Patch "bpf: Fix UAF due to race between btf_try_get_module and load_module" has been added to the 5.17-stable tree

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This is a note to let you know that I've just added the patch titled

    bpf: Fix UAF due to race between btf_try_get_module and load_module

to the 5.17-stable tree which can be found at:
    http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary

The filename of the patch is:
     bpf-fix-uaf-due-to-race-between-btf_try_get_module-a.patch
and it can be found in the queue-5.17 subdirectory.

If you, or anyone else, feels it should not be added to the stable tree,
please let <stable@xxxxxxxxxxxxxxx> know about it.



commit 2232aa4c3a68384364ae83762d8c2cdc6bfb6233
Author: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
Date:   Fri Jan 14 22:09:44 2022 +0530

    bpf: Fix UAF due to race between btf_try_get_module and load_module
    
    [ Upstream commit 18688de203b47e5d8d9d0953385bf30b5949324f ]
    
    While working on code to populate kfunc BTF ID sets for module BTF from
    its initcall, I noticed that by the time the initcall is invoked, the
    module BTF can already be seen by userspace (and the BPF verifier). The
    existing btf_try_get_module calls try_module_get which only fails if
    mod->state == MODULE_STATE_GOING, i.e. it can increment module reference
    when module initcall is happening in parallel.
    
    Currently, BTF parsing happens from MODULE_STATE_COMING notifier
    callback. At this point, the module initcalls have not been invoked.
    The notifier callback parses and prepares the module BTF, allocates an
    ID, which publishes it to userspace, and then adds it to the btf_modules
    list allowing the kernel to invoke btf_try_get_module for the BTF.
    
    However, at this point, the module has not been fully initialized (i.e.
    its initcalls have not finished). The code in module.c can still fail
    and free the module, without caring for other users. However, nothing
    stops btf_try_get_module from succeeding between the state transition
    from MODULE_STATE_COMING to MODULE_STATE_LIVE.
    
    This leads to a use-after-free issue when BPF program loads
    successfully in the state transition, load_module's do_init_module call
    fails and frees the module, and BPF program fd on close calls module_put
    for the freed module. Future patch has test case to verify we don't
    regress in this area in future.
    
    There are multiple points after prepare_coming_module (in load_module)
    where failure can occur and module loading can return error. We
    illustrate and test for the race using the last point where it can
    practically occur (in module __init function).
    
    An illustration of the race:
    
    CPU 0                           CPU 1
                              load_module
                                notifier_call(MODULE_STATE_COMING)
                                  btf_parse_module
                                  btf_alloc_id      // Published to userspace
                                  list_add(&btf_mod->list, btf_modules)
                                mod->init(...)
    ...                             ^
    bpf_check                       |
    check_pseudo_btf_id             |
      btf_try_get_module            |
        returns true                |  ...
    ...                             |  module __init in progress
    return prog_fd                  |  ...
    ...                             V
                                if (ret < 0)
                                  free_module(mod)
                                ...
    close(prog_fd)
     ...
     bpf_prog_free_deferred
      module_put(used_btf.mod) // use-after-free
    
    We fix this issue by setting a flag BTF_MODULE_F_LIVE, from the notifier
    callback when MODULE_STATE_LIVE state is reached for the module, so that
    we return NULL from btf_try_get_module for modules that are not fully
    formed. Since try_module_get already checks that module is not in
    MODULE_STATE_GOING state, and that is the only transition a live module
    can make before being removed from btf_modules list, this is enough to
    close the race and prevent the bug.
    
    A later selftest patch crafts the race condition artifically to verify
    that it has been fixed, and that verifier fails to load program (with
    ENXIO).
    
    Lastly, a couple of comments:
    
     1. Even if this race didn't exist, it seems more appropriate to only
        access resources (ksyms and kfuncs) of a fully formed module which
        has been initialized completely.
    
     2. This patch was born out of need for synchronization against module
        initcall for the next patch, so it is needed for correctness even
        without the aforementioned race condition. The BTF resources
        initialized by module initcall are set up once and then only looked
        up, so just waiting until the initcall has finished ensures correct
        behavior.
    
    Fixes: 541c3bad8dc5 ("bpf: Support BPF ksym variables in kernel modules")
    Signed-off-by: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
    Link: https://lore.kernel.org/r/20220114163953.1455836-2-memxor@xxxxxxxxx
    Signed-off-by: Alexei Starovoitov <ast@xxxxxxxxxx>
    Signed-off-by: Sasha Levin <sashal@xxxxxxxxxx>

diff --git a/kernel/bpf/btf.c b/kernel/bpf/btf.c
index 3e23b3fa79ff..a3b5a6bf99e7 100644
--- a/kernel/bpf/btf.c
+++ b/kernel/bpf/btf.c
@@ -6201,12 +6201,17 @@ bool btf_id_set_contains(const struct btf_id_set *set, u32 id)
 	return bsearch(&id, set->ids, set->cnt, sizeof(u32), btf_id_cmp_func) != NULL;
 }
 
+enum {
+	BTF_MODULE_F_LIVE = (1 << 0),
+};
+
 #ifdef CONFIG_DEBUG_INFO_BTF_MODULES
 struct btf_module {
 	struct list_head list;
 	struct module *module;
 	struct btf *btf;
 	struct bin_attribute *sysfs_attr;
+	int flags;
 };
 
 static LIST_HEAD(btf_modules);
@@ -6234,7 +6239,8 @@ static int btf_module_notify(struct notifier_block *nb, unsigned long op,
 	int err = 0;
 
 	if (mod->btf_data_size == 0 ||
-	    (op != MODULE_STATE_COMING && op != MODULE_STATE_GOING))
+	    (op != MODULE_STATE_COMING && op != MODULE_STATE_LIVE &&
+	     op != MODULE_STATE_GOING))
 		goto out;
 
 	switch (op) {
@@ -6292,6 +6298,17 @@ static int btf_module_notify(struct notifier_block *nb, unsigned long op,
 			btf_mod->sysfs_attr = attr;
 		}
 
+		break;
+	case MODULE_STATE_LIVE:
+		mutex_lock(&btf_module_mutex);
+		list_for_each_entry_safe(btf_mod, tmp, &btf_modules, list) {
+			if (btf_mod->module != module)
+				continue;
+
+			btf_mod->flags |= BTF_MODULE_F_LIVE;
+			break;
+		}
+		mutex_unlock(&btf_module_mutex);
 		break;
 	case MODULE_STATE_GOING:
 		mutex_lock(&btf_module_mutex);
@@ -6339,7 +6356,12 @@ struct module *btf_try_get_module(const struct btf *btf)
 		if (btf_mod->btf != btf)
 			continue;
 
-		if (try_module_get(btf_mod->module))
+		/* We must only consider module whose __init routine has
+		 * finished, hence we must check for BTF_MODULE_F_LIVE flag,
+		 * which is set from the notifier callback for
+		 * MODULE_STATE_LIVE.
+		 */
+		if ((btf_mod->flags & BTF_MODULE_F_LIVE) && try_module_get(btf_mod->module))
 			res = btf_mod->module;
 
 		break;



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux