lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <1531782831-1186-1-git-send-email-mathieu.poirier@linaro.org>
Date:   Mon, 16 Jul 2018 17:13:51 -0600
From:   Mathieu Poirier <mathieu.poirier@...aro.org>
To:     songliubraving@...com, peterz@...radead.org, mingo@...hat.com,
        alexander.shishkin@...ux.intel.com, miklos@...redi.hu
Cc:     acme@...nel.org, jolsa@...hat.com, namhyung@...nel.org,
        linux-kernel@...r.kernel.org
Subject: [PATCH] perf/core: Fix crash when using HW tracing kernel filters

In function perf_event_parse_addr_filter(), the path::dentry of each struct
perf_addr_filter is left unassigned (as it should be) when the pattern
being parsed is related to kernel space.  But in function
perf_addr_filter_match() the same dentry'ies are given to d_inode() where
the value is not expected to be NULL, resulting in the following splat:

[   53.451557] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000058
[   53.460368] Mem abort info:
[   53.463134]   ESR = 0x96000004
[   53.466158]   Exception class = DABT (current EL), IL = 32 bits
[   53.472019]   SET = 0, FnV = 0
[   53.475042]   EA = 0, S1PTW = 0
[   53.478150] Data abort info:
[   53.481000]   ISV = 0, ISS = 0x00000004
[   53.484796]   CM = 0, WnR = 0
[   53.487734] user pgtable: 4k pages, 48-bit VAs, pgdp = 00000000f0644b81
[   53.494283] [0000000000000058] pgd=0000000000000000
[   53.499181] Internal error: Oops: 96000004 [#1] PREEMPT SMP
[   53.504697] Modules linked in:
[   53.507726] CPU: 2 PID: 2860 Comm: uname Not tainted 4.18.0-rc5-dirty #288
[   53.514531] Hardware name: ARM Juno development board (r0) (DT)
[   53.520392] pstate: 20000085 (nzCv daIf -PAN -UAO)
[   53.525141] pc : perf_event_mmap+0x2fc/0x5a0
[   53.529368] lr : perf_event_mmap+0x2c8/0x5a0
[   53.533593] sp : ffff000010883a10
[   53.536872] x29: ffff000010883a10 x28: ffff8009749126c0
[   53.542137] x27: 0000000000000000 x26: ffff800971221000
[   53.547401] x25: ffff80097678bef0 x24: ffff0000091cb000
[   53.552665] x23: ffff800971221430 x22: ffff80097100fe00
[   53.557930] x21: 0000000000001078 x20: ffff0000091af000
[   53.563194] x19: ffff800971221420 x18: 0000000000006451
[   53.568457] x17: 000000000000644f x16: ffff000009404790
[   53.573721] x15: ffff00000932c3b0 x14: 000000000000644e
[   53.578985] x13: 00000000ed3bb5ef x12: ffff8009711e1de8
[   53.584248] x11: 0000000000000000 x10: ffff0000091af808
[   53.589512] x9 : ffff0000091ea000 x8 : ffff0000091af808
[   53.594776] x7 : 0000000000000002 x6 : ffff8009740c7540
[   53.600040] x5 : 0000000000000000 x4 : 00000000000067e8
[   53.605303] x3 : 0000000000000000 x2 : ffff800971131800
[   53.610567] x1 : 0000000000000002 x0 : 0000000000000000
[   53.615832] Process uname (pid: 2860, stack limit = 0x000000001cbcca37)
[   53.622378] Call trace:
[   53.624798]  perf_event_mmap+0x2fc/0x5a0
[   53.628683]  mmap_region+0x124/0x570
[   53.632221]  do_mmap+0x344/0x4f8
[   53.635414]  vm_mmap_pgoff+0xe4/0x110
[   53.639037]  vm_mmap+0x2c/0x40
[   53.642061]  elf_map+0x60/0x108
[   53.645169]  load_elf_binary+0x450/0x12c4
[   53.649138]  search_binary_handler+0x90/0x290
[   53.653449]  __do_execve_file.isra.13+0x6e4/0x858
[   53.658104]  sys_execve+0x3c/0x50
[   53.661385]  el0_svc_naked+0x30/0x34
[   53.664924] Code: eb02027f 54000300 f9400c45 f94012c6 (f9402ca5)
[   53.670959] ---[ end trace 3ef799e7226990e4 ]---

This patch is fixing the problem by introducing a new check in function
perf_addr_filter_match() to see if the filter's dentry is NULL.

Fixes: 9511bce9fe8e ("perf/core: Fix bad use of igrab()")
Signed-off-by: Mathieu Poirier <mathieu.poirier@...aro.org>
---
 kernel/events/core.c | 4 ++++
 1 file changed, 4 insertions(+)

diff --git a/kernel/events/core.c b/kernel/events/core.c
index 8f0434a9951a..a56f10b1e13b 100644
--- a/kernel/events/core.c
+++ b/kernel/events/core.c
@@ -7335,6 +7335,10 @@ static bool perf_addr_filter_match(struct perf_addr_filter *filter,
 				     struct file *file, unsigned long offset,
 				     unsigned long size)
 {
+	/* d_inode(NULL) won't be equal to any mapped user space file */
+	if (!filter->path.dentry)
+		return false;
+
 	if (d_inode(filter->path.dentry) != file_inode(file))
 		return false;
 
-- 
2.7.4

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ