// SPDX-License-Identifier: GPL-2.0 /* * This is for all the tests related to logic bugs (e.g. bad dereferences, * bad alignment, bad loops, bad locking, bad scheduling, deep stacks, and * lockups) along with other things that don't fit well into existing LKDTM * test source files.
*/ #include"lkdtm.h" #include <linux/cpu.h> #include <linux/list.h> #include <linux/sched.h> #include <linux/sched/signal.h> #include <linux/sched/task_stack.h> #include <linux/slab.h> #include <linux/stop_machine.h> #include <linux/uaccess.h>
/* * Make sure our attempts to over run the kernel stack doesn't trigger * a compiler warning when CONFIG_FRAME_WARN is set. Then make sure we * recurse past the end of THREAD_SIZE by default.
*/ #ifdefined(CONFIG_FRAME_WARN) && (CONFIG_FRAME_WARN > 0) #define REC_STACK_SIZE (_AC(CONFIG_FRAME_WARN, UL) / 2) #else #define REC_STACK_SIZE (THREAD_SIZE / 8UL) #endif #define REC_NUM_DEFAULT ((THREAD_SIZE / REC_STACK_SIZE) * 2)
staticint recur_count = REC_NUM_DEFAULT;
static DEFINE_SPINLOCK(lock_me_up);
/* * Make sure compiler does not optimize this function or stack frame away: * - function marked noinline * - stack variables are marked volatile * - stack variables are written (memset()) and read (buf[..] passed as arg) * - function may have external effects (memzero_explicit()) * - no tail recursion possible
*/ staticint noinline recursive_loop(int remaining)
{ volatilechar buf[REC_STACK_SIZE]; volatileint ret;
memset((void *)buf, remaining & 0xFF, sizeof(buf)); if (!remaining)
ret = 0; else
ret = recursive_loop((int)buf[remaining % sizeof(buf)] - 1);
memzero_explicit((void *)buf, sizeof(buf)); return ret;
}
/* If the depth is negative, use the default, otherwise keep parameter. */ void __init lkdtm_bugs_init(int *recur_param)
{ if (*recur_param < 0)
*recur_param = recur_count; else
recur_count = *recur_param;
}
/* * As stop_machine() disables interrupts, all CPUs within this function * have interrupts disabled and cannot take a regular IPI. * * The last CPU which enters here will trigger a panic, and as all CPUs * cannot take a regular IPI, we'll only be able to stop secondaries if * smp_send_stop() or crash_smp_send_stop() uses an NMI.
*/ if (atomic_inc_return(v) == num_online_cpus())
panic("panic stop irqoff test");
/* This should trip the stack canary, not corrupt the return address. */ static noinline void lkdtm_CORRUPT_STACK(void)
{ /* Use default char array length that triggers stack protection. */ char data[8] __aligned(sizeof(void *));
/* Same as above but will only get a canary with -fstack-protector-strong */ static noinline void lkdtm_CORRUPT_STACK_STRONG(void)
{ union { unsignedshort shorts[4]; unsignedlong *ptr;
} data __aligned(sizeof(void *));
pr_info("Corrupting stack containing union ...\n");
__lkdtm_CORRUPT_STACK((void *)&data);
}
/* Do our best to find the canary in a 16 word window ... */ for (i = 1; i < 16; i++) {
canary = (unsignedlong *)stack + i; #ifdef CONFIG_STACKPROTECTOR if (*canary == current->stack_canary)
current_offset = i; if (*canary == init_task.stack_canary)
init_offset = i; #endif
}
if (current_offset == 0) { /* * If the canary doesn't match what's in the task_struct, * we're either using a global canary or the stack frame * layout changed.
*/ if (init_offset != 0) {
pr_err("FAIL: global stack canary found at offset %ld (canary for pid %d matches init_task's)!\n",
init_offset, pid);
} else {
pr_warn("FAIL: did not correctly locate stack canary :(\n");
pr_expected_config(CONFIG_STACKPROTECTOR);
}
return;
} elseif (init_offset != 0) {
pr_warn("WARNING: found both current and init_task canaries nearby?!\n");
}
canary = (unsignedlong *)stack + current_offset; if (stack_canary_pid == 0) {
stack_canary = *canary;
stack_canary_pid = pid;
stack_canary_offset = current_offset;
pr_info("Recorded stack canary for pid %d at offset %ld\n",
stack_canary_pid, stack_canary_offset);
} elseif (pid == stack_canary_pid) {
pr_warn("ERROR: saw pid %d again -- please use a new pid\n", pid);
} else { if (current_offset != stack_canary_offset) {
pr_warn("ERROR: canary offset changed from %ld to %ld!?\n",
stack_canary_offset, current_offset); return;
}
if (*canary == stack_canary) {
pr_warn("FAIL: canary identical for pid %d and pid %d at offset %ld!\n",
stack_canary_pid, pid, current_offset);
} else {
pr_info("ok: stack canaries differ between pid %d and pid %d at offset %ld.\n",
stack_canary_pid, pid, current_offset); /* Reset the test. */
stack_canary_pid = 0;
}
}
}
staticvoid lkdtm_SPINLOCKUP(void)
{ /* Must be called twice to trigger. */
spin_lock(&lock_me_up); /* Let sparse know we intended to exit holding the lock. */
__release(&lock_me_up);
}
pr_info("Array access within bounds ...\n"); /* For both, touch all bytes in the actual member size. */ for (i = 0; i < sizeof(checked->data); i++)
checked->data[i] = 'A'; /* * For the uninstrumented flex array member, also touch 1 byte * beyond to verify it is correctly uninstrumented.
*/ for (i = 0; i < 2; i++)
not_checked->data[i] = 'A';
pr_info("Array access beyond bounds ...\n"); for (i = 0; i < sizeof(checked->data) + 1; i++)
checked->data[i] = 'B';
pr_err("FAIL: survived access of invalid flexible array member index!\n");
if (!IS_ENABLED(CONFIG_CC_HAS_COUNTED_BY))
pr_warn("This is expected since this %s was built with a compiler that does not support __counted_by\n",
lkdtm_kernel_info); elseif (IS_ENABLED(CONFIG_UBSAN_BOUNDS))
pr_expected_config(CONFIG_UBSAN_TRAP); else
pr_expected_config(CONFIG_UBSAN_BOUNDS);
}
/* * Adding to the list performs these actions: * test_head.next->prev = &good.node * good.node.next = test_head.next * good.node.prev = test_head * test_head.next = good.node
*/
list_add(&good.node, &test_head);
pr_info("attempting corrupted list addition\n"); /* * In simulating this "write what where" primitive, the "what" is * the address of &bad.node, and the "where" is the address held * by "redirection".
*/
test_head.next = redirection;
list_add(&bad.node, &test_head);
if (target[0] == NULL && target[1] == NULL)
pr_err("Overwrite did not happen, but no BUG?!\n"); else {
pr_err("list_add() corruption not detected!\n");
pr_expected_config(CONFIG_LIST_HARDENED);
}
}
pr_info("attempting good list removal\n");
list_del(&item.node);
pr_info("attempting corrupted list removal\n");
list_add(&item.node, &test_head);
/* As with the list_add() test above, this corrupts "next". */
item.node.next = redirection;
list_del(&item.node);
if (target[0] == NULL && target[1] == NULL)
pr_err("Overwrite did not happen, but no BUG?!\n"); else {
pr_err("list_del() corruption not detected!\n");
pr_expected_config(CONFIG_LIST_HARDENED);
}
}
/* Test that VMAP_STACK is actually allocating with a leading guard page */ staticvoid lkdtm_STACK_GUARD_PAGE_LEADING(void)
{ constunsignedchar *stack = task_stack_page(current); constunsignedchar *ptr = stack - 1; volatileunsignedchar byte;
pr_info("attempting bad read from page below current stack\n");
byte = *ptr;
pr_err("FAIL: accessed page before stack! (byte: %x)\n", byte);
}
/* Test that VMAP_STACK is actually allocating with a trailing guard page */ staticvoid lkdtm_STACK_GUARD_PAGE_TRAILING(void)
{ constunsignedchar *stack = task_stack_page(current); constunsignedchar *ptr = stack + THREAD_SIZE; volatileunsignedchar byte;
pr_info("attempting bad read from page above current stack\n");
byte = *ptr;
pr_err("FAIL: accessed page after stack! (byte: %x)\n", byte);
}
if ((cr4 & X86_CR4_SMEP) != X86_CR4_SMEP) {
pr_err("FAIL: SMEP not in use\n"); return;
}
cr4 &= ~(X86_CR4_SMEP);
pr_info("trying to clear SMEP normally\n");
native_write_cr4(cr4); if (cr4 == native_read_cr4()) {
pr_err("FAIL: pinning SMEP failed!\n");
cr4 |= X86_CR4_SMEP;
pr_info("restoring SMEP\n");
native_write_cr4(cr4); return;
}
pr_info("ok: SMEP did not get cleared\n");
/* * To test the post-write pinning verification we need to call * directly into the middle of native_write_cr4() where the * cr4 write happens, skipping any pinning. This searches for * the cr4 writing instruction.
*/
insn = (unsignedchar *)native_write_cr4;
OPTIMIZER_HIDE_VAR(insn); for (i = 0; i < MOV_CR4_DEPTH; i++) { /* mov %rdi, %cr4 */ if (insn[i] == 0x0f && insn[i+1] == 0x22 && insn[i+2] == 0xe7) break; /* mov %rdi,%rax; mov %rax, %cr4 */ if (insn[i] == 0x48 && insn[i+1] == 0x89 &&
insn[i+2] == 0xf8 && insn[i+3] == 0x0f &&
insn[i+4] == 0x22 && insn[i+5] == 0xe0) break;
} if (i >= MOV_CR4_DEPTH) {
pr_info("ok: cannot locate cr4 writing call gadget\n"); return;
}
direct_write_cr4 = (void *)(insn + i);
pr_info("trying to clear SMEP with call gadget\n");
direct_write_cr4(cr4); if (native_read_cr4() & X86_CR4_SMEP) {
pr_info("ok: SMEP removal was reverted\n");
} else {
pr_err("FAIL: cleared SMEP not detected!\n");
cr4 |= X86_CR4_SMEP;
pr_info("restoring SMEP\n");
native_write_cr4(cr4);
} #else
pr_err("XFAIL: this test is x86_64-only\n"); #endif
}
staticvoid lkdtm_DOUBLE_FAULT(void)
{ #if IS_ENABLED(CONFIG_X86_32) && !IS_ENABLED(CONFIG_UML) /* * Trigger #DF by setting the stack limit to zero. This clobbers * a GDT TLS slot, which is okay because the current task will die * anyway due to the double fault.
*/ struct desc_struct d = {
.type = 3, /* expand-up, writable, accessed data */
.p = 1, /* present */
.d = 1, /* 32-bit */
.g = 0, /* limit in bytes */
.s = 1, /* not system */
};
/* * Put our zero-limit segment in SS and then trigger a fault. The * 4-byte access to (%esp) will fault with #SS, and the attempt to * deliver the fault will recursively cause #SS and result in #DF. * This whole process happens while NMIs and MCEs are blocked by the * MOV SS window. This is nice because an NMI with an invalid SS * would also double-fault, resulting in the NMI or MCE being lost.
*/ asmvolatile ("movw %0, %%ss; addl $0, (%%esp)" :: "r" ((unsignedshort)(GDT_ENTRY_TLS_MIN << 3)));
pr_err("FAIL: tried to double fault but didn't die\n"); #else
pr_err("XFAIL: this test is ia32-only\n"); #endif
}
#ifdef CONFIG_ARM64 static noinline void change_pac_parameters(void)
{ if (IS_ENABLED(CONFIG_ARM64_PTR_AUTH_KERNEL)) { /* Reset the keys of current task */
ptrauth_thread_init_kernel(current);
ptrauth_thread_switch_kernel(current);
}
} #endif
if (!IS_ENABLED(CONFIG_ARM64_PTR_AUTH_KERNEL))
pr_err("FAIL: kernel not built with CONFIG_ARM64_PTR_AUTH_KERNEL\n");
if (!system_supports_address_auth()) {
pr_err("FAIL: CPU lacks pointer authentication feature\n"); return;
}
pr_info("changing PAC parameters to force function return failure...\n"); /* * PAC is a hash value computed from input keys, return address and * stack pointer. As pac has fewer bits so there is a chance of * collision, so iterate few times to reduce the collision probability.
*/ for (i = 0; i < CORRUPT_PAC_ITERATE; i++)
change_pac_parameters();
pr_err("FAIL: survived PAC changes! Kernel may be unstable from here\n"); #else
pr_err("XFAIL: this test is arm64-only\n"); #endif
}
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung und die Messung sind noch experimentell.