From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1161054AbbHGPYq (ORCPT ); Fri, 7 Aug 2015 11:24:46 -0400 Received: from mailapp01.imgtec.com ([195.59.15.196]:7220 "EHLO mailapp01.imgtec.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750709AbbHGPWj (ORCPT ); Fri, 7 Aug 2015 11:22:39 -0400 From: James Hogan To: CC: , James Hogan , "Andrew Morton" Subject: [PATCH v2 05/11] test_user_copy: Check legit kernel accesses Date: Fri, 7 Aug 2015 16:21:58 +0100 Message-ID: <1438960924-23628-6-git-send-email-james.hogan@imgtec.com> X-Mailer: git-send-email 2.3.6 In-Reply-To: <1438960924-23628-1-git-send-email-james.hogan@imgtec.com> References: <1438960924-23628-1-git-send-email-james.hogan@imgtec.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [192.168.154.110] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Check that the use of the user accessors for accessing kernel memory succeed as expected after set_fs(get_ds()) is used to increases the address limit, as used by the kernel to directly invoke system call code with kernel pointers. The tests are basically the same as the tests normally expected to be treated as invalid, but without any user addresses (no reversed copies), and with the result inverted such that they should succeed instead. New tests: - legitimate all-kernel copy_from_user - legitimate all-kernel copy_to_user - legitimate kernel get_user - legitimate kernel put_user Signed-off-by: James Hogan Acked-by: Kees Cook Cc: Andrew Morton --- lib/test_user_copy.c | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) diff --git a/lib/test_user_copy.c b/lib/test_user_copy.c index 0ecef3e4690e..445ca92b0b80 100644 --- a/lib/test_user_copy.c +++ b/lib/test_user_copy.c @@ -41,6 +41,7 @@ static int __init test_user_copy_init(void) char *bad_usermem; unsigned long user_addr; unsigned long value = 0x5A; + mm_segment_t fs = get_fs(); kmem = kmalloc(PAGE_SIZE * 2, GFP_KERNEL); if (!kmem) @@ -86,6 +87,28 @@ static int __init test_user_copy_init(void) ret |= test(!put_user(value, (unsigned long __user *)kmem), "illegal put_user passed"); + /* + * Test access to kernel memory by adjusting address limit. + * This is used by the kernel to invoke system calls with kernel + * pointers. + */ + set_fs(get_ds()); + + /* Legitimate usage: none of these should fail. */ + ret |= test(copy_from_user(kmem, (char __user *)(kmem + PAGE_SIZE), + PAGE_SIZE), + "legitimate all-kernel copy_from_user failed"); + ret |= test(copy_to_user((char __user *)kmem, kmem + PAGE_SIZE, + PAGE_SIZE), + "legitimate all-kernel copy_to_user failed"); + ret |= test(get_user(value, (unsigned long __user *)kmem), + "legitimate kernel get_user failed"); + ret |= test(put_user(value, (unsigned long __user *)kmem), + "legitimate kernel put_user failed"); + + /* Restore previous address limit. */ + set_fs(fs); + vm_munmap(user_addr, PAGE_SIZE * 2); kfree(kmem); -- 2.3.6