mirror of
				https://github.com/torvalds/linux.git
				synced 2025-10-31 00:28:52 +02:00 
			
		
		
		
	 734bbc1c97
			
		
	
	
		734bbc1c97
		
	
	
	
	
		
			
			The msg subsystem is a common target for exploiting[1][2][3][4][5][6][7] use-after-free type confusion flaws in the kernel for both read and write primitives. Avoid having a user-controlled dynamically-size allocation share the global kmalloc cache by using a separate set of kmalloc buckets via the kmem_buckets API. Link: https://blog.hacktivesecurity.com/index.php/2022/06/13/linux-kernel-exploit-development-1day-case-study/ [1] Link: https://hardenedvault.net/blog/2022-11-13-msg_msg-recon-mitigation-ved/ [2] Link: https://www.willsroot.io/2021/08/corctf-2021-fire-of-salvation-writeup.html [3] Link: https://a13xp0p0v.github.io/2021/02/09/CVE-2021-26708.html [4] Link: https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html [5] Link: https://zplin.me/papers/ELOISE.pdf [6] Link: https://syst3mfailure.io/wall-of-perdition/ [7] Signed-off-by: Kees Cook <kees@kernel.org> Signed-off-by: Vlastimil Babka <vbabka@suse.cz>
		
			
				
	
	
		
			195 lines
		
	
	
	
		
			3.8 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			195 lines
		
	
	
	
		
			3.8 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| // SPDX-License-Identifier: GPL-2.0-or-later
 | |
| /*
 | |
|  * linux/ipc/msgutil.c
 | |
|  * Copyright (C) 1999, 2004 Manfred Spraul
 | |
|  */
 | |
| 
 | |
| #include <linux/spinlock.h>
 | |
| #include <linux/init.h>
 | |
| #include <linux/security.h>
 | |
| #include <linux/slab.h>
 | |
| #include <linux/ipc.h>
 | |
| #include <linux/msg.h>
 | |
| #include <linux/ipc_namespace.h>
 | |
| #include <linux/utsname.h>
 | |
| #include <linux/proc_ns.h>
 | |
| #include <linux/uaccess.h>
 | |
| #include <linux/sched.h>
 | |
| 
 | |
| #include "util.h"
 | |
| 
 | |
| DEFINE_SPINLOCK(mq_lock);
 | |
| 
 | |
| /*
 | |
|  * The next 2 defines are here bc this is the only file
 | |
|  * compiled when either CONFIG_SYSVIPC and CONFIG_POSIX_MQUEUE
 | |
|  * and not CONFIG_IPC_NS.
 | |
|  */
 | |
| struct ipc_namespace init_ipc_ns = {
 | |
| 	.ns.count = REFCOUNT_INIT(1),
 | |
| 	.user_ns = &init_user_ns,
 | |
| 	.ns.inum = PROC_IPC_INIT_INO,
 | |
| #ifdef CONFIG_IPC_NS
 | |
| 	.ns.ops = &ipcns_operations,
 | |
| #endif
 | |
| };
 | |
| 
 | |
| struct msg_msgseg {
 | |
| 	struct msg_msgseg *next;
 | |
| 	/* the next part of the message follows immediately */
 | |
| };
 | |
| 
 | |
| #define DATALEN_MSG	((size_t)PAGE_SIZE-sizeof(struct msg_msg))
 | |
| #define DATALEN_SEG	((size_t)PAGE_SIZE-sizeof(struct msg_msgseg))
 | |
| 
 | |
| static kmem_buckets *msg_buckets __ro_after_init;
 | |
| 
 | |
| static int __init init_msg_buckets(void)
 | |
| {
 | |
| 	msg_buckets = kmem_buckets_create("msg_msg", SLAB_ACCOUNT,
 | |
| 					  sizeof(struct msg_msg),
 | |
| 					  DATALEN_MSG, NULL);
 | |
| 
 | |
| 	return 0;
 | |
| }
 | |
| subsys_initcall(init_msg_buckets);
 | |
| 
 | |
| static struct msg_msg *alloc_msg(size_t len)
 | |
| {
 | |
| 	struct msg_msg *msg;
 | |
| 	struct msg_msgseg **pseg;
 | |
| 	size_t alen;
 | |
| 
 | |
| 	alen = min(len, DATALEN_MSG);
 | |
| 	msg = kmem_buckets_alloc(msg_buckets, sizeof(*msg) + alen, GFP_KERNEL);
 | |
| 	if (msg == NULL)
 | |
| 		return NULL;
 | |
| 
 | |
| 	msg->next = NULL;
 | |
| 	msg->security = NULL;
 | |
| 
 | |
| 	len -= alen;
 | |
| 	pseg = &msg->next;
 | |
| 	while (len > 0) {
 | |
| 		struct msg_msgseg *seg;
 | |
| 
 | |
| 		cond_resched();
 | |
| 
 | |
| 		alen = min(len, DATALEN_SEG);
 | |
| 		seg = kmalloc(sizeof(*seg) + alen, GFP_KERNEL_ACCOUNT);
 | |
| 		if (seg == NULL)
 | |
| 			goto out_err;
 | |
| 		*pseg = seg;
 | |
| 		seg->next = NULL;
 | |
| 		pseg = &seg->next;
 | |
| 		len -= alen;
 | |
| 	}
 | |
| 
 | |
| 	return msg;
 | |
| 
 | |
| out_err:
 | |
| 	free_msg(msg);
 | |
| 	return NULL;
 | |
| }
 | |
| 
 | |
| struct msg_msg *load_msg(const void __user *src, size_t len)
 | |
| {
 | |
| 	struct msg_msg *msg;
 | |
| 	struct msg_msgseg *seg;
 | |
| 	int err = -EFAULT;
 | |
| 	size_t alen;
 | |
| 
 | |
| 	msg = alloc_msg(len);
 | |
| 	if (msg == NULL)
 | |
| 		return ERR_PTR(-ENOMEM);
 | |
| 
 | |
| 	alen = min(len, DATALEN_MSG);
 | |
| 	if (copy_from_user(msg + 1, src, alen))
 | |
| 		goto out_err;
 | |
| 
 | |
| 	for (seg = msg->next; seg != NULL; seg = seg->next) {
 | |
| 		len -= alen;
 | |
| 		src = (char __user *)src + alen;
 | |
| 		alen = min(len, DATALEN_SEG);
 | |
| 		if (copy_from_user(seg + 1, src, alen))
 | |
| 			goto out_err;
 | |
| 	}
 | |
| 
 | |
| 	err = security_msg_msg_alloc(msg);
 | |
| 	if (err)
 | |
| 		goto out_err;
 | |
| 
 | |
| 	return msg;
 | |
| 
 | |
| out_err:
 | |
| 	free_msg(msg);
 | |
| 	return ERR_PTR(err);
 | |
| }
 | |
| #ifdef CONFIG_CHECKPOINT_RESTORE
 | |
| struct msg_msg *copy_msg(struct msg_msg *src, struct msg_msg *dst)
 | |
| {
 | |
| 	struct msg_msgseg *dst_pseg, *src_pseg;
 | |
| 	size_t len = src->m_ts;
 | |
| 	size_t alen;
 | |
| 
 | |
| 	if (src->m_ts > dst->m_ts)
 | |
| 		return ERR_PTR(-EINVAL);
 | |
| 
 | |
| 	alen = min(len, DATALEN_MSG);
 | |
| 	memcpy(dst + 1, src + 1, alen);
 | |
| 
 | |
| 	for (dst_pseg = dst->next, src_pseg = src->next;
 | |
| 	     src_pseg != NULL;
 | |
| 	     dst_pseg = dst_pseg->next, src_pseg = src_pseg->next) {
 | |
| 
 | |
| 		len -= alen;
 | |
| 		alen = min(len, DATALEN_SEG);
 | |
| 		memcpy(dst_pseg + 1, src_pseg + 1, alen);
 | |
| 	}
 | |
| 
 | |
| 	dst->m_type = src->m_type;
 | |
| 	dst->m_ts = src->m_ts;
 | |
| 
 | |
| 	return dst;
 | |
| }
 | |
| #else
 | |
| struct msg_msg *copy_msg(struct msg_msg *src, struct msg_msg *dst)
 | |
| {
 | |
| 	return ERR_PTR(-ENOSYS);
 | |
| }
 | |
| #endif
 | |
| int store_msg(void __user *dest, struct msg_msg *msg, size_t len)
 | |
| {
 | |
| 	size_t alen;
 | |
| 	struct msg_msgseg *seg;
 | |
| 
 | |
| 	alen = min(len, DATALEN_MSG);
 | |
| 	if (copy_to_user(dest, msg + 1, alen))
 | |
| 		return -1;
 | |
| 
 | |
| 	for (seg = msg->next; seg != NULL; seg = seg->next) {
 | |
| 		len -= alen;
 | |
| 		dest = (char __user *)dest + alen;
 | |
| 		alen = min(len, DATALEN_SEG);
 | |
| 		if (copy_to_user(dest, seg + 1, alen))
 | |
| 			return -1;
 | |
| 	}
 | |
| 	return 0;
 | |
| }
 | |
| 
 | |
| void free_msg(struct msg_msg *msg)
 | |
| {
 | |
| 	struct msg_msgseg *seg;
 | |
| 
 | |
| 	security_msg_msg_free(msg);
 | |
| 
 | |
| 	seg = msg->next;
 | |
| 	kfree(msg);
 | |
| 	while (seg != NULL) {
 | |
| 		struct msg_msgseg *tmp = seg->next;
 | |
| 
 | |
| 		cond_resched();
 | |
| 		kfree(seg);
 | |
| 		seg = tmp;
 | |
| 	}
 | |
| }
 |