Message ID | 20240430052845.31039-2-liwang@redhat.com |
---|---|
State | Changes Requested |
Headers | show |
Series | [v2,1/2] lib: add SAFE_CALLOC macro | expand |
Sorry forgot to attach the change from patch v1 to v2. Notes: V1 --> V2 * make use of SAFE_CALLOC macro * drop the linked list to store the ksymbols table * make use of onetime memory alloc to speed up test * add TDEBUG to print ksymbols if needed On Tue, Apr 30, 2024 at 1:29 PM Li Wang <liwang@redhat.com> wrote: > Access the system symbols with root permission to test whether it's > possible to read and write the memory addresses of kernel-space > from user-space. This helps in identifying potential vulnerabilities > where user-space processes can inappropriately access kernel memory. > > Suggested-by: Rafael Aquini <aquini@redhat.com> > Signed-off-by: Li Wang <liwang@redhat.com> > --- > runtest/mm | 2 + > testcases/kernel/security/kallsyms/.gitignore | 1 + > testcases/kernel/security/kallsyms/Makefile | 6 + > testcases/kernel/security/kallsyms/kallsyms.c | 141 ++++++++++++++++++ > 4 files changed, 150 insertions(+) > create mode 100644 testcases/kernel/security/kallsyms/.gitignore > create mode 100644 testcases/kernel/security/kallsyms/Makefile > create mode 100644 testcases/kernel/security/kallsyms/kallsyms.c > > diff --git a/runtest/mm b/runtest/mm > index d859b331c..6a8cd0b9d 100644 > --- a/runtest/mm > +++ b/runtest/mm > @@ -58,6 +58,8 @@ mmap10_2 mmap10 -s > mmap10_3 mmap10 -a -s > mmap10_4 mmap10 -a -s -i 60 > > +kallsyms kallsyms > + > ksm01 ksm01 > ksm01_1 ksm01 -u 128 > ksm02 ksm02 > diff --git a/testcases/kernel/security/kallsyms/.gitignore > b/testcases/kernel/security/kallsyms/.gitignore > new file mode 100644 > index 000000000..7074d4e24 > --- /dev/null > +++ b/testcases/kernel/security/kallsyms/.gitignore > @@ -0,0 +1 @@ > +kallsyms > diff --git a/testcases/kernel/security/kallsyms/Makefile > b/testcases/kernel/security/kallsyms/Makefile > new file mode 100644 > index 000000000..5ea7d67db > --- /dev/null > +++ b/testcases/kernel/security/kallsyms/Makefile > @@ -0,0 +1,6 @@ > +# SPDX-License-Identifier: GPL-2.0-or-later > + > +top_srcdir ?= ../../../.. > + > +include $(top_srcdir)/include/mk/testcases.mk > +include $(top_srcdir)/include/mk/generic_leaf_target.mk > diff --git a/testcases/kernel/security/kallsyms/kallsyms.c > b/testcases/kernel/security/kallsyms/kallsyms.c > new file mode 100644 > index 000000000..228d4d973 > --- /dev/null > +++ b/testcases/kernel/security/kallsyms/kallsyms.c > @@ -0,0 +1,141 @@ > +// SPDX-License-Identifier: GPL-2.0-only > +/* > + * Copyright (C) 2024 Red Hat, Inc. > + */ > + > +/*\ > + * [Description] > + * > + * Utilize kernel's symbol table for unauthorized address access. > + * > + * Access the system symbols with root permission to test whether it's > + * possible to read and write the memory addresses of kernel-space > + * from user-space. This helps in identifying potential vulnerabilities > + * where user-space processes can inappropriately access kernel memory. > + * > + * Steps: > + * 1. Start a process that reads all symbols and their addresses from > + * '/proc/kallsyms' and stores them in a linked list. > + * > + * 2. Attempt to write to each kernel address found in the linked list. > + * The expectation is that each attempt will fail with a SIGSEGV > + * (segmentation fault), indicating that the user-space process > + * cannot write to kernel memory. > + * > + * 3. Handle each SIGSEGV using a signal handler that sets a flag and > + * long jumps out of the faulting context. > + * > + * 4. If any write operation does not result in a SIGSEGV, log this as > + * a potential security vulnerability. > + * > + * 5. Observe and log the behavior and any system responses to these > + * unauthorized access attempts. > + * > + */ > + > +#include <stdio.h> > +#include <stdlib.h> > +#include <assert.h> > +#include <unistd.h> > +#include <string.h> > +#include <setjmp.h> > +#include <signal.h> > + > +#include "tst_test.h" > +#include "tst_safe_stdio.h" > + > +struct kallsym { > + unsigned long addr; > + char type; > + char name[128]; > +}; > + > +static struct kallsym *sym_table; > +static unsigned int nr_symbols; > +static sigjmp_buf jmpbuf; > +volatile sig_atomic_t segv_caught = 0; > + > +static void segv_handler(int sig) > +{ > + if (sig == SIGSEGV) > + segv_caught++; > + else > + tst_res(TFAIL, "Unexpected signal %s", strsignal(sig)); > + > + siglongjmp(jmpbuf, 1); > +} > + > +static unsigned int read_kallsyms(struct kallsym *table, unsigned int > table_size) > +{ > + char *line = NULL; > + size_t len = 0; > + unsigned int nr_syms = 0; > + FILE *stream = SAFE_FOPEN("/proc/kallsyms", "r"); > + > + while (getline(&line, &len, stream) != -1) { > + > + if (table && nr_syms < table_size) { > + sscanf(line, "%lx %c %s", > + &table[nr_syms].addr, > + &table[nr_syms].type, > + table[nr_syms].name); > + } > + > + nr_syms++; > + } > + > + SAFE_FCLOSE(stream); > + > + return nr_syms; > +} > + > +static void setup(void) > +{ > + nr_symbols = read_kallsyms(NULL, 0); > + sym_table = SAFE_CALLOC(nr_symbols, sizeof(*sym_table)); > + unsigned int read_symbols = read_kallsyms(sym_table, nr_symbols); > + > + if (nr_symbols != read_symbols) > + tst_res(TWARN, "/proc/kallsyms changed size!?"); > +} > + > +static void access_ksymbols_address(struct kallsym *table) > +{ > + tst_res(TDEBUG, "Access kernel addr: 0x%lx (%c) (%s)", > + table->addr, table->type, table->name); > + > + if (sigsetjmp(jmpbuf, 1) == 0) { > + *(volatile unsigned long *)table->addr = 0; > + > + tst_res(TFAIL, "Successfully accessed kernel addr 0x%lx > (%c) (%s)", > + table->addr, table->type, table->name); > + } > +} > + > +static void test_access_kernel_address(void) > +{ > + struct sigaction sa; > + memset(&sa, 0, sizeof(sa)); > + sa.sa_handler = segv_handler; > + sigaction(SIGSEGV, &sa, NULL); > + > + for (unsigned int i = 0; i < nr_symbols; i++) > + access_ksymbols_address(&sym_table[i]); > + > + if (segv_caught == (sig_atomic_t)nr_symbols) > + tst_res(TPASS, "Caught %d times SIGSEGV in access ksymbols > addr", segv_caught); > +} > + > +static void cleanup(void) > +{ > + if (sym_table) > + free(sym_table); > +} > + > +static struct tst_test test = { > + .needs_root = 1, > + .setup = setup, > + .cleanup = cleanup, > + .max_runtime = 60, > + .test_all = test_access_kernel_address, > +}; > -- > 2.40.1 > > > -- > Mailing list info: https://lists.linux.it/listinfo/ltp > >
Hi! > @@ -0,0 +1,141 @@ > +// SPDX-License-Identifier: GPL-2.0-only Any reason this is GPL-2.0-only and not 2.0-or-later? > +/* > + * Copyright (C) 2024 Red Hat, Inc. > + */ > + > +/*\ > + * [Description] > + * > + * Utilize kernel's symbol table for unauthorized address access. > + * > + * Access the system symbols with root permission to test whether it's > + * possible to read and write the memory addresses of kernel-space > + * from user-space. This helps in identifying potential vulnerabilities > + * where user-space processes can inappropriately access kernel memory. > + * > + * Steps: > + * 1. Start a process that reads all symbols and their addresses from > + * '/proc/kallsyms' and stores them in a linked list. > + * > + * 2. Attempt to write to each kernel address found in the linked list. > + * The expectation is that each attempt will fail with a SIGSEGV > + * (segmentation fault), indicating that the user-space process > + * cannot write to kernel memory. > + * > + * 3. Handle each SIGSEGV using a signal handler that sets a flag and > + * long jumps out of the faulting context. > + * > + * 4. If any write operation does not result in a SIGSEGV, log this as > + * a potential security vulnerability. > + * > + * 5. Observe and log the behavior and any system responses to these > + * unauthorized access attempts. > + * > + */ > + > +#include <stdio.h> > +#include <stdlib.h> > +#include <assert.h> > +#include <unistd.h> > +#include <string.h> > +#include <setjmp.h> > +#include <signal.h> > + > +#include "tst_test.h" > +#include "tst_safe_stdio.h" > + > +struct kallsym { > + unsigned long addr; > + char type; > + char name[128]; > +}; > + > +static struct kallsym *sym_table; > +static unsigned int nr_symbols; > +static sigjmp_buf jmpbuf; > +volatile sig_atomic_t segv_caught = 0; > + > +static void segv_handler(int sig) > +{ > + if (sig == SIGSEGV) > + segv_caught++; > + else > + tst_res(TFAIL, "Unexpected signal %s", strsignal(sig)); > + > + siglongjmp(jmpbuf, 1); > +} > + > +static unsigned int read_kallsyms(struct kallsym *table, unsigned int table_size) > +{ > + char *line = NULL; > + size_t len = 0; > + unsigned int nr_syms = 0; > + FILE *stream = SAFE_FOPEN("/proc/kallsyms", "r"); > + > + while (getline(&line, &len, stream) != -1) { > + > + if (table && nr_syms < table_size) { > + sscanf(line, "%lx %c %s", > + &table[nr_syms].addr, > + &table[nr_syms].type, > + table[nr_syms].name); > + } > + > + nr_syms++; > + } > + > + SAFE_FCLOSE(stream); > + > + return nr_syms; > +} > + > +static void setup(void) > +{ > + nr_symbols = read_kallsyms(NULL, 0); > + sym_table = SAFE_CALLOC(nr_symbols, sizeof(*sym_table)); > + unsigned int read_symbols = read_kallsyms(sym_table, nr_symbols); > + > + if (nr_symbols != read_symbols) > + tst_res(TWARN, "/proc/kallsyms changed size!?"); > +} > + > +static void access_ksymbols_address(struct kallsym *table) > +{ > + tst_res(TDEBUG, "Access kernel addr: 0x%lx (%c) (%s)", > + table->addr, table->type, table->name); > + > + if (sigsetjmp(jmpbuf, 1) == 0) { > + *(volatile unsigned long *)table->addr = 0; > + > + tst_res(TFAIL, "Successfully accessed kernel addr 0x%lx (%c) (%s)", > + table->addr, table->type, table->name); > + } > +} > + > +static void test_access_kernel_address(void) > +{ > + struct sigaction sa; > + memset(&sa, 0, sizeof(sa)); > + sa.sa_handler = segv_handler; > + sigaction(SIGSEGV, &sa, NULL); We can move the sigaction to the test setup. > + for (unsigned int i = 0; i < nr_symbols; i++) > + access_ksymbols_address(&sym_table[i]); And we have to set the segv_caught to 0 before this loop, otherwise the test does not work with -i 2 > + if (segv_caught == (sig_atomic_t)nr_symbols) > + tst_res(TPASS, "Caught %d times SIGSEGV in access ksymbols addr", segv_caught); And also in a case that we got wrong number on segfaults this does not produce any results. I guess that we need to do: if (...) tst_res(TPASS, "..."); else tst_res(TFAIL, "Caught %d SIGSEGV expected %d", ...); > +} > + > +static void cleanup(void) > +{ > + if (sym_table) > + free(sym_table); > +} > + > +static struct tst_test test = { > + .needs_root = 1, > + .setup = setup, > + .cleanup = cleanup, > + .max_runtime = 60, > + .test_all = test_access_kernel_address, > +}; > -- > 2.40.1 > > > -- > Mailing list info: https://lists.linux.it/listinfo/ltp
Hi Cyril, All comments make sense, patch v3 is coming. On Thu, May 2, 2024 at 6:30 PM Cyril Hrubis <chrubis@suse.cz> wrote: > Hi! > > @@ -0,0 +1,141 @@ > > +// SPDX-License-Identifier: GPL-2.0-only > > Any reason this is GPL-2.0-only and not 2.0-or-later? > > > +/* > > + * Copyright (C) 2024 Red Hat, Inc. > > + */ > > + > > +/*\ > > + * [Description] > > + * > > + * Utilize kernel's symbol table for unauthorized address access. > > + * > > + * Access the system symbols with root permission to test whether it's > > + * possible to read and write the memory addresses of kernel-space > > + * from user-space. This helps in identifying potential vulnerabilities > > + * where user-space processes can inappropriately access kernel memory. > > + * > > + * Steps: > > + * 1. Start a process that reads all symbols and their addresses from > > + * '/proc/kallsyms' and stores them in a linked list. > > + * > > + * 2. Attempt to write to each kernel address found in the linked list. > > + * The expectation is that each attempt will fail with a SIGSEGV > > + * (segmentation fault), indicating that the user-space process > > + * cannot write to kernel memory. > > + * > > + * 3. Handle each SIGSEGV using a signal handler that sets a flag and > > + * long jumps out of the faulting context. > > + * > > + * 4. If any write operation does not result in a SIGSEGV, log this as > > + * a potential security vulnerability. > > + * > > + * 5. Observe and log the behavior and any system responses to these > > + * unauthorized access attempts. > > + * > > + */ > > + > > +#include <stdio.h> > > +#include <stdlib.h> > > +#include <assert.h> > > +#include <unistd.h> > > +#include <string.h> > > +#include <setjmp.h> > > +#include <signal.h> > > + > > +#include "tst_test.h" > > +#include "tst_safe_stdio.h" > > + > > +struct kallsym { > > + unsigned long addr; > > + char type; > > + char name[128]; > > +}; > > + > > +static struct kallsym *sym_table; > > +static unsigned int nr_symbols; > > +static sigjmp_buf jmpbuf; > > +volatile sig_atomic_t segv_caught = 0; > > + > > +static void segv_handler(int sig) > > +{ > > + if (sig == SIGSEGV) > > + segv_caught++; > > + else > > + tst_res(TFAIL, "Unexpected signal %s", strsignal(sig)); > > + > > + siglongjmp(jmpbuf, 1); > > +} > > + > > +static unsigned int read_kallsyms(struct kallsym *table, unsigned int > table_size) > > +{ > > + char *line = NULL; > > + size_t len = 0; > > + unsigned int nr_syms = 0; > > + FILE *stream = SAFE_FOPEN("/proc/kallsyms", "r"); > > + > > + while (getline(&line, &len, stream) != -1) { > > + > > + if (table && nr_syms < table_size) { > > + sscanf(line, "%lx %c %s", > > + &table[nr_syms].addr, > > + &table[nr_syms].type, > > + table[nr_syms].name); > > + } > > + > > + nr_syms++; > > + } > > + > > + SAFE_FCLOSE(stream); > > + > > + return nr_syms; > > +} > > + > > +static void setup(void) > > +{ > > + nr_symbols = read_kallsyms(NULL, 0); > > + sym_table = SAFE_CALLOC(nr_symbols, sizeof(*sym_table)); > > + unsigned int read_symbols = read_kallsyms(sym_table, nr_symbols); > > + > > + if (nr_symbols != read_symbols) > > + tst_res(TWARN, "/proc/kallsyms changed size!?"); > > +} > > + > > +static void access_ksymbols_address(struct kallsym *table) > > +{ > > + tst_res(TDEBUG, "Access kernel addr: 0x%lx (%c) (%s)", > > + table->addr, table->type, table->name); > > + > > + if (sigsetjmp(jmpbuf, 1) == 0) { > > + *(volatile unsigned long *)table->addr = 0; > > + > > + tst_res(TFAIL, "Successfully accessed kernel addr 0x%lx > (%c) (%s)", > > + table->addr, table->type, table->name); > > + } > > +} > > + > > +static void test_access_kernel_address(void) > > +{ > > + struct sigaction sa; > > + memset(&sa, 0, sizeof(sa)); > > + sa.sa_handler = segv_handler; > > + sigaction(SIGSEGV, &sa, NULL); > > We can move the sigaction to the test setup. > > > + for (unsigned int i = 0; i < nr_symbols; i++) > > + access_ksymbols_address(&sym_table[i]); > > And we have to set the segv_caught to 0 before this loop, otherwise the > test does not work with -i 2 > > > + if (segv_caught == (sig_atomic_t)nr_symbols) > > + tst_res(TPASS, "Caught %d times SIGSEGV in access ksymbols > addr", segv_caught); > > And also in a case that we got wrong number on segfaults this does not > produce any results. I guess that we need to do: > > if (...) > tst_res(TPASS, "..."); > else > tst_res(TFAIL, "Caught %d SIGSEGV expected %d", ...); > > > > +} > > + > > +static void cleanup(void) > > +{ > > + if (sym_table) > > + free(sym_table); > > +} > > + > > +static struct tst_test test = { > > + .needs_root = 1, > > + .setup = setup, > > + .cleanup = cleanup, > > + .max_runtime = 60, > > + .test_all = test_access_kernel_address, > > +}; > > -- > > 2.40.1 > > > > > > -- > > Mailing list info: https://lists.linux.it/listinfo/ltp > > -- > Cyril Hrubis > chrubis@suse.cz > >
diff --git a/runtest/mm b/runtest/mm index d859b331c..6a8cd0b9d 100644 --- a/runtest/mm +++ b/runtest/mm @@ -58,6 +58,8 @@ mmap10_2 mmap10 -s mmap10_3 mmap10 -a -s mmap10_4 mmap10 -a -s -i 60 +kallsyms kallsyms + ksm01 ksm01 ksm01_1 ksm01 -u 128 ksm02 ksm02 diff --git a/testcases/kernel/security/kallsyms/.gitignore b/testcases/kernel/security/kallsyms/.gitignore new file mode 100644 index 000000000..7074d4e24 --- /dev/null +++ b/testcases/kernel/security/kallsyms/.gitignore @@ -0,0 +1 @@ +kallsyms diff --git a/testcases/kernel/security/kallsyms/Makefile b/testcases/kernel/security/kallsyms/Makefile new file mode 100644 index 000000000..5ea7d67db --- /dev/null +++ b/testcases/kernel/security/kallsyms/Makefile @@ -0,0 +1,6 @@ +# SPDX-License-Identifier: GPL-2.0-or-later + +top_srcdir ?= ../../../.. + +include $(top_srcdir)/include/mk/testcases.mk +include $(top_srcdir)/include/mk/generic_leaf_target.mk diff --git a/testcases/kernel/security/kallsyms/kallsyms.c b/testcases/kernel/security/kallsyms/kallsyms.c new file mode 100644 index 000000000..228d4d973 --- /dev/null +++ b/testcases/kernel/security/kallsyms/kallsyms.c @@ -0,0 +1,141 @@ +// SPDX-License-Identifier: GPL-2.0-only +/* + * Copyright (C) 2024 Red Hat, Inc. + */ + +/*\ + * [Description] + * + * Utilize kernel's symbol table for unauthorized address access. + * + * Access the system symbols with root permission to test whether it's + * possible to read and write the memory addresses of kernel-space + * from user-space. This helps in identifying potential vulnerabilities + * where user-space processes can inappropriately access kernel memory. + * + * Steps: + * 1. Start a process that reads all symbols and their addresses from + * '/proc/kallsyms' and stores them in a linked list. + * + * 2. Attempt to write to each kernel address found in the linked list. + * The expectation is that each attempt will fail with a SIGSEGV + * (segmentation fault), indicating that the user-space process + * cannot write to kernel memory. + * + * 3. Handle each SIGSEGV using a signal handler that sets a flag and + * long jumps out of the faulting context. + * + * 4. If any write operation does not result in a SIGSEGV, log this as + * a potential security vulnerability. + * + * 5. Observe and log the behavior and any system responses to these + * unauthorized access attempts. + * + */ + +#include <stdio.h> +#include <stdlib.h> +#include <assert.h> +#include <unistd.h> +#include <string.h> +#include <setjmp.h> +#include <signal.h> + +#include "tst_test.h" +#include "tst_safe_stdio.h" + +struct kallsym { + unsigned long addr; + char type; + char name[128]; +}; + +static struct kallsym *sym_table; +static unsigned int nr_symbols; +static sigjmp_buf jmpbuf; +volatile sig_atomic_t segv_caught = 0; + +static void segv_handler(int sig) +{ + if (sig == SIGSEGV) + segv_caught++; + else + tst_res(TFAIL, "Unexpected signal %s", strsignal(sig)); + + siglongjmp(jmpbuf, 1); +} + +static unsigned int read_kallsyms(struct kallsym *table, unsigned int table_size) +{ + char *line = NULL; + size_t len = 0; + unsigned int nr_syms = 0; + FILE *stream = SAFE_FOPEN("/proc/kallsyms", "r"); + + while (getline(&line, &len, stream) != -1) { + + if (table && nr_syms < table_size) { + sscanf(line, "%lx %c %s", + &table[nr_syms].addr, + &table[nr_syms].type, + table[nr_syms].name); + } + + nr_syms++; + } + + SAFE_FCLOSE(stream); + + return nr_syms; +} + +static void setup(void) +{ + nr_symbols = read_kallsyms(NULL, 0); + sym_table = SAFE_CALLOC(nr_symbols, sizeof(*sym_table)); + unsigned int read_symbols = read_kallsyms(sym_table, nr_symbols); + + if (nr_symbols != read_symbols) + tst_res(TWARN, "/proc/kallsyms changed size!?"); +} + +static void access_ksymbols_address(struct kallsym *table) +{ + tst_res(TDEBUG, "Access kernel addr: 0x%lx (%c) (%s)", + table->addr, table->type, table->name); + + if (sigsetjmp(jmpbuf, 1) == 0) { + *(volatile unsigned long *)table->addr = 0; + + tst_res(TFAIL, "Successfully accessed kernel addr 0x%lx (%c) (%s)", + table->addr, table->type, table->name); + } +} + +static void test_access_kernel_address(void) +{ + struct sigaction sa; + memset(&sa, 0, sizeof(sa)); + sa.sa_handler = segv_handler; + sigaction(SIGSEGV, &sa, NULL); + + for (unsigned int i = 0; i < nr_symbols; i++) + access_ksymbols_address(&sym_table[i]); + + if (segv_caught == (sig_atomic_t)nr_symbols) + tst_res(TPASS, "Caught %d times SIGSEGV in access ksymbols addr", segv_caught); +} + +static void cleanup(void) +{ + if (sym_table) + free(sym_table); +} + +static struct tst_test test = { + .needs_root = 1, + .setup = setup, + .cleanup = cleanup, + .max_runtime = 60, + .test_all = test_access_kernel_address, +};
Access the system symbols with root permission to test whether it's possible to read and write the memory addresses of kernel-space from user-space. This helps in identifying potential vulnerabilities where user-space processes can inappropriately access kernel memory. Suggested-by: Rafael Aquini <aquini@redhat.com> Signed-off-by: Li Wang <liwang@redhat.com> --- runtest/mm | 2 + testcases/kernel/security/kallsyms/.gitignore | 1 + testcases/kernel/security/kallsyms/Makefile | 6 + testcases/kernel/security/kallsyms/kallsyms.c | 141 ++++++++++++++++++ 4 files changed, 150 insertions(+) create mode 100644 testcases/kernel/security/kallsyms/.gitignore create mode 100644 testcases/kernel/security/kallsyms/Makefile create mode 100644 testcases/kernel/security/kallsyms/kallsyms.c