All the mail mirrored from lore.kernel.org
 help / color / mirror / Atom feed
* Potential null pointer dereference in remap_vmalloc_range_partial()
@ 2020-05-03  6:03 Dongyang Zhan
  2020-05-06 16:57 ` Vlastimil Babka
  0 siblings, 1 reply; 2+ messages in thread
From: Dongyang Zhan @ 2020-05-03  6:03 UTC (permalink / raw
  To: linux-mm

[-- Attachment #1: Type: text/plain, Size: 1660 bytes --]

Hi,

I am a security researcher. I found a potential bug in /mm/sparse.c. I
hope you can help me to confirm it.

In Linux 4.10.17, remap_vmalloc_range_partial() in /mm/vmalloc.c does
not check the validation of allocated memory 'page', which may cause a
null pointer dereference bug.

int remap_vmalloc_range_partial(struct vm_area_struct *vma, unsigned long uaddr,
				void *kaddr, unsigned long size)
{
...
                struct page *page = vmalloc_to_page(kaddr); //page is
possible to be null
		int ret;

		ret = vm_insert_page(vma, uaddr, page); //null pointer dereference of page
		if (ret)
			return ret;
...
}
Let us see vmalloc_to_page(kaddr) in /mm/vmalloc.c
struct page *vmalloc_to_page(const void *vmalloc_addr)
{
	unsigned long addr = (unsigned long) vmalloc_addr;
	struct page *page = NULL;
	pgd_t *pgd = pgd_offset_k(addr);

	/*
	 * XXX we might need to change this if we add VIRTUAL_BUG_ON for
	 * architectures that do not vmalloc module space
	 */
	VIRTUAL_BUG_ON(!is_vmalloc_or_module_addr(vmalloc_addr));

	if (!pgd_none(*pgd)) {
		...
	}
	return page;
}
We can find that page is possible to be NULL.
Then, we can see this function vm_insert_page(vma, uaddr, page) in /mm/memory.c.
int vm_insert_page(struct vm_area_struct *vma, unsigned long addr,
			struct page *page)
{
	if (addr < vma->vm_start || addr >= vma->vm_end)
		return -EFAULT;
	if (!page_count(page)) //this function can trigger the bug.
		return -EINVAL;
	...
}
page_count() can be found in /include/linux/page_ref.h.
static inline int page_count(struct page *page)
{
	return atomic_read(&compound_head(page)->_refcount);
}
Directly using the 'page' pointer is not secure.

[-- Attachment #2: Type: text/html, Size: 2398 bytes --]

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: Potential null pointer dereference in remap_vmalloc_range_partial()
  2020-05-03  6:03 Potential null pointer dereference in remap_vmalloc_range_partial() Dongyang Zhan
@ 2020-05-06 16:57 ` Vlastimil Babka
  0 siblings, 0 replies; 2+ messages in thread
From: Vlastimil Babka @ 2020-05-06 16:57 UTC (permalink / raw
  To: Dongyang Zhan, linux-mm

On 5/3/20 8:03 AM, Dongyang Zhan wrote:
> Hi,
> 
> I am a security researcher. I found a potential bug in /mm/sparse.c. I hope you can help me to confirm it.
> 
> In Linux 4.10.17,

In general, the upstream community prioritises recent kernels, 4.10 is rather
old. Bugs from older kernels should be verified if they still apply to most
recent version. If they don't, it's a matter of identifying the fixing commit
and sending it to stable.

> remap_vmalloc_range_partial() in /mm/vmalloc.c does not check the validation of allocated memory 'page', which may cause a null pointer dereference bug.
> 
> int remap_vmalloc_range_partial(struct vm_area_struct *vma, unsigned long uaddr,
> 				void *kaddr, unsigned long size)
> {
> ...
>                 struct page *page = vmalloc_to_page(kaddr); //page is possible to be null
> 		int ret;
> 
> 		ret = vm_insert_page(vma, uaddr, page); //null pointer dereference of page
> 		if (ret)
> 			return ret;
> ...
> }
> Let us see vmalloc_to_page(kaddr) in /mm/vmalloc.c
> struct page *vmalloc_to_page(const void *vmalloc_addr)
> {
> 	unsigned long addr = (unsigned long) vmalloc_addr;
> 	struct page *page = NULL;
> 	pgd_t *pgd = pgd_offset_k(addr);
> 
> 	/*
> 	 * XXX we might need to change this if we add VIRTUAL_BUG_ON for
> 	 * architectures that do not vmalloc module space
> 	 */
> 	VIRTUAL_BUG_ON(!is_vmalloc_or_module_addr(vmalloc_addr));
> 
> 	if (!pgd_none(*pgd)) {
> 		...
> 	}
> 	return page;
> }
> We can find that page is possible to be NULL.

Current version of vmalloc_to_page() is even more explicit:

        if (pgd_none(*pgd))
                return NULL;

> Then, we can see this function vm_insert_page(vma, uaddr, page) in /mm/memory.c.
> int vm_insert_page(struct vm_area_struct *vma, unsigned long addr,
> 			struct page *page)
> {
> 	if (addr < vma->vm_start || addr >= vma->vm_end)
> 		return -EFAULT;
> 	if (!page_count(page)) //this function can trigger the bug.
> 		return -EINVAL;
> 	...
> }
> page_count() can be found in /include/linux/page_ref.h.
> static inline int page_count(struct page *page)
> {
> 	return atomic_read(&compound_head(page)->_refcount);
> }
> Directly using the 'page' pointer is not secure.

This all assumes remap_vmalloc_range_partial() was called with kaddr that
doesn't have the page table hierarchy populated. You say 'validation of
allocated memory 'page'' but page is not being allocated, it's looked up from
page tables. If it was valid vmalloc region, the page tables should be populated
and there's no NULL. To show a bug, you would need to show how
remap_vmalloc_range_partial() can be called with kaddr that's not a proper
vmalloc allocation.

HTH,
Vlastimil



^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2020-05-06 16:57 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2020-05-03  6:03 Potential null pointer dereference in remap_vmalloc_range_partial() Dongyang Zhan
2020-05-06 16:57 ` Vlastimil Babka

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.