lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Mon, 8 May 2017 12:15:11 -0700
From:   Kees Cook <keescook@...omium.org>
To:     Laura Abbott <labbott@...hat.com>
Cc:     "x86@...nel.org" <x86@...nel.org>, LKP <lkp@...org>,
        kernel test robot <fengguang.wu@...el.com>,
        LKML <linux-kernel@...r.kernel.org>,
        Linux-MM <linux-mm@...ck.org>, wfg@...ux.intel.com
Subject: Re: [mm/usercopy] 517e1fbeb6: kernel BUG at arch/x86/mm/physaddr.c:78!

On Mon, May 8, 2017 at 11:41 AM, Laura Abbott <labbott@...hat.com> wrote:
> On 05/07/2017 07:51 AM, Kees Cook wrote:
>> On Sun, May 7, 2017 at 2:06 AM, kernel test robot
>> <fengguang.wu@...el.com> wrote:
>>> Greetings,
>>>
>>> 0day kernel testing robot got the below dmesg and the first bad commit is
>>>
>>> https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
>>>
>>> commit 517e1fbeb65f5eade8d14f46ac365db6c75aea9b
>>> Author:     Laura Abbott <labbott@...hat.com>
>>> AuthorDate: Tue Apr 4 14:09:00 2017 -0700
>>> Commit:     Kees Cook <keescook@...omium.org>
>>> CommitDate: Wed Apr 5 12:30:18 2017 -0700
>>>
>>>     mm/usercopy: Drop extra is_vmalloc_or_module() check
>>>
>>>     Previously virt_addr_valid() was insufficient to validate if virt_to_page()
>>>     could be called on an address on arm64. This has since been fixed up so
>>>     there is no need for the extra check. Drop it.
>>>
>>>     Signed-off-by: Laura Abbott <labbott@...hat.com>
>>>     Acked-by: Mark Rutland <mark.rutland@....com>
>>>     Signed-off-by: Kees Cook <keescook@...omium.org>
>>
>> This appears to be from CONFIG_DEBUG_VIRTUAL on __phys_addr, used by
>> hardened usercopy, probably during virt_addr_valid(). I'll take a
>> closer look on Monday...
>>
>> -Kees
>>
>
> So this looks like a strange edge case/bug on x86 32-bit.
> virt_addr_valid is returning true on vmalloc addresses because
> __vmalloc_start_set is never getting set because the below
> configuration uses CONFIG_NEED_MULTIPLE_NODES=y and that variable
> only gets set with CONFIG_NEED_MULTIPLE_NODES=n currently. If
> I set it in arch/x86/mm/numa_32.c, it seems to work:
>
> Thanks,
> Laura
>
>
> diff --git a/arch/x86/mm/numa_32.c b/arch/x86/mm/numa_32.c
> index 6b7ce62..aca6295 100644
> --- a/arch/x86/mm/numa_32.c
> +++ b/arch/x86/mm/numa_32.c
> @@ -100,5 +100,6 @@ void __init initmem_init(void)
>         printk(KERN_DEBUG "High memory starts at vaddr %08lx\n",
>                         (ulong) pfn_to_kaddr(highstart_pfn));
>
> +       __vmalloc_start_set = true;
>         setup_bootmem_allocator();
>  }

Ah, nice catch. Can you send this as a normal patch for Ingo to apply?

-Kees

-- 
Kees Cook
Pixel Security

Powered by blists - more mailing lists