Re: [PATCH] parisc: Fix syscall restarts

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 20.12.2015 15:09, Mathieu Desnoyers wrote:
> ----- On Dec 20, 2015, at 8:59 AM, Mathieu Desnoyers mathieu.desnoyers@xxxxxxxxxxxx wrote:
> 
>> ----- On Dec 18, 2015, at 6:30 PM, Helge Deller deller@xxxxxx wrote:
>>
>>> On parisc syscalls which are interrupted by signals sometimes fail to restart
>>> and instead return -ENOSYS which then in the worst case lead to userspace
>>> crashes.
>>> A similiar problem existed on MIPS and was fixed by commit e967ef02
>>> ("MIPS: Fix restart of indirect syscalls").
>>>
>>> On parisc the current syscall restart code assumes hat the syscall number is
>>> always loaded in the delay branch of the ble instruction as defined in the
>>> unistd.h header file and as such never restored %r20 before returning to
>>> userspace:
>>> 	ble 0x100(%sr2, %r0)
>>> 	ldi #syscall_nr, %r20
>>>
>>> This assumption is at least not true for code which uses the syscall() glibc
>>> function, which instead uses this syntax:
>>> 	ble 0x100(%sr2, %r0)
>>> 	copy regX, %r20
>>> where regX depend on how the compiler optimizes the code and register usage.
>>>
>>> This patch fixes this problem by adding code to analyze how the syscall number
>>> is loaded in the delay branch and - if needed - copy the syscall number to regX
>>> prior returning to userspace for the syscall restart.
>>>
>>> Signed-off-by: Helge Deller <deller@xxxxxx>
>>> Cc: stable@xxxxxxxxxxxxxxx
>>> Cc: Mathieu Desnoyers <mathieu.desnoyers@xxxxxxxxxxxx>
>>>
>>> diff --git a/arch/parisc/kernel/signal.c b/arch/parisc/kernel/signal.c
>>> index dc1ea79..b0414ad 100644
>>> --- a/arch/parisc/kernel/signal.c
>>> +++ b/arch/parisc/kernel/signal.c
>>> @@ -435,6 +435,48 @@ handle_signal(struct ksignal *ksig, struct pt_regs *regs,
>>> int in_syscall)
>>> 		regs->gr[28]);
>>> }
>>>
>>> +/*
>>> + * Check the delay branch in userspace how the syscall number gets loaded into
>>> + * %r20 and adjust as needed.
>>
>> I'm pretty sure "Check the delay branch in userspace how the syscall..."
>> is not an English construct. ;-) Suggested rewording:
>>
>> "Check how the syscall number gets loaded into %r20 within
>> the delay branch in userspace and adjust as needed."

Thanks!
I'll change that.


>>> + */
>>> +
>>> +static void check_syscallno_in_delay_branch(struct pt_regs *regs)
>>> +{
>>> +	unsigned int opcode, source_reg;
>>
>> Why "unsigned int" above rather than u32 ? Since we're using
>> opcode as target variable for a get_user, it would be clearer
>> if the type of the __user * match the type of the target kernel
>> variable. (understood that those happen to have the same bitness
>> and type size on all Linux architectures, but it would be clearer
>> nevertheless).

Yes, seems OK.
I'll change that.

>>> +	u32 __user *uaddr;
>>> +
>>> +	/* Usually we don't have to restore %r20 (the system call number)
>>> +	 * because it gets loaded in the delay slot of the branch external
>>> +	 * instruction via the ldi instruction.
>>> +	 * In some cases a register-to-register copy instruction might have
>>> +	 * been used instead, in which case we need to copy the syscall
>>> +	 * number into the source register before returning to userspace.
>>> +	 */
>>> +
>>> +	/* A syscall is just a branch, so all
>>> +	 * we have to do is fiddle the return pointer.
>>> +	 */
>>> +	regs->gr[31] -= 8; /* delayed branching */
>>> +
>>> +	/* Get assembler opcode of code in delay branch */
>>> +	uaddr = (unsigned int *) (regs->gr[31] + 1);
>>> +	get_user(opcode, uaddr);
>>
>> get_user() can fail due to EFAULT. This error should be
>> handled here, otherwise this could lead to the following
>> code using an uninitialized opcode variable, which could
>> indirectly leak a few bits of kernel stack information
>> to userspace (security concern). One attack vector I have
>> in mind for this is ptrace(), which might be able to tweak
>> those register values.

Yes, generally get_user() can fail.
But this would be rather strange in that case, because
the syscall was started by userspace from this address.
So, without the code at that address in userspace, we would
never have reached this get_user().

And, there is no leak (of kernel stack) either. All this
function does is to move the content of userspace register X
to userspace register Y. There is no kernel info involved.    

>>> +
>>> +	/* Check if delay branch uses "ldi int,%r20" */
>>> +	if ((opcode & 0xffff0000) == 0x34140000)
>>> +		return;	/* everything ok, just return */
>>> +
>>> +	/* Check if delay branch uses "copy %rX,%r20" */
>>> +	if ((opcode & 0xff00ffff) == 0x08000254) {
>>> +		source_reg = (opcode >> 16) & 31;
>>
>> Can you explain the reasoning behind the & 31 mask ?
>> I'm no parisc expert, but this seems rather odd.
>> Do you really mean "% 31" which translates to "& 5" ?
>> It would make more sense since there are 32 "gr"
>> registers. With & 31, a carefully crafted opcode
>> could overflow the gr[32] array, and cause a kernel
>> overflow allowing to overwrite kernel memory
>> (security issue).
> 
> Hrm, I got my masks temporarily mixed up (early morning
> here). This is why I always use constructs such as:
> 
> #define GR_REGS_BITS  5
> #define NR_GR_REGS    (1U << GR_REGS_BITS)
> #define GR_REGS_MASK  (NR_GR_REGS - 1)
> 
> and then
> 
> v & GR_REGS_MASK;
> 
> Which makes everything super-obvious. The & 31 mask
> seems therefore technically correct.

Good. I was struggling with your comments as well :-)


> The paragraph below still holds though:
> 
>>
>> If it's the case, then it would also be good to
>> check that the register selector within the opcode
>> is not larger than 31 (e.g. applying to fr or sr
>> register), rather than applying the modulo and
>> assuming it's a gr and corrupt userspace state.

I'll check that.

Thanks!

Helge
--
To unsubscribe from this list: send the line "unsubscribe linux-parisc" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html



[Index of Archives]     [Linux SoC]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux