Re: [PATCH] arch_check_bp_in_kernelspace: fix the range check

From: Steven Rostedt
Date: Mon Nov 19 2012 - 13:24:55 EST


On Mon, 2012-11-19 at 18:47 +0100, Oleg Nesterov wrote:
> On 11/09, Oleg Nesterov wrote:
> >
> > On 11/09, Oleg Nesterov wrote:
> > >
> > > Note: TASK_SIZE doesn't look right at least on x86, I think it should
> > > be replaced by TASK_SIZE_MAX.
> > > ...
> > > --- x/arch/x86/kernel/hw_breakpoint.c
> > > +++ x/arch/x86/kernel/hw_breakpoint.c
> > > @@ -200,7 +200,7 @@ int arch_check_bp_in_kernelspace(struct
> > > va = info->address;
> > > len = get_hbp_len(info->len);
> > >
> > > - return (va >= TASK_SIZE) && ((va + len - 1) >= TASK_SIZE);
> > > + return (va >= TASK_SIZE) || ((va + len - 1) >= TASK_SIZE);
> >
> > But actully I'd like to ask another question.
> >
> > Can't we add the additional !in_gate_area_no_mm() check to allow
> > the hw breakpoints in vsyscall?
> >
> > Quoting Amnon:
> >
> > My service needs to catch the system-calls of its traced son.
> > Almost all system-calls are caught with PTRACE_SYSCALL, but not those
> > using the vsyscall page - especially "gettimeofday()" and "time()".
> >
> > ...
> >
> > However, the code in "arch/x86/kernel/ptrace.c" forbids catching kernel
> > addresses.
> >
> > I tend to agree with Amnon...
> >
> > What do you think?
>
> ping ;)
>
> I agree the patch I sent is very minor (although it looks like the trivial
> bugfix to me).
>
> Just I think Amnon has a point, shouldn't we change this change like below?
> (on top of this fixlet).
>
> Oleg.
>
> --- x/arch/x86/kernel/hw_breakpoint.c
> +++ x/arch/x86/kernel/hw_breakpoint.c
> @@ -188,6 +188,11 @@ static int get_hbp_len(u8 hbp_len)
> return len_in_bytes;
> }
>
> +static inline bool bp_in_gate(unsigned long start, unsigned long end)
> +{
> + return in_gate_area_no_mm(start) && in_gate_area_no_mm(end);
> +}
> +
> /*
> * Check for virtual address in kernel space.
> */
> @@ -200,7 +205,8 @@ int arch_check_bp_in_kernelspace(struct
> va = info->address;
> len = get_hbp_len(info->len);
>
> - return (va >= TASK_SIZE) || ((va + len - 1) >= TASK_SIZE);
> + return ((va >= TASK_SIZE) || ((va + len - 1) >= TASK_SIZE)) &&
> + !bp_in_gate(va, va + len - 1);

So we want to allow non privileged to add a breakpoint in a vsyscall
area even if it happens to lay in kernel space?

Is this really what we want? I mean, isn't syscall tracing in the kernel
done by a flag set to the task's structure. If the task has a flag set,
then it does the slow (ptrace) path which handles the breakpoint for the
user.

But here, there's no prejudice between tasks. All tasks will now hit the
breakpoint regardless of if it is being traced or not.

-- Steve


> }
>
> int arch_bp_generic_fields(int x86_len, int x86_type,


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/