[PATCH v5 03/30] arm64: signal: Verify extra data is user-readable in sys_rt_sigreturn
Catalin Marinas
catalin.marinas at arm.com
Wed Nov 1 04:43:29 PDT 2017
On Tue, Oct 31, 2017 at 03:50:55PM +0000, Dave P Martin wrote:
> Currently sys_rt_sigreturn() verifies that the base sigframe is
> readable, but no similar check is performed on the extra data to
> which an extra_context record points.
>
> This matters because the extra data will be read with the
> unprotected user accessors. However, this is not a problem at
> present because the extra data base address is required to be
> exactly at the end of the base sigframe. So, there would need to
> be a non-user-readable kernel address within about 59K
> (SIGFRAME_MAXSZ - sizeof(struct rt_sigframe)) of some address for
> which access_ok(VERIFY_READ) returns true, in order for sigreturn
> to be able to read kernel memory that should be inaccessible to the
> user task. This is currently impossible due to the untranslatable
> address hole between the TTBR0 and TTBR1 address ranges.
>
> Disappearance of the hole between the TTBR0 and TTBR1 mapping
> ranges would require the VA size for TTBR0 and TTBR1 to grow to at
> least 55 bits, and either the disabling of tagged pointers for
> userspace or enabling of tagged pointers for kernel space; none of
> which is currently envisaged.
>
> Even so, it is wrong to use the unprotected user accessors without
> an accompanying access_ok() check.
>
> To avoid the potential for future surprises, this patch does an
> explicit access_ok() check on the extra data space when parsing an
> extra_context record.
>
> Fixes: 33f082614c34 ("arm64: signal: Allow expansion of the signal frame")
> Signed-off-by: Dave Martin <Dave.Martin at arm.com>
Acked-by: Catalin Marinas <catalin.marinas at arm.com>
More information about the linux-arm-kernel
mailing list