lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <34EC5B9E-305F-4253-96BC-4A6BD38E7AB3@intel.com>
Date:   Wed, 25 Aug 2021 16:01:05 +0000
From:   "Bae, Chang Seok" <chang.seok.bae@...el.com>
To:     Borislav Petkov <bp@...en8.de>
CC:     "Lutomirski, Andy" <luto@...nel.org>,
        "tglx@...utronix.de" <tglx@...utronix.de>,
        "mingo@...nel.org" <mingo@...nel.org>,
        "x86@...nel.org" <x86@...nel.org>,
        "Brown, Len" <len.brown@...el.com>,
        "Hansen, Dave" <dave.hansen@...el.com>,
        "Macieira, Thiago" <thiago.macieira@...el.com>,
        "Liu, Jing2" <jing2.liu@...el.com>,
        "Shankar, Ravi V" <ravi.v.shankar@...el.com>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH v9 08/26] x86/fpu/xstate: Introduce helpers to manage the
 XSTATE buffer dynamically

On Aug 18, 2021, at 12:46, Bae, Chang Seok <chang.seok.bae@...el.com> wrote:
> Let me consider a case to mimic the situation somehow.

Once the below changes were applied on top of this series v9, the self-test
ran:

    $ ./tools/testing/selftests/x86/amx_64
            Inject tile data
    Tile data was not written on ptracee.

Check the kernel messages:

    $ sudo dmesg | tail -n 2
    [   82.780882] x86/fpu: Assume new re-allocation fails here and fpu->state
    retains the old re-allocation (0x000000009f3a83cc)

The ptracee loaded tile data, so it’s XSTATE per-task buffer had been
re-allocated. Then, the ptracer attempted to inject new tile data but the
kernel returned ENOMEM along with the message. This emulates the behavior with
reallocation failure on the ptrace path.

    [   82.793127] process: x86/fpu: Free the re-allocated buffer at
    0x000000009f3a83cc

The program exited. This message indicates the old buffer was freed at that
moment.

Thanks,
Chang


diff --git a/arch/x86/kernel/fpu/regset.c b/arch/x86/kernel/fpu/regset.c
index ee71ffd7c221..3153dc91c715 100644
--- a/arch/x86/kernel/fpu/regset.c
+++ b/arch/x86/kernel/fpu/regset.c
@@ -170,8 +170,7 @@ int xstateregs_set(struct task_struct *target, const struct user_regset *regset,
 	 *
 	 * Check if the expansion is possibly needed.
 	 */
-	if (xfeatures_mask_user_dynamic &&
-	    ((fpu->state_mask & xfeatures_mask_user_dynamic) != xfeatures_mask_user_dynamic)) {
+	if (xfeatures_mask_user_dynamic) {
 		u64 state_mask, dynstate_mask;
 
 		/* Retrieve XSTATE_BV. */
@@ -186,9 +185,13 @@ int xstateregs_set(struct task_struct *target, const struct user_regset *regset,
 				goto out;
 			}
 
-			ret = alloc_xstate_buffer(fpu, dynstate_mask);
-			if (ret)
+			if (fpu->state != &fpu->__default_state) {
+				pr_info("x86/fpu: Assume new re-allocation fails here and "
+					"fpu->state retains the old re-allocation (0x%p)\n",
+					fpu->state);
+				ret = -ENOMEM;
 				goto out;
+			}
 		}
 	}
 
diff --git a/arch/x86/kernel/process.c b/arch/x86/kernel/process.c
index 5b4f9b82aea1..c04098db58b6 100644
--- a/arch/x86/kernel/process.c
+++ b/arch/x86/kernel/process.c
@@ -99,8 +99,15 @@ void arch_thread_struct_whitelist(unsigned long *offset, unsigned long *size)
 
 void arch_release_task_struct(struct task_struct *task)
 {
-	if (cpu_feature_enabled(X86_FEATURE_FPU))
-		free_xstate_buffer(&task->thread.fpu);
+	if (cpu_feature_enabled(X86_FEATURE_FPU)) {
+		struct fpu *fpu = &task->thread.fpu;
+
+		if (fpu->state != &fpu->__default_state)
+			pr_info("x86/fpu: Free the re-allocated buffer at 0x%p\n",
+				fpu->state);
+
+		free_xstate_buffer(fpu);
+	}
 }
 
 /*
diff --git a/tools/testing/selftests/x86/amx.c b/tools/testing/selftests/x86/amx.c
index afd8c66ca206..6393ec01a9a1 100644
--- a/tools/testing/selftests/x86/amx.c
+++ b/tools/testing/selftests/x86/amx.c
@@ -610,8 +610,6 @@ static void test_context_switch(void)
 
 /* Ptrace test */
 
-static bool ptracee_state_perm;
-
 static int inject_tiledata(pid_t target)
 {
 	struct iovec iov;
@@ -624,12 +622,8 @@ static int inject_tiledata(pid_t target)
 	set_rand_tiledata(xsave_buffer + xsave_xtiledata_offset);
 	memcpy(tiledata, xsave_buffer + xsave_xtiledata_offset, xtiledata_size);
 
-	if (ptrace(PTRACE_SETREGSET, target, (uint32_t)NT_X86_XSTATE, &iov)) {
-		if (errno != EFAULT)
-			err(1, "PTRACE_SETREGSET");
-		else
-			return errno;
-	}
+	if (ptrace(PTRACE_SETREGSET, target, (uint32_t)NT_X86_XSTATE, &iov))
+		return errno;
 
 	if (ptrace(PTRACE_GETREGSET, target, (uint32_t)NT_X86_XSTATE, &iov))
 		err(1, "PTRACE_GETREGSET");
@@ -640,18 +634,19 @@ static int inject_tiledata(pid_t target)
 		return -1;
 }
 
-static void test_tile_write(void)
+static void test_kernel_xbuffer_free_with_ptrace_failure(void)
 {
 	int status, rc;
 	pid_t child;
-	bool pass;
 
 	child = fork();
 	if (child < 0) {
 		err(1, "fork");
 	} else if (!child) {
-		if (ptracee_state_perm)
-			enable_tiledata();
+		clear_xstate_header(xsave_buffer);
+		set_xstatebv(xsave_buffer, XFEATURE_MASK_XTILEDATA);
+		set_rand_tiledata(xsave_buffer + xsave_xtiledata_offset);
+		xrstor_safe(xsave_buffer, -1, -1);
 
 		if (ptrace(PTRACE_TRACEME, 0, NULL, NULL))
 			err(1, "PTRACE_TRACEME");
@@ -664,16 +659,11 @@ static void test_tile_write(void)
 		wait(&status);
 	} while (WSTOPSIG(status) != SIGTRAP);
 
-	printf("\tInject tile data %s ARCH_SET_STATE_ENABLE\n",
-	       ptracee_state_perm ? "with" : "without");
+	printf("\tInject tile data\n");
 
 	rc = inject_tiledata(child);
-	pass = (rc == EFAULT && !ptracee_state_perm) ||
-	       (!rc && ptracee_state_perm);
-	if (!pass)
-		nerrs++;
-	printf("[%s]\tTile data was %swritten on ptracee.\n",
-	       pass ? "OK" : "FAIL", errs ? "not " : "");
+	if (rc)
+		printf("Tile data was not written on ptracee.\n");
 
 	ptrace(PTRACE_DETACH, child, NULL, NULL);
 	wait(&status);
@@ -681,17 +671,6 @@ static void test_tile_write(void)
 		err(1, "ptrace test");
 }
 
-static void test_ptrace(void)
-{
-	printf("[RUN]\tCheck ptrace() to inject tile data.\n");
-
-	ptracee_state_perm = false;
-	test_tile_write();
-
-	ptracee_state_perm = true;
-	test_tile_write();
-}
-
 /* Signal handling test */
 
 static bool init_tiledata, load_tiledata;
@@ -951,13 +930,8 @@ int main(int argc, char **argv)
 	if (sched_setaffinity(0, sizeof(cpuset), &cpuset) != 0)
 		err(1, "sched_setaffinity to CPU 0");
 
-	test_arch_prctl(argc, argv);
-	test_ptrace();
-
 	enable_tiledata();
-	test_context_switch();
-	test_fork();
-	test_signal();
+	test_kernel_xbuffer_free_with_ptrace_failure();
 
 	clearhandler(SIGILL);

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ