From mboxrd@z Thu Jan 1 00:00:00 1970 Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754934AbeAIV7s (ORCPT + 1 other); Tue, 9 Jan 2018 16:59:48 -0500 Received: from mail-io0-f193.google.com ([209.85.223.193]:46038 "EHLO mail-io0-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754810AbeAIV7o (ORCPT ); Tue, 9 Jan 2018 16:59:44 -0500 X-Google-Smtp-Source: ACJfBosYG+H6c79TQQZz4LOB6MY9fWQFoRzbkDY3bmPSEf29TgS267PyFaLszzq1Y76IDxaGiaWqbw== Date: Tue, 9 Jan 2018 13:59:39 -0800 From: Eric Biggers To: Dmitry Vyukov Cc: syzbot , linux-fsdevel@vger.kernel.org, LKML , syzkaller-bugs@googlegroups.com, Al Viro , Andrea Arcangeli , Pavel Emelyanov , linux-mm@kvack.org Subject: Re: KASAN: use-after-free Read in handle_userfault Message-ID: <20180109215939.GA127462@gmail.com> References: <001a114c9224e34a49055c842032@google.com> <20171127061517.GA26341@zzz.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20171127061517.GA26341@zzz.localdomain> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On Sun, Nov 26, 2017 at 10:15:17PM -0800, Eric Biggers wrote: > +Cc aarcange@redhat.com, xemul@parallels.com, linux-mm@kvack.org > > On Fri, Oct 27, 2017 at 11:46:13AM +0200, Dmitry Vyukov wrote: > > On Fri, Oct 27, 2017 at 11:44 AM, syzbot > > > > wrote: > > > Hello, > > > > > > syzkaller hit the following crash on > > > a31cc455c512f3f1dd5f79cac8e29a7c8a617af8 > > > git://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/master > > > compiler: gcc (GCC) 7.1.1 20170620 > > > .config is attached > > > Raw console output is attached. > > > C reproducer is attached > > > syzkaller reproducer is attached. See https://goo.gl/kgGztJ > > > for information about syzkaller reproducers > > > > Andrea or Pavel, can one of you please fix this? It's another use-after-free > related to userfaultfd "fork events", and it can easily be triggered by an > unprivileged user. It was reported a month ago already; the original report is > here: https://groups.google.com/forum/#!topic/syzkaller-bugs/sS99S-Z-9No. > (Please consider adding yourself and/or linux-mm to the MAINTAINERS file for > fs/userfaultfd.c, so that you are Cc'ed on userfaultfd bug reports.) In > userfaultfd_event_wait_completion(), called from dup_fctx(), the kernel is > freeing the the new userfaultfd_ctx because the old one had all its fd's closed, > but actually the new one is still in use by the new mm_struct. > Fixed now: #syz fix: userfaultfd: clear the vma->vm_userfaultfd_ctx if UFFD_EVENT_FORK fails