Re: [PATCH] Fix mm->owner point to a tsk that has been free

2018-12-18 Thread Matthew Wilcox
On Wed, Dec 19, 2018 at 12:21:27AM +0800, gchen chen wrote:
> Oh, yes, the patch 39af176 has been skip the kthread
> on mm_update_next_owner .

Actually f87fb599ae4


Re: [PATCH] Fix mm->owner point to a tsk that has been free

2018-12-18 Thread Michal Hocko
On Tue 18-12-18 13:24:44, gchen.guo...@gmail.com wrote:
> From: guomin chen 
> 
> When mm->owner is modified by exit_mm, if the new owner directly calls
> unuse_mm to exit, it will cause Use-After-Free. Due to the unuse_mm()
> directly sets tsk->mm=NULL.
> 
>  Under normal circumstances,When do_exit exits, mm->owner will
>  be updated on exit_mm(). but when the kernel process calls
>  unuse_mm() and then exits,mm->owner cannot be updated. And it
>  will point to a task that has been released.
> 
> The current issue flow is as follows: (Process A,B,C use the same mm)
> Process C  Process A Process B
> qemu-system-x86_64: kernel:vhost_net  kernel: vhost_net
> open /dev/vhost-net
>   VHOST_SET_OWNER   create kthread vhost-%d  create kthread vhost-%d
>   network init   use_mm()  use_mm()
>...   ...
>Abnormal exited
>...
>   do_exit
>   exit_mm()
>   update mm->owner to A
>   exit_files()
>close_files()
>kthread_should_stop() unuse_mm()
> Stop Process A   tsk->mm=NULL
>  do_exit()
>  can't update owner
>  A exit completed  vhost-%d  rcv first package
>vhost-%d build rcv buffer for vq
>page fault
>access mm & mm->owner
>NOW,mm->owner still pointer A
>kernel UAF
> stop Process B
> 
> Although I am having this issue on vhost_net,But it affects all users of
> unuse_mm.

I am confused. How can we ever assign the owner to a kernel thread. We
skip those explicitly. It simply doesn't make any sense to have an owner
a kernel thread.
-- 
Michal Hocko
SUSE Labs


[PATCH] Fix mm->owner point to a tsk that has been free

2018-12-17 Thread gchen . guomin
From: guomin chen 

When mm->owner is modified by exit_mm, if the new owner directly calls
unuse_mm to exit, it will cause Use-After-Free. Due to the unuse_mm()
directly sets tsk->mm=NULL.

 Under normal circumstances,When do_exit exits, mm->owner will
 be updated on exit_mm(). but when the kernel process calls
 unuse_mm() and then exits,mm->owner cannot be updated. And it
 will point to a task that has been released.

The current issue flow is as follows: (Process A,B,C use the same mm)
Process C  Process A Process B
qemu-system-x86_64: kernel:vhost_net  kernel: vhost_net
open /dev/vhost-net
  VHOST_SET_OWNER   create kthread vhost-%d  create kthread vhost-%d
  network init   use_mm()  use_mm()
   ...   ...
   Abnormal exited
   ...
  do_exit
  exit_mm()
  update mm->owner to A
  exit_files()
   close_files()
   kthread_should_stop() unuse_mm()
Stop Process A   tsk->mm=NULL
 do_exit()
 can't update owner
 A exit completed  vhost-%d  rcv first package
   vhost-%d build rcv buffer for vq
   page fault
   access mm & mm->owner
   NOW,mm->owner still pointer A
   kernel UAF
stop Process B

Although I am having this issue on vhost_net,But it affects all users of
unuse_mm.

Cc: "Eric W. Biederman" 
Cc: Andrew Morton 
Cc: "Luis R. Rodriguez" 
Cc: Dominik Brodowski 
Cc: Arnd Bergmann 
Cc: linux-kernel@vger.kernel.org
Cc: linux...@kvack.org
Cc: "Michael S. Tsirkin" 
Cc: Jason Wang 
Cc: Christoph Hellwig 
Signed-off-by: guomin chen 
---
 mm/mmu_context.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/mm/mmu_context.c b/mm/mmu_context.c
index 3e612ae..9eb81aa 100644
--- a/mm/mmu_context.c
+++ b/mm/mmu_context.c
@@ -60,5 +60,6 @@ void unuse_mm(struct mm_struct *mm)
/* active_mm is still 'mm' */
enter_lazy_tlb(mm, tsk);
task_unlock(tsk);
+   mm_update_next_owner(mm);
 }
 EXPORT_SYMBOL_GPL(unuse_mm);
-- 
1.8.3.1