountering any vma in the range with policy other than MPOL_BIND > or MPOL_PREFERRED_MANY, an error is returned without issuing a mpol_put > on the policy just allocated with mpol_dup(). > > This allows arbitrary users to leak kernel memory. > > Fixes: c6018b4b2549 ("mm/mempolicy: add set_mempolicy_home_node syscall") > Signed-off-by: Mathieu Desnoyers > Cc: Aneesh Kumar K.V > Cc: Ben Widawsky > Cc: Dave Hansen > Cc: Feng Tang > Cc: Michal Hocko > Cc: Andrea Arcangeli > Cc: Mel Gorman > Cc: Mike Kravetz > Cc: Randy Dunlap > Cc: Vlastimil Babka > Cc: Andi Kleen > Cc: Dan Williams > Cc: Huang Ying > Cc: > Cc: Andrew Morton > Cc: stable@vger.kernel.org # 5.17+ Reviewed-by: Randy Dunlap Thanks. > --- > mm/mempolicy.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/mm/mempolicy.c b/mm/mempolicy.c > index 61aa9aedb728..02c8a712282f 100644 > --- a/mm/mempolicy.c > +++ b/mm/mempolicy.c > @@ -1540,6 +1540,7 @@ SYSCALL_DEFINE4(set_mempolicy_home_node, unsigned long, start, unsigned long, le > * the home node for vmas we already updated before. > */ > if (new->mode != MPOL_BIND && new->mode != MPOL_PREFERRED_MANY) { > + mpol_put(new); > err = -EOPNOTSUPP; > break; > } -- ~Randy