Commit b0386979 authored by Andy Lutomirski's avatar Andy Lutomirski Committed by Thomas Gleixner

selftests/x86/vsyscall: Verify that vsyscall=none blocks execution

If vsyscall=none accidentally still allowed vsyscalls, the test wouldn't
fail.  Fix it.
Signed-off-by: default avatarAndy Lutomirski <luto@kernel.org>
Signed-off-by: default avatarThomas Gleixner <tglx@linutronix.de>
Reviewed-by: default avatarKees Cook <keescook@chromium.org>
Cc: Florian Weimer <fweimer@redhat.com>
Cc: Jann Horn <jannh@google.com>
Cc: Borislav Petkov <bp@alien8.de>
Cc: Kernel Hardening <kernel-hardening@lists.openwall.com>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: https://lkml.kernel.org/r/b413397c804265f8865f3e70b14b09485ea7c314.1561610354.git.luto@kernel.org
parent e0a446ce
...@@ -49,21 +49,21 @@ static void sethandler(int sig, void (*handler)(int, siginfo_t *, void *), ...@@ -49,21 +49,21 @@ static void sethandler(int sig, void (*handler)(int, siginfo_t *, void *),
} }
/* vsyscalls and vDSO */ /* vsyscalls and vDSO */
bool should_read_vsyscall = false; bool vsyscall_map_r = false, vsyscall_map_x = false;
typedef long (*gtod_t)(struct timeval *tv, struct timezone *tz); typedef long (*gtod_t)(struct timeval *tv, struct timezone *tz);
gtod_t vgtod = (gtod_t)VSYS(0xffffffffff600000); const gtod_t vgtod = (gtod_t)VSYS(0xffffffffff600000);
gtod_t vdso_gtod; gtod_t vdso_gtod;
typedef int (*vgettime_t)(clockid_t, struct timespec *); typedef int (*vgettime_t)(clockid_t, struct timespec *);
vgettime_t vdso_gettime; vgettime_t vdso_gettime;
typedef long (*time_func_t)(time_t *t); typedef long (*time_func_t)(time_t *t);
time_func_t vtime = (time_func_t)VSYS(0xffffffffff600400); const time_func_t vtime = (time_func_t)VSYS(0xffffffffff600400);
time_func_t vdso_time; time_func_t vdso_time;
typedef long (*getcpu_t)(unsigned *, unsigned *, void *); typedef long (*getcpu_t)(unsigned *, unsigned *, void *);
getcpu_t vgetcpu = (getcpu_t)VSYS(0xffffffffff600800); const getcpu_t vgetcpu = (getcpu_t)VSYS(0xffffffffff600800);
getcpu_t vdso_getcpu; getcpu_t vdso_getcpu;
static void init_vdso(void) static void init_vdso(void)
...@@ -107,7 +107,7 @@ static int init_vsys(void) ...@@ -107,7 +107,7 @@ static int init_vsys(void)
maps = fopen("/proc/self/maps", "r"); maps = fopen("/proc/self/maps", "r");
if (!maps) { if (!maps) {
printf("[WARN]\tCould not open /proc/self/maps -- assuming vsyscall is r-x\n"); printf("[WARN]\tCould not open /proc/self/maps -- assuming vsyscall is r-x\n");
should_read_vsyscall = true; vsyscall_map_r = true;
return 0; return 0;
} }
...@@ -133,12 +133,8 @@ static int init_vsys(void) ...@@ -133,12 +133,8 @@ static int init_vsys(void)
} }
printf("\tvsyscall permissions are %c-%c\n", r, x); printf("\tvsyscall permissions are %c-%c\n", r, x);
should_read_vsyscall = (r == 'r'); vsyscall_map_r = (r == 'r');
if (x != 'x') { vsyscall_map_x = (x == 'x');
vgtod = NULL;
vtime = NULL;
vgetcpu = NULL;
}
found = true; found = true;
break; break;
...@@ -148,10 +144,8 @@ static int init_vsys(void) ...@@ -148,10 +144,8 @@ static int init_vsys(void)
if (!found) { if (!found) {
printf("\tno vsyscall map in /proc/self/maps\n"); printf("\tno vsyscall map in /proc/self/maps\n");
should_read_vsyscall = false; vsyscall_map_r = false;
vgtod = NULL; vsyscall_map_x = false;
vtime = NULL;
vgetcpu = NULL;
} }
return nerrs; return nerrs;
...@@ -242,7 +236,7 @@ static int test_gtod(void) ...@@ -242,7 +236,7 @@ static int test_gtod(void)
err(1, "syscall gettimeofday"); err(1, "syscall gettimeofday");
if (vdso_gtod) if (vdso_gtod)
ret_vdso = vdso_gtod(&tv_vdso, &tz_vdso); ret_vdso = vdso_gtod(&tv_vdso, &tz_vdso);
if (vgtod) if (vsyscall_map_x)
ret_vsys = vgtod(&tv_vsys, &tz_vsys); ret_vsys = vgtod(&tv_vsys, &tz_vsys);
if (sys_gtod(&tv_sys2, &tz_sys) != 0) if (sys_gtod(&tv_sys2, &tz_sys) != 0)
err(1, "syscall gettimeofday"); err(1, "syscall gettimeofday");
...@@ -256,7 +250,7 @@ static int test_gtod(void) ...@@ -256,7 +250,7 @@ static int test_gtod(void)
} }
} }
if (vgtod) { if (vsyscall_map_x) {
if (ret_vsys == 0) { if (ret_vsys == 0) {
nerrs += check_gtod(&tv_sys1, &tv_sys2, &tz_sys, "vsyscall", &tv_vsys, &tz_vsys); nerrs += check_gtod(&tv_sys1, &tv_sys2, &tz_sys, "vsyscall", &tv_vsys, &tz_vsys);
} else { } else {
...@@ -277,7 +271,7 @@ static int test_time(void) { ...@@ -277,7 +271,7 @@ static int test_time(void) {
t_sys1 = sys_time(&t2_sys1); t_sys1 = sys_time(&t2_sys1);
if (vdso_time) if (vdso_time)
t_vdso = vdso_time(&t2_vdso); t_vdso = vdso_time(&t2_vdso);
if (vtime) if (vsyscall_map_x)
t_vsys = vtime(&t2_vsys); t_vsys = vtime(&t2_vsys);
t_sys2 = sys_time(&t2_sys2); t_sys2 = sys_time(&t2_sys2);
if (t_sys1 < 0 || t_sys1 != t2_sys1 || t_sys2 < 0 || t_sys2 != t2_sys2) { if (t_sys1 < 0 || t_sys1 != t2_sys1 || t_sys2 < 0 || t_sys2 != t2_sys2) {
...@@ -298,7 +292,7 @@ static int test_time(void) { ...@@ -298,7 +292,7 @@ static int test_time(void) {
} }
} }
if (vtime) { if (vsyscall_map_x) {
if (t_vsys < 0 || t_vsys != t2_vsys) { if (t_vsys < 0 || t_vsys != t2_vsys) {
printf("[FAIL]\tvsyscall failed (ret:%ld output:%ld)\n", t_vsys, t2_vsys); printf("[FAIL]\tvsyscall failed (ret:%ld output:%ld)\n", t_vsys, t2_vsys);
nerrs++; nerrs++;
...@@ -334,7 +328,7 @@ static int test_getcpu(int cpu) ...@@ -334,7 +328,7 @@ static int test_getcpu(int cpu)
ret_sys = sys_getcpu(&cpu_sys, &node_sys, 0); ret_sys = sys_getcpu(&cpu_sys, &node_sys, 0);
if (vdso_getcpu) if (vdso_getcpu)
ret_vdso = vdso_getcpu(&cpu_vdso, &node_vdso, 0); ret_vdso = vdso_getcpu(&cpu_vdso, &node_vdso, 0);
if (vgetcpu) if (vsyscall_map_x)
ret_vsys = vgetcpu(&cpu_vsys, &node_vsys, 0); ret_vsys = vgetcpu(&cpu_vsys, &node_vsys, 0);
if (ret_sys == 0) { if (ret_sys == 0) {
...@@ -373,7 +367,7 @@ static int test_getcpu(int cpu) ...@@ -373,7 +367,7 @@ static int test_getcpu(int cpu)
} }
} }
if (vgetcpu) { if (vsyscall_map_x) {
if (ret_vsys) { if (ret_vsys) {
printf("[FAIL]\tvsyscall getcpu() failed\n"); printf("[FAIL]\tvsyscall getcpu() failed\n");
nerrs++; nerrs++;
...@@ -414,10 +408,10 @@ static int test_vsys_r(void) ...@@ -414,10 +408,10 @@ static int test_vsys_r(void)
can_read = false; can_read = false;
} }
if (can_read && !should_read_vsyscall) { if (can_read && !vsyscall_map_r) {
printf("[FAIL]\tWe have read access, but we shouldn't\n"); printf("[FAIL]\tWe have read access, but we shouldn't\n");
return 1; return 1;
} else if (!can_read && should_read_vsyscall) { } else if (!can_read && vsyscall_map_r) {
printf("[FAIL]\tWe don't have read access, but we should\n"); printf("[FAIL]\tWe don't have read access, but we should\n");
return 1; return 1;
} else if (can_read) { } else if (can_read) {
...@@ -431,6 +425,39 @@ static int test_vsys_r(void) ...@@ -431,6 +425,39 @@ static int test_vsys_r(void)
return 0; return 0;
} }
static int test_vsys_x(void)
{
#ifdef __x86_64__
if (vsyscall_map_x) {
/* We already tested this adequately. */
return 0;
}
printf("[RUN]\tMake sure that vsyscalls really page fault\n");
bool can_exec;
if (sigsetjmp(jmpbuf, 1) == 0) {
vgtod(NULL, NULL);
can_exec = true;
} else {
can_exec = false;
}
if (can_exec) {
printf("[FAIL]\tExecuting the vsyscall did not page fault\n");
return 1;
} else if (segv_err & (1 << 4)) { /* INSTR */
printf("[OK]\tExecuting the vsyscall page failed: #PF(0x%lx)\n",
segv_err);
} else {
printf("[FAILT]\tExecution failed with the wrong error: #PF(0x%lx)\n",
segv_err);
return 1;
}
#endif
return 0;
}
#ifdef __x86_64__ #ifdef __x86_64__
#define X86_EFLAGS_TF (1UL << 8) #define X86_EFLAGS_TF (1UL << 8)
...@@ -462,7 +489,7 @@ static int test_emulation(void) ...@@ -462,7 +489,7 @@ static int test_emulation(void)
time_t tmp; time_t tmp;
bool is_native; bool is_native;
if (!vtime) if (!vsyscall_map_x)
return 0; return 0;
printf("[RUN]\tchecking that vsyscalls are emulated\n"); printf("[RUN]\tchecking that vsyscalls are emulated\n");
...@@ -504,6 +531,7 @@ int main(int argc, char **argv) ...@@ -504,6 +531,7 @@ int main(int argc, char **argv)
sethandler(SIGSEGV, sigsegv, 0); sethandler(SIGSEGV, sigsegv, 0);
nerrs += test_vsys_r(); nerrs += test_vsys_r();
nerrs += test_vsys_x();
#ifdef __x86_64__ #ifdef __x86_64__
nerrs += test_emulation(); nerrs += test_emulation();
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment