123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150 |
- // SPDX-License-Identifier: GPL-2.0
- /*
- * This code tests that the current task stack is properly erased (filled
- * with STACKLEAK_POISON).
- *
- * Authors:
- * Alexander Popov <[email protected]>
- * Tycho Andersen <[email protected]>
- */
- #include "lkdtm.h"
- #include <linux/stackleak.h>
- #if defined(CONFIG_GCC_PLUGIN_STACKLEAK)
- /*
- * Check that stackleak tracks the lowest stack pointer and erases the stack
- * below this as expected.
- *
- * To prevent the lowest stack pointer changing during the test, IRQs are
- * masked and instrumentation of this function is disabled. We assume that the
- * compiler will create a fixed-size stack frame for this function.
- *
- * Any non-inlined function may make further use of the stack, altering the
- * lowest stack pointer and/or clobbering poison values. To avoid spurious
- * failures we must avoid printing until the end of the test or have already
- * encountered a failure condition.
- */
- static void noinstr check_stackleak_irqoff(void)
- {
- const unsigned long task_stack_base = (unsigned long)task_stack_page(current);
- const unsigned long task_stack_low = stackleak_task_low_bound(current);
- const unsigned long task_stack_high = stackleak_task_high_bound(current);
- const unsigned long current_sp = current_stack_pointer;
- const unsigned long lowest_sp = current->lowest_stack;
- unsigned long untracked_high;
- unsigned long poison_high, poison_low;
- bool test_failed = false;
- /*
- * Check that the current and lowest recorded stack pointer values fall
- * within the expected task stack boundaries. These tests should never
- * fail unless the boundaries are incorrect or we're clobbering the
- * STACK_END_MAGIC, and in either casee something is seriously wrong.
- */
- if (current_sp < task_stack_low || current_sp >= task_stack_high) {
- instrumentation_begin();
- pr_err("FAIL: current_stack_pointer (0x%lx) outside of task stack bounds [0x%lx..0x%lx]\n",
- current_sp, task_stack_low, task_stack_high - 1);
- test_failed = true;
- goto out;
- }
- if (lowest_sp < task_stack_low || lowest_sp >= task_stack_high) {
- instrumentation_begin();
- pr_err("FAIL: current->lowest_stack (0x%lx) outside of task stack bounds [0x%lx..0x%lx]\n",
- lowest_sp, task_stack_low, task_stack_high - 1);
- test_failed = true;
- goto out;
- }
- /*
- * Depending on what has run prior to this test, the lowest recorded
- * stack pointer could be above or below the current stack pointer.
- * Start from the lowest of the two.
- *
- * Poison values are naturally-aligned unsigned longs. As the current
- * stack pointer might not be sufficiently aligned, we must align
- * downwards to find the lowest known stack pointer value. This is the
- * high boundary for a portion of the stack which may have been used
- * without being tracked, and has to be scanned for poison.
- */
- untracked_high = min(current_sp, lowest_sp);
- untracked_high = ALIGN_DOWN(untracked_high, sizeof(unsigned long));
- /*
- * Find the top of the poison in the same way as the erasing code.
- */
- poison_high = stackleak_find_top_of_poison(task_stack_low, untracked_high);
- /*
- * Check whether the poisoned portion of the stack (if any) consists
- * entirely of poison. This verifies the entries that
- * stackleak_find_top_of_poison() should have checked.
- */
- poison_low = poison_high;
- while (poison_low > task_stack_low) {
- poison_low -= sizeof(unsigned long);
- if (*(unsigned long *)poison_low == STACKLEAK_POISON)
- continue;
- instrumentation_begin();
- pr_err("FAIL: non-poison value %lu bytes below poison boundary: 0x%lx\n",
- poison_high - poison_low, *(unsigned long *)poison_low);
- test_failed = true;
- goto out;
- }
- instrumentation_begin();
- pr_info("stackleak stack usage:\n"
- " high offset: %lu bytes\n"
- " current: %lu bytes\n"
- " lowest: %lu bytes\n"
- " tracked: %lu bytes\n"
- " untracked: %lu bytes\n"
- " poisoned: %lu bytes\n"
- " low offset: %lu bytes\n",
- task_stack_base + THREAD_SIZE - task_stack_high,
- task_stack_high - current_sp,
- task_stack_high - lowest_sp,
- task_stack_high - untracked_high,
- untracked_high - poison_high,
- poison_high - task_stack_low,
- task_stack_low - task_stack_base);
- out:
- if (test_failed) {
- pr_err("FAIL: the thread stack is NOT properly erased!\n");
- } else {
- pr_info("OK: the rest of the thread stack is properly erased\n");
- }
- instrumentation_end();
- }
- static void lkdtm_STACKLEAK_ERASING(void)
- {
- unsigned long flags;
- local_irq_save(flags);
- check_stackleak_irqoff();
- local_irq_restore(flags);
- }
- #else /* defined(CONFIG_GCC_PLUGIN_STACKLEAK) */
- static void lkdtm_STACKLEAK_ERASING(void)
- {
- if (IS_ENABLED(CONFIG_HAVE_ARCH_STACKLEAK)) {
- pr_err("XFAIL: stackleak is not enabled (CONFIG_GCC_PLUGIN_STACKLEAK=n)\n");
- } else {
- pr_err("XFAIL: stackleak is not supported on this arch (HAVE_ARCH_STACKLEAK=n)\n");
- }
- }
- #endif /* defined(CONFIG_GCC_PLUGIN_STACKLEAK) */
- static struct crashtype crashtypes[] = {
- CRASHTYPE(STACKLEAK_ERASING),
- };
- struct crashtype_category stackleak_crashtypes = {
- .crashtypes = crashtypes,
- .len = ARRAY_SIZE(crashtypes),
- };
|