[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1438789735-4643-2-git-send-email-james.hogan@imgtec.com>
Date: Wed, 5 Aug 2015 16:48:49 +0100
From: James Hogan <james.hogan@...tec.com>
To: <linux-kernel@...r.kernel.org>
CC: <linux-arch@...r.kernel.org>, <linux-mips@...ux-mips.org>,
James Hogan <james.hogan@...tec.com>,
Kees Cook <keescook@...omium.org>,
Andrew Morton <akpm@...ux-foundation.org>
Subject: [PATCH 1/7] test_user_copy: Check legit kernel accesses
Check that the use of the user accessors for accessing kernel memory
succeed as expected after set_fs(get_ds()) is used to increases the
address limit, as used by the kernel to directly invoke system call code
with kernel pointers.
The tests are basically the same as the tests normally expected to be
treated as invalid, but without any user addresses (no reversed copies),
and with the result inverted such that they should succeed instead.
New tests:
- legitimate all-kernel copy_from_user
- legitimate all-kernel copy_to_user
- legitimate kernel get_user
- legitimate kernel put_user
Signed-off-by: James Hogan <james.hogan@...tec.com>
Cc: Kees Cook <keescook@...omium.org>
Cc: Andrew Morton <akpm@...ux-foundation.org>
---
lib/test_user_copy.c | 23 +++++++++++++++++++++++
1 file changed, 23 insertions(+)
diff --git a/lib/test_user_copy.c b/lib/test_user_copy.c
index 0ecef3e4690e..445ca92b0b80 100644
--- a/lib/test_user_copy.c
+++ b/lib/test_user_copy.c
@@ -41,6 +41,7 @@ static int __init test_user_copy_init(void)
char *bad_usermem;
unsigned long user_addr;
unsigned long value = 0x5A;
+ mm_segment_t fs = get_fs();
kmem = kmalloc(PAGE_SIZE * 2, GFP_KERNEL);
if (!kmem)
@@ -86,6 +87,28 @@ static int __init test_user_copy_init(void)
ret |= test(!put_user(value, (unsigned long __user *)kmem),
"illegal put_user passed");
+ /*
+ * Test access to kernel memory by adjusting address limit.
+ * This is used by the kernel to invoke system calls with kernel
+ * pointers.
+ */
+ set_fs(get_ds());
+
+ /* Legitimate usage: none of these should fail. */
+ ret |= test(copy_from_user(kmem, (char __user *)(kmem + PAGE_SIZE),
+ PAGE_SIZE),
+ "legitimate all-kernel copy_from_user failed");
+ ret |= test(copy_to_user((char __user *)kmem, kmem + PAGE_SIZE,
+ PAGE_SIZE),
+ "legitimate all-kernel copy_to_user failed");
+ ret |= test(get_user(value, (unsigned long __user *)kmem),
+ "legitimate kernel get_user failed");
+ ret |= test(put_user(value, (unsigned long __user *)kmem),
+ "legitimate kernel put_user failed");
+
+ /* Restore previous address limit. */
+ set_fs(fs);
+
vm_munmap(user_addr, PAGE_SIZE * 2);
kfree(kmem);
--
2.3.6
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists