|
Message-ID: <0e9a80c2-3e5e-db98-dff6-b45e9e4817fd@redhat.com> Date: Mon, 7 Aug 2017 15:55:22 -0700 From: Laura Abbott <labbott@...hat.com> To: Mark Rutland <mark.rutland@....com>, Kees Cook <keescook@...omium.org> Cc: linux-kernel@...r.kernel.org, ard.biesheuvel@...aro.org, catalin.marinas@....com, james.morse@....com, luto@...capital.net, matt@...eblueprint.co.uk, will.deacon@....com, kernel-hardening@...ts.openwall.com, linux-arm-kernel@...ts.infradead.org Subject: Re: [PATCH] lkdtm: Test VMAP_STACK allocates leading/trailing guard pages On 08/07/2017 03:00 PM, Mark Rutland wrote: > Hi, > > On Mon, Aug 07, 2017 at 01:39:48PM -0700, Kees Cook wrote: >> Two new tests STACK_GUARD_PAGE_LEADING and STACK_GUARD_PAGE_TRAILING >> attempt to read the byte before and after, respectively, of the current >> stack frame, which should fault under VMAP_STACK. >> >> Signed-off-by: Kees Cook <keescook@...omium.org> >> --- >> Do these tests both trip with the new arm64 VMAP_STACK code? > >> +/* Test that VMAP_STACK is actually allocating with a leading guard page */ >> +void lkdtm_STACK_GUARD_PAGE_LEADING(void) >> +{ >> + const unsigned char *stack = task_stack_page(current); >> + const unsigned char *ptr = stack - 1; >> + volatile unsigned char byte; >> + >> + pr_info("attempting bad read from page below current stack\n"); >> + >> + byte = *ptr; >> + >> + pr_err("FAIL: accessed page before stack!\n"); >> +} >> + >> +/* Test that VMAP_STACK is actually allocating with a trailing guard page */ >> +void lkdtm_STACK_GUARD_PAGE_TRAILING(void) >> +{ >> + const unsigned char *stack = task_stack_page(current); >> + const unsigned char *ptr = stack + THREAD_SIZE; >> + volatile unsigned char byte; >> + >> + pr_info("attempting bad read from page above current stack\n"); >> + >> + byte = *ptr; >> + >> + pr_err("FAIL: accessed page after stack!\n"); >> +} > > I can give these a go tomorrow. > > These *should* fault, and IIUC should trigger the usual "Unable to handle > kernel %s at virtual address %08lx\n" splat from arm64's __do_kernel_fault(), > which should end up with an Oops(). > > Since these don't mess with the SP, they shouldn't trigger the overflow > detection, which detects whether we have sufficient stack space to store the > exception context to the stack. That caught the LKDTM overflow test reliably. > > Thanks, > Mark. > I gave these a quick test in QEMU and they seem to do the correct thing: # echo STACK_GUARD_PAGE_LEADING > /sys/kernel/debug/provoke-crash/DIRECT [ 24.593306] lkdtm: Performing direct entry STACK_GUARD_PAGE_LEADING [ 24.593780] lkdtm: attempting bad read from page below current stack [ 24.594289] Unable to handle kernel paging request at virtual address ffff000009b77fff [ 24.594747] swapper pgtable: 4k pages, 48-bit VAs, pgd = ffff000009050000 [ 24.595443] [ffff000009b77fff] *pgd=000000007effe003, *pud=000000007effd003, *pmd=000000007cc43003, *pte=0000000000000000 [ 24.596743] Internal error: Oops: 96000007 [#1] PREEMPT SMP [ 24.597425] Modules linked in: [ 24.597973] CPU: 5 PID: 1264 Comm: sh Not tainted 4.13.0-rc3-00260-g720ffe048bd5 #34 [ 24.598555] Hardware name: linux,dummy-virt (DT) [ 24.598939] task: ffff800008b2d400 task.stack: ffff000009b78000 [ 24.599738] PC is at lkdtm_STACK_GUARD_PAGE_LEADING+0x28/0x40 [ 24.600100] LR is at lkdtm_STACK_GUARD_PAGE_LEADING+0x20/0x40 [ 24.600460] pc : [<ffff0000085b9ac0>] lr : [<ffff0000085b9ab8>] pstate: 40000145 [ 24.600855] sp : ffff000009b7bcf0 [ 24.601058] x29: ffff000009b7bcf0 x28: ffff800008b2d400 [ 24.601319] x27: ffff0000089b1000 x26: ffff000008fa00f8 [ 24.601560] x25: ffff000009b7beb8 x24: ffff000009b7beb8 [ 24.601809] x23: ffff000008f9fe10 x22: 0000000000000019 [ 24.602052] x21: ffff80003cc08000 x20: ffff000008f9feb0 [ 24.602292] x19: ffff000009b78000 x18: 0000000000000000 [ 24.602532] x17: 0000ffffa6d71470 x16: ffff000008203cb0 [ 24.602773] x15: 0000000000000010 x14: ffff000088ff637f [ 24.602998] x13: ffff000008ff638d x12: ffff000008ed9df0 [ 24.603390] x11: ffff00000855d518 x10: ffff000009b7ba00 [ 24.603946] x9 : 0000000000000016 x8 : 7320746e65727275 [ 24.604229] x7 : 6320776f6c656220 x6 : 00000000000000e9 [ 24.604511] x5 : 0000000000000000 x4 : 0000000000000001 [ 24.604804] x3 : 0000000000000007 x2 : 0000000000000007 [ 24.605106] x1 : ffff800008b2d400 x0 : ffff000008d05880 [ 24.605413] Process sh (pid: 1264, stack limit = 0xffff000009b78000) [ 24.605799] Call trace: [ 24.606029] Exception stack(0xffff000009b7bbb0 to 0xffff000009b7bcf0) [ 24.606414] bba0: ffff000008d05880 ffff800008b2d400 [ 24.606816] bbc0: 0000000000000007 0000000000000007 0000000000000001 0000000000000000 [ 24.607324] bbe0: 00000000000000e9 6320776f6c656220 7320746e65727275 0000000000000016 [ 24.608025] bc00: ffff000009b7ba00 ffff00000855d518 ffff000008ed9df0 ffff000008ff638d [ 24.608412] bc20: ffff000088ff637f 0000000000000010 ffff000008203cb0 0000ffffa6d71470 [ 24.608816] bc40: 0000000000000000 ffff000009b78000 ffff000008f9feb0 ffff80003cc08000 [ 24.609196] bc60: 0000000000000019 ffff000008f9fe10 ffff000009b7beb8 ffff000009b7beb8 [ 24.609584] bc80: ffff000008fa00f8 ffff0000089b1000 ffff800008b2d400 ffff000009b7bcf0 [ 24.609988] bca0: ffff0000085b9ab8 ffff000009b7bcf0 ffff0000085b9ac0 0000000040000145 [ 24.610391] bcc0: ffff80003efa7770 0000000000000000 0001000000000000 0000000000000000 [ 24.610792] bce0: ffff000009b7bcf0 ffff0000085b9ac0 [ 24.611170] [<ffff0000085b9ac0>] lkdtm_STACK_GUARD_PAGE_LEADING+0x28/0x40 [ 24.611528] [<ffff0000085b94b8>] lkdtm_do_action+0x1c/0x24 [ 24.611843] [<ffff0000085b9300>] direct_entry+0xe8/0x190 [ 24.612130] [<ffff0000083542d8>] full_proxy_write+0x60/0xa8 [ 24.612430] [<ffff000008201188>] __vfs_write+0x18/0x118 [ 24.612732] [<ffff0000082026ec>] vfs_write+0x9c/0x1a8 [ 24.613032] [<ffff000008203cf8>] SyS_write+0x48/0xb0 [ 24.613288] Exception stack(0xffff000009b7bec0 to 0xffff000009b7c000) [ 24.613629] bec0: 0000000000000001 0000000001059260 0000000000000019 0000000001059279 [ 24.614037] bee0: 5f454741505f4452 00474e494441454c 8000000000000080 8080808080808080 [ 24.614383] bf00: 0000000000000040 7f7f7f7f7f7f7f7f fefefefefefefeff 7f7f7f7f7f7f7f7f [ 24.614712] bf20: 0101010101010101 0000ffffa6e29cb8 0000ffffa6cb8a58 0000000000000008 [ 24.615028] bf40: 0000000000000000 0000ffffa6d71470 0000000000000000 00000000004b4000 [ 24.615547] bf60: 0000000000000001 0000000001059260 0000000000000019 0000000000000001 [ 24.615926] bf80: 0000000000000020 0000000001056430 00000000004819d8 0000000001056468 [ 24.616287] bfa0: 0000000000000000 0000ffffd4f915c0 000000000040a288 0000ffffd4f90bb0 [ 24.616643] bfc0: 0000ffffa6d71458 00000000a0000000 0000000000000001 0000000000000040 [ 24.616998] bfe0: 0000000000000000 0000000000000000 0000000000000000 0000ffffa6d71458 [ 24.617345] [<ffff0000080837b0>] el0_svc_naked+0x24/0x28 [ 24.617699] [<0000ffffa6d71458>] 0xffffa6d71458 [ 24.618009] Code: 91210000 97ed620f 90003a60 91220000 (385ff261) [ 24.618509] ---[ end trace d832d99efb2a6f68 ]--- # echo STACK_GUARD_PAGE_TRAILING > /sys/kernel/debug/provoke-crash/DIRECT [ 103.144313] lkdtm: Performing direct entry STACK_GUARD_PAGE_TRAILING [ 103.144749] lkdtm: attempting bad read from page above current stack [ 103.145100] Unable to handle kernel paging request at virtual address ffff000009c2c000 [ 103.145477] swapper pgtable: 4k pages, 48-bit VAs, pgd = ffff000009050000 [ 103.145836] [ffff000009c2c000] *pgd=000000007effe003, *pud=000000007effd003, *pmd=000000007d014003, *pte=0000000000000000 [ 103.146445] Internal error: Oops: 96000007 [#2] PREEMPT SMP [ 103.146767] Modules linked in: [ 103.146997] CPU: 5 PID: 1268 Comm: sh Tainted: G D 4.13.0-rc3-00260-g720ffe048bd5 #34 [ 103.147705] Hardware name: linux,dummy-virt (DT) [ 103.147962] task: ffff800008b2c600 task.stack: ffff000009c28000 [ 103.148317] PC is at lkdtm_STACK_GUARD_PAGE_TRAILING+0x2c/0x48 [ 103.148649] LR is at lkdtm_STACK_GUARD_PAGE_TRAILING+0x20/0x48 [ 103.148968] pc : [<ffff0000085b9b04>] lr : [<ffff0000085b9af8>] pstate: 40000145 [ 103.149378] sp : ffff000009c2bcf0 [ 103.149583] x29: ffff000009c2bcf0 x28: ffff800008b2c600 [ 103.149851] x27: ffff0000089b1000 x26: ffff000008fa00f8 [ 103.150137] x25: ffff000009c2beb8 x24: ffff000009c2beb8 [ 103.150414] x23: ffff000008f9fe10 x22: 000000000000001a [ 103.150742] x21: ffff800008bc4000 x20: ffff000008f9fec0 [ 103.151054] x19: ffff000009c2c000 x18: 0000000000000000 [ 103.151359] x17: 0000ffffa0537470 x16: ffff000008203cb0 [ 103.151677] x15: 0000000000000010 x14: ffff000088ff637f [ 103.151978] x13: ffff000008ff638d x12: ffff000008ed9df0 [ 103.152288] x11: ffff00000855d518 x10: ffff000009c2ba00 [ 103.152566] x9 : 0000000000000016 x8 : 6572727563206576 [ 103.152861] x7 : 6f62612065676170 x6 : 000000000000012a [ 103.153162] x5 : 0000000000000000 x4 : 0000000000000001 [ 103.153462] x3 : 0000000000000007 x2 : 0000000000000007 [ 103.153772] x1 : ffff800008b2c600 x0 : ffff000008d058f0 [ 103.154101] Process sh (pid: 1268, stack limit = 0xffff000009c28000) [ 103.154446] Call trace: [ 103.154622] Exception stack(0xffff000009c2bbb0 to 0xffff000009c2bcf0) [ 103.154985] bba0: ffff000008d058f0 ffff800008b2c600 [ 103.155416] bbc0: 0000000000000007 0000000000000007 0000000000000001 0000000000000000 [ 103.155846] bbe0: 000000000000012a 6f62612065676170 6572727563206576 0000000000000016 [ 103.156279] bc00: ffff000009c2ba00 ffff00000855d518 ffff000008ed9df0 ffff000008ff638d [ 103.156639] bc20: ffff000088ff637f 0000000000000010 ffff000008203cb0 0000ffffa0537470 [ 103.156947] bc40: 0000000000000000 ffff000009c2c000 ffff000008f9fec0 ffff800008bc4000 [ 103.157257] bc60: 000000000000001a ffff000008f9fe10 ffff000009c2beb8 ffff000009c2beb8 [ 103.157573] bc80: ffff000008fa00f8 ffff0000089b1000 ffff800008b2c600 ffff000009c2bcf0 [ 103.157886] bca0: ffff0000085b9af8 ffff000009c2bcf0 ffff0000085b9b04 0000000040000145 [ 103.158193] bcc0: ffff80003efa7770 0000000000000000 0001000000000000 0000000000000000 [ 103.158509] bce0: ffff000009c2bcf0 ffff0000085b9b04 [ 103.158729] [<ffff0000085b9b04>] lkdtm_STACK_GUARD_PAGE_TRAILING+0x2c/0x48 [ 103.159007] [<ffff0000085b94b8>] lkdtm_do_action+0x1c/0x24 [ 103.159235] [<ffff0000085b9300>] direct_entry+0xe8/0x190 [ 103.159464] [<ffff0000083542d8>] full_proxy_write+0x60/0xa8 [ 103.159691] [<ffff000008201188>] __vfs_write+0x18/0x118 [ 103.159913] [<ffff0000082026ec>] vfs_write+0x9c/0x1a8 [ 103.160129] [<ffff000008203cf8>] SyS_write+0x48/0xb0 [ 103.160335] Exception stack(0xffff000009c2bec0 to 0xffff000009c2c000) [ 103.160598] bec0: 0000000000000001 0000000039d352f0 000000000000001a 0000000039d3530a [ 103.160906] bee0: 545f454741505f44 00474e494c494152 0080808080808080 8080808080808080 [ 103.161214] bf00: 0000000000000040 7f7f7f7f7f7f7f7f fefefefefefefeff 7f7f7f7f7f7f7f7f [ 103.161533] bf20: 0101010101010101 0000ffffa05efcb8 0000ffffa047ea58 0000000000000010 [ 103.161846] bf40: 0000000000000000 0000ffffa0537470 0000000000000000 00000000004b4000 [ 103.162224] bf60: 0000000000000001 0000000039d352f0 000000000000001a 0000000000000001 [ 103.162521] bf80: 0000000000000020 0000000039d32430 00000000004819d8 0000000039d32468 [ 103.162824] bfa0: 0000000000000000 0000ffffc8523810 000000000040a288 0000ffffc8522e00 [ 103.163113] bfc0: 0000ffffa0537458 00000000a0000000 0000000000000001 0000000000000040 [ 103.163401] bfe0: 0000000000000000 0000000000000000 0000000000000000 0000ffffa0537458 [ 103.163695] [<ffff0000080837b0>] el0_svc_naked+0x24/0x28 [ 103.163905] [<0000ffffa0537458>] 0xffffa0537458 [ 103.164097] Code: 97ed61ff 91401273 90003a60 9123c000 (39400261) [ 103.164340] ---[ end trace d832d99efb2a6f69 ]--- I also confirmed they failed as expected with CONFIG_VMAP_STACK=n
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.