[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20171128062824.GU17858@eros>
Date: Tue, 28 Nov 2017 17:28:24 +1100
From: "Tobin C. Harding" <me@...in.cc>
To: kaiwan.billimoria@...il.com
Cc: linux-kernel@...r.kernel.org,
"kernel-hardening@...ts.openwall.com"
<kernel-hardening@...ts.openwall.com>
Subject: Re: [PATCH v2] scripts: leaking_addresses: add support for 32-bit
kernel addresses
On Mon, Nov 27, 2017 at 08:42:16AM +0530, kaiwan.billimoria@...il.com wrote:
> Currently, leaking_addresses.pl only supports scanning and displaying 'leaked'
> 64-bit kernel virtual addresses. We can scan for and display 'leaked' 32-bit
> kernel virtual addresses as well.
Hi Kaiwan,
This is starting to look good. I have a few suggestions and comments. I
applied your patch and played around with it. At this stage I am unsure
how best to convey my ideas back to you. It seems that adding 32 bit x86
support is making a big enough change to the script that rather than you
patching and me maintaining we could see it more as co-developing the
patch. I am in no way trying to take away from your changes, I'm happy
for all work we end up with being applied with you as the author.
The reasons for me doing this instead of just commenting inline is that
1. I'm not a pro Perl hacker, so commenting in line in English is prone
to error.
2. I've only been a maintainer for a couple of weeks so I'm learning on
the job.
If you are happy with this, I will email a patch to you (and CC
kernel-hardening). You could then look at it and see what things you
like and what things you don't. Also I have not got access to a 32 bit
x86 machine so it has not been tested. Once you are happy with it
perhaps you could re-send as v3 and then I can apply it to the tree with
you as the author.
We don't seem to be getting a lot of interest from the list but if any
other maintainers want to step in and school us, please do.
If any Perl mongers would like to correct us, also this would be
awesome.
The main aims of my changes to your patch are:
1. Keep inline with current script as much as possible.
2. Keep code as clean as possible (Perl can go to spaghetti really fast).
3. Try to keep the architecture stuff un-entangled, assuming more
architecture specific code will be needed in the future.
And now I'll add a few comments inline intended to add clarity to my
patch when it comes.
Thanks Kaiwan. If any of my methods are unclear or you don't like them
please do say. I'm hear to learn also, we are shooting for the best
Kernel possible.
> Briefly, the way it works: once it detects we're running on an i'x'86 platform,
> (where x=3|4|5|6), it takes this arch into account for checking. The essential
> rationale:
> if 32-bit-virt-addr >= PAGE_OFFSET => it's a kernel virtual address.
>
> This version programatically queries and sets PAGE_OFFSET based on it's value
> in one of these files: /boot/config, /boot/config-$(uname -r) and
> /proc/config.gz. If, for any reason, none of these files can be used, we
> fallback to requesting the user to pass PAGE_OFFSET as an option switch.
I re-wrote the commit log. Take it or leave it, as you please.
> Feedback welcome..
>
>
> Kaiwan N Billimoria (1):
> scripts: leaking_addresses: add support for 32-bit kernel addresses
>
> scripts/leaking_addresses.pl | 150 +++++++++++++++++++++++++++++++++++++------
> 1 file changed, 132 insertions(+), 18 deletions(-)
>
> Signed-off-by: Kaiwan N Billimoria <kaiwan.billimoria@...il.com>
> ---
> diff --git a/scripts/leaking_addresses.pl b/scripts/leaking_addresses.pl
> index 2d5336b3e1ea..fccd0a5094f1 100755
> --- a/scripts/leaking_addresses.pl
> +++ b/scripts/leaking_addresses.pl
> @@ -5,7 +5,7 @@
>
> # Licensed under the terms of the GNU GPL License version 2
> #
> -# leaking_addresses.pl: Scan 64 bit kernel for potential leaking addresses.
> +# leaking_addresses.pl: Scan the kernel for potential leaking addresses.
> # - Scans dmesg output.
> # - Walks directory tree and parses each file (for each directory in @DIRS).
> #
> @@ -14,7 +14,7 @@
> #
> # You may like to set kptr_restrict=2 before running script
> # (see Documentation/sysctl/kernel.txt).
> -
> +#
> use warnings;
> use strict;
> use POSIX;
> @@ -37,7 +37,7 @@ my $TIMEOUT = 10;
> # Script can only grep for kernel addresses on the following architectures. If
> # your architecture is not listed here and has a grep'able kernel address please
> # consider submitting a patch.
> -my @SUPPORTED_ARCHITECTURES = ('x86_64', 'ppc64');
> +my @SUPPORTED_ARCHITECTURES = ('x86_64', 'ppc64', 'i[3456]86');
>
> # Command line options.
> my $help = 0;
> @@ -49,6 +49,9 @@ my $input_raw = ""; # Read raw results from file instead of scanning.
> my $suppress_dmesg = 0; # Don't show dmesg in output.
> my $squash_by_path = 0; # Summary report grouped by absolute path.
> my $squash_by_filename = 0; # Summary report grouped by filename.
> +my $page_offset_32bit = 0; # 32-bit: value of CONFIG_PAGE_OFFSET
We have to be super careful with spaces and tabs. When things like this
appear I like to make whitespace visible in the editor so we can see
what is going on.
> +my @kernel_config_files = ('/boot/config', '/boot/config-'.`uname -r`, '/proc/config.gz');
I moved this into get_page_offset. Also I added a command line option --kernel-cofig-file.
> # Do not parse these files (absolute path).
> my @skip_parse_files_abs = ('/proc/kmsg',
> @@ -97,14 +100,15 @@ Version: $V
>
> Options:
>
> - -o, --output-raw=<file> Save results for future processing.
> - -i, --input-raw=<file> Read results from file instead of scanning.
> - --raw Show raw results (default).
> - --suppress-dmesg Do not show dmesg results.
> - --squash-by-path Show one result per unique path.
> - --squash-by-filename Show one result per unique filename.
> - -d, --debug Display debugging output.
> - -h, --help, --version Display this help and exit.
> + -o, --output-raw=<file> Save results for future processing.
> + -i, --input-raw=<file> Read results from file instead of scanning.
> + --raw Show raw results (default).
> + --suppress-dmesg Do not show dmesg results.
> + --squash-by-path Show one result per unique path.
> + --squash-by-filename Show one result per unique filename.
> + --page-offset-32bit=<hex> PAGE_OFFSET value (for 32-bit kernels).
> + -d, --debug Display debugging output.
> + -h, --help, --version Display this help and exit.
>
> Examples:
>
> @@ -117,7 +121,11 @@ Examples:
> # View summary report.
> $0 --input-raw scan.out --squash-by-filename
>
> -Scans the running (64 bit) kernel for potential leaking addresses.
> + # (On a 32-bit system with a 2GB:2GB VMSPLIT), pass PAGE_OFFSET value
> + # as an option switch.
> + $0 --page-offset-32bit=0x80000000
> +
> +Scans the running kernel for potential leaking addresses.
>
> EOM
> exit($exitcode);
> @@ -133,10 +141,16 @@ GetOptions(
> 'squash-by-path' => \$squash_by_path,
> 'squash-by-filename' => \$squash_by_filename,
> 'raw' => \$raw,
> + 'page-offset-32bit=o' => \$page_offset_32bit,
> ) or help(1);
>
> help(0) if ($help);
>
> +sub dprint
> +{
> + printf(STDERR @_) if $debug;
> +}
> +
> if ($input_raw) {
> format_output($input_raw);
> exit(0);
> @@ -162,6 +176,20 @@ if (!is_supported_architecture()) {
> exit(129);
> }
>
> +if ($debug) {
> + printf "Detected arch : ";
> + if (is_ix86_32()) {
> + printf "32 bit x86\n";
> + } else {
> + printf "64 bit\n";
> + }
> +}
I moved all this to a subroutine.
> +
> +if (is_ix86_32()) {
> + $page_offset_32bit = get_page_offset();
> + dprint "PAGE_OFFSET = 0x%X\n", $page_offset_32bit;
> +}
> +
I moved this into get_page_offset()
> if ($output_raw) {
> open my $fh, '>', $output_raw or die "$0: $output_raw: $!\n";
> select $fh;
> @@ -172,14 +200,9 @@ walk(@DIRS);
>
> exit 0;
>
> -sub dprint
> -{
> - printf(STDERR @_) if $debug;
> -}
> -
> sub is_supported_architecture
> {
> - return (is_x86_64() or is_ppc64());
> + return (is_x86_64() or is_ppc64() or is_ix86_32());
> }
>
> sub is_x86_64
> @@ -202,6 +225,17 @@ sub is_ppc64
> return 0;
> }
>
> +# 32-bit x86: is_i'x'86_32() ; where is [3 or 4 or 5 or 6]
> +sub is_ix86_32
> +{
> + my $archname = $Config{archname};
> +
> + if ($archname =~ m/i[3456]86-linux/) {
> + return 1;
> + }
> + return 0;
> +}
> +
> sub is_false_positive
> {
> my ($match) = @_;
> @@ -217,6 +251,14 @@ sub is_false_positive
> $match =~ '\bf{10}601000\b') {
> return 1;
> }
> + } elsif (is_ix86_32()) {
> + my $addr32 = eval hex($match);
> + if ($addr32 < $page_offset_32bit ) {
> + return 1;
> + }
> + if ($match =~ '\b(0x)?(f|F){8}\b') {
> + return 1;
> + }
Added helper function to try and keep code un-entangled as possible.
> }
>
> return 0;
> @@ -245,6 +287,8 @@ sub may_leak_address
> $address_re = '\b(0x)?ffff[[:xdigit:]]{12}\b';
> } elsif (is_ppc64()) {
> $address_re = '\b(0x)?[89abcdef]00[[:xdigit:]]{13}\b';
> + } elsif (is_ix86_32()) {
> + $address_re = '\b(0x)?[[:xdigit:]]{8}\b';
> }
>
> while (/($address_re)/g) {
> @@ -501,3 +545,73 @@ sub add_to_cache
> }
> push @{$cache->{$key}}, $value;
> }
> +
> +sub parse_kernel_config
> +{
> + my ($file, $config) = @_;
> + my $str;
> + my $val = NULL;
> + my $gzipfile = 0;
> +
> + # Explicitly check for '/proc/config.gz'
> + if ($file eq "/proc/config.gz") {
> + $gzipfile = 1;
> + if (! -R $file) {
> + dprint "parse_kernel_config: /proc/config.gz does not exist\n";
> + return NULL;
> + }
> + if (system("gunzip < /proc/config.gz > /tmp/tmpkconf")) {
> + dprint " parse_kernel_config: system(gunzip...) failed\n";
> + return NULL;
> + }
> + $file = "/tmp/tmpkconf";
> + $file =~ s/\R*//g;
> + }
> +
> + dprint "32-bit: attempting to parse file \"$file\" for config \"$config\" ...\n";
> + if (! -R $file) {
> + dprint " parse_kernel_config: file does not exist or not readable\n";
> + return NULL;
> + }
> +
> + open my $fh, "<", $file or return;
> + while (my $line = <$fh> ) {
> + if ($line =~ /^$config/) {
> + ($str,$val) = split /=/, $line;
> + }
> + }
> + close $fh;
> + if ($gzipfile == 1) {
> + system("rm -f /tmp/tmpkconf");
> + }
> +
> + if ($val eq NULL) {
> + return NULL;
> + }
> + $val =~ s/\R*//g;
> + return $val;
> +}
> +
> +sub get_page_offset
> +{
> + my $page_offset = $page_offset_32bit;
> +
> + # If option --page-offset-32bit has been passed, just use it, else
> + # parse PAGE_OFFSET by iterating over an array of kernel config files.
> + if ($page_offset == 0) {
> + foreach my $kconfig_file (@kernel_config_files) {
> + $kconfig_file =~ s/\R*//g;
> + $page_offset = eval parse_kernel_config($kconfig_file, "CONFIG_PAGE_OFFSET");
> + if ($page_offset != 0) {
> + last;
> + }
> + }
> + if ($page_offset == 0) {
> + printf STDERR "$P: Fatal Error :: couldn't parse CONFIG_PAGE_OFFSET, aborting...\n";
> + printf STDERR "You can pass it via the option switch --page-offset-32bit=<value>\n";
> + exit(1);
> + }
> + }
> + return $page_offset;
> +}
> +
> --
> 2.14.3
I played around with these two subs for a while. Let me know what you
think.
thanks,
Tobin.
Powered by blists - more mailing lists