[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAJuCfpF3543giq6vHuBbmLuxjUYVxNub6PgTzu0M3Zfe0H2xGA@mail.gmail.com>
Date: Mon, 28 Jul 2025 10:55:11 -0700
From: Suren Baghdasaryan <surenb@...gle.com>
To: Vlastimil Babka <vbabka@...e.cz>
Cc: akpm@...ux-foundation.org, jannh@...gle.com, Liam.Howlett@...cle.com,
lorenzo.stoakes@...cle.com, pfalcato@...e.de, linux-mm@...ck.org,
linux-kernel@...r.kernel.org, stable@...r.kernel.org
Subject: Re: [PATCH 1/1] mm: fix a UAF when vma->mm is freed after
vma->vm_refcnt got dropped
On Mon, Jul 28, 2025 at 10:43 AM Suren Baghdasaryan <surenb@...gle.com> wrote:
>
> On Mon, Jul 28, 2025 at 10:39 AM Vlastimil Babka <vbabka@...e.cz> wrote:
> >
> > On 7/28/25 19:37, Suren Baghdasaryan wrote:
> > > On Mon, Jul 28, 2025 at 10:19 AM Vlastimil Babka <vbabka@...e.cz> wrote:
> > >> > + */
> > >> > + if (unlikely(vma->vm_mm != mm)) {
> > >> > + /*
> > >> > + * __mmdrop() is a heavy operation and we don't need RCU
> > >> > + * protection here. Release RCU lock during these operations.
> > >> > + */
> > >> > + rcu_read_unlock();
> > >> > + mmgrab(vma->vm_mm);
> > >> > + vma_refcount_put(vma);
> > >>
> > >> The vma can go away here.
> > >
> > > No, the vma can't go away here because we are holding vm_refcnt. So,
> > > the vma and its mm are stable up until vma_refcount_put() drops
> > > vm_refcnt.
> >
> > But that's exactly what we're doing here?
>
> Ah, you are right. At the time of mmdrop() call the vma is already
> unstable. Let me fix it by copying the mm like we do in
> vma_refcount_put().
Fixed in v2: https://lore.kernel.org/all/20250728175355.2282375-1-surenb@google.com/
Thanks!
>
> >
> > >>
> > >> > + mmdrop(vma->vm_mm);
> >
> > And here we reference the vma again?
> >
> > >> So we need to copy the vma->vm_mm first?
> > >>
> > >> > + rcu_read_lock();
> > >> > + return NULL;
> > >> > + }
> > >> > +
> > >> > /*
> > >> > * Overflow of vm_lock_seq/mm_lock_seq might produce false locked result.
> > >> > * False unlocked result is impossible because we modify and check
Powered by blists - more mailing lists