[SRU][F][PATCH 1/1] usercopy: mark dma-kmalloc caches as usercopy caches

frank.heimes at canonical.com frank.heimes at canonical.com
Tue Oct 5 06:32:20 UTC 2021


From: Vlastimil Babka <vbabka at suse.cz>

BugLink: https://bugs.launchpad.net/bugs/1913442

Upstream commit : 49f2d2419d60a103752e5fbaf158cf8d07c0d884

We have seen a "usercopy: Kernel memory overwrite attempt detected to
SLUB object 'dma-kmalloc-1 k' (offset 0, size 11)!" error on s390x, as
IUCV uses kmalloc() with __GFP_DMA because of memory address
restrictions.  The issue has been discussed [2] and it has been noted
that if all the kmalloc caches are marked as usercopy, there's little
reason not to mark dma-kmalloc caches too.  The 'dma' part merely means
that __GFP_DMA is used to restrict memory address range.

As Jann Horn put it [3]:
 "I think dma-kmalloc slabs should be handled the same way as normal
  kmalloc slabs. When a dma-kmalloc allocation is freshly created, it is
  just normal kernel memory - even if it might later be used for DMA -,
  and it should be perfectly fine to copy_from_user() into such
  allocations at that point, and to copy_to_user() out of them at the
  end. If you look at the places where such allocations are created, you
  can see things like kmemdup(), memcpy() and so on - all normal
  operations that shouldn't conceptually be different from usercopy in
  any relevant way."

Thus this patch marks the dma-kmalloc-* caches as usercopy.

[1] https://bugzilla.suse.com/show_bug.cgi?id=1156053
[2] https://lore.kernel.org/kernel-hardening/bfca96db-bbd0-d958-7732-76e36c667c68@suse.cz/
[3] https://lore.kernel.org/kernel-hardening/CAG48ez1a4waGk9kB0WLaSbs4muSoK0AYAVk8=XYaKj4_+6e6Hg@mail.gmail.com/

Signed-off-by: Vlastimil Babka <vbabka at suse.cz>
Signed-off-by: Andrew Morton <akpm at linux-foundation.org>
Acked-by: Christian Borntraeger <borntraeger at de.ibm.com>
Acked-by: Jiri Slaby <jslaby at suse.cz>
Cc: Jann Horn <jannh at google.com>
Cc: Christoph Hellwig <hch at infradead.org>
Cc: Christopher Lameter <cl at linux.com>
Cc: Julian Wiedmann <jwi at linux.ibm.com>
Cc: Ursula Braun <ubraun at linux.ibm.com>
Cc: Alexander Viro <viro at zeniv.linux.org.uk>
Cc: David Windsor <dave at nullcore.net>
Cc: Pekka Enberg <penberg at kernel.org>
Cc: David Rientjes <rientjes at google.com>
Cc: Joonsoo Kim <iamjoonsoo.kim at lge.com>
Cc: Andy Lutomirski <luto at kernel.org>
Cc: "David S. Miller" <davem at davemloft.net>
Cc: Laura Abbott <labbott at redhat.com>
Cc: Mark Rutland <mark.rutland at arm.com>
Cc: "Martin K. Petersen" <martin.petersen at oracle.com>
Cc: Paolo Bonzini <pbonzini at redhat.com>
Cc: Christoffer Dall <christoffer.dall at linaro.org>
Cc: Dave Kleikamp <dave.kleikamp at oracle.com>
Cc: Jan Kara <jack at suse.cz>
Cc: Luis de Bethencourt <luisbg at kernel.org>
Cc: Marc Zyngier <marc.zyngier at arm.com>
Cc: Rik van Riel <riel at surriel.com>
Cc: Matthew Garrett <mjg59 at google.com>
Cc: Michal Kubecek <mkubecek at suse.cz>
Link: http://lkml.kernel.org/r/7d810f6d-8085-ea2f-7805-47ba3842dc50@suse.cz
Signed-off-by: Linus Torvalds <torvalds at linux-foundation.org>
(backported from commit 49f2d2419d60a103752e5fbaf158cf8d07c0d884)
Signed-off-by: Frank Heimes <frank.heimes at canonical.com>
---
 mm/slab_common.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/mm/slab_common.c b/mm/slab_common.c
index 8c1ffbf7de45..76433e2187d0 100644
--- a/mm/slab_common.c
+++ b/mm/slab_common.c
@@ -1296,7 +1296,7 @@ void __init create_kmalloc_caches(slab_flags_t flags)
 
 			BUG_ON(!n);
 			kmalloc_caches[KMALLOC_DMA][i] = create_kmalloc_cache(
-				n, size, SLAB_CACHE_DMA | flags, 0, 0);
+				n, size, SLAB_CACHE_DMA | flags, 0, kmalloc_info[i].size);
 		}
 	}
 #endif
-- 
2.25.1




More information about the kernel-team mailing list