Received: by 2002:ac0:bc90:0:0:0:0:0 with SMTP id a16csp3967172img; Mon, 25 Mar 2019 23:44:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqycSXsJjWfBwpmXXy/WWdujbQZwYJeSmLkZE3LOb3XkhUFtz5M/zLsiZElgNiAvLwFGe8V8 X-Received: by 2002:a62:ae13:: with SMTP id q19mr27811904pff.152.1553582651708; Mon, 25 Mar 2019 23:44:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553582651; cv=none; d=google.com; s=arc-20160816; b=JoDm/qAN2YWaF3bVceBu8ktTP11yuZyarT32XrAx5E+HsedA21Gxn1A/28JN+tiXQh w53lllbdHr5qWtOlKmSRyiazSPPdv+BzoopaFQuWjKXJcgndY7cx8JVzoCx9moxnFbBQ IsH1ij4S4sLOqWbl5Tnz0qTw9VE8P9RGJPP1hQJRuqZWKqy6kE7U1UX4BolHfFYmEn99 uUDfDzvSwogBHa2akUIyJkS79Dt9msnF4jPBfjSxvtNVQOawMEia4s4ZCsnaoXVNAVdZ kzqZelY41hPl2H9aLMXnYpXZbnYv7gjBFekZrTxPIjRRe/TQf32vATwSjIIkq+dhp16W u4hQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=6lPtZvx0+4+jJh7hqgXJXiW0xKLvwm5/21YXfXdWat8=; b=L+y+zktix4qWA3EunxM9maT684FTZ3+z/4HwM/kFI2+bukbSKV1isGAIHlY01pL4f8 Ghk2AfX8EhRJiDkju7yV54/xHGhIEPdIupHnHZThxLnZPm5ZUNAVUVreqdmcUKaeueeQ kTfOogyP7RqtwYU32d3cw6dOrsblKNFb8CK1KmDBRWHpuelpBnscu77lXJQJ5wh7WuEf sRgjxFgbyQZH1P3UT+Bc0X3Qb9XdkqdatiH0Fn7M6iBBgFcVF2TcRvtkh/rihw/4q9wP T9IKIc1JuYxT+zlT3G5qFJ6cILY6IrTj0NWLGPqUMJrl5j4lR2jZXTgyPZYkjGiQ18Jz 3fWg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="1VlCna/r"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j37si12886097plb.236.2019.03.25.23.43.56; Mon, 25 Mar 2019 23:44:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="1VlCna/r"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732415AbfCZGhn (ORCPT + 99 others); Tue, 26 Mar 2019 02:37:43 -0400 Received: from mail.kernel.org ([198.145.29.99]:51380 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731889AbfCZGhl (ORCPT ); Tue, 26 Mar 2019 02:37:41 -0400 Received: from localhost (unknown [104.132.152.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 3D3F420823; Tue, 26 Mar 2019 06:37:39 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1553582259; bh=FrbzeJx4YlJQlHFPH3EFaCHcwQ/VyF8HxsMRMnHCC/M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=1VlCna/rcteXFVxs5Gl8pE+GpRVuQSkUlS4X/asCoQ4JWjEvMfOv0ofmA06AYkGkW Kyekn0ksOWjKWoLkxtb3c6PSOROvSRpbjnXwpPY5GFRi9epos7tGqzaOLkgXClngSO WePfuB3RB4DwJQtJggk0qvS/8N1COWCkMpqYcQG0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jann Horn , Thomas Gleixner , Josh Poimboeuf , Borislav Petkov , Andrew Morton , syzbot , "H. Peter Anvin" , Masahiro Yamada , Michal Marek , linux-kbuild@vger.kernel.org Subject: [PATCH 4.19 39/45] x86/unwind: Handle NULL pointer calls better in frame unwinder Date: Tue, 26 Mar 2019 15:30:22 +0900 Message-Id: <20190326042704.759101372@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190326042702.565683325@linuxfoundation.org> References: <20190326042702.565683325@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.19-stable review patch. If anyone has any objections, please let me know. ------------------ From: Jann Horn commit f4f34e1b82eb4219d8eaa1c7e2e17ca219a6a2b5 upstream. When the frame unwinder is invoked for an oops caused by a call to NULL, it currently skips the parent function because BP still points to the parent's stack frame; the (nonexistent) current function only has the first half of a stack frame, and BP doesn't point to it yet. Add a special case for IP==0 that calculates a fake BP from SP, then uses the real BP for the next frame. Note that this handles first_frame specially: Return information about the parent function as long as the saved IP is >=first_frame, even if the fake BP points below it. With an artificially-added NULL call in prctl_set_seccomp(), before this patch, the trace is: Call Trace: ? prctl_set_seccomp+0x3a/0x50 __x64_sys_prctl+0x457/0x6f0 ? __ia32_sys_prctl+0x750/0x750 do_syscall_64+0x72/0x160 entry_SYSCALL_64_after_hwframe+0x44/0xa9 After this patch, the trace is: Call Trace: prctl_set_seccomp+0x3a/0x50 __x64_sys_prctl+0x457/0x6f0 ? __ia32_sys_prctl+0x750/0x750 do_syscall_64+0x72/0x160 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Signed-off-by: Jann Horn Signed-off-by: Thomas Gleixner Acked-by: Josh Poimboeuf Cc: Borislav Petkov Cc: Andrew Morton Cc: syzbot Cc: "H. Peter Anvin" Cc: Masahiro Yamada Cc: Michal Marek Cc: linux-kbuild@vger.kernel.org Link: https://lkml.kernel.org/r/20190301031201.7416-1-jannh@google.com Signed-off-by: Greg Kroah-Hartman --- arch/x86/include/asm/unwind.h | 6 ++++++ arch/x86/kernel/unwind_frame.c | 25 ++++++++++++++++++++++--- 2 files changed, 28 insertions(+), 3 deletions(-) --- a/arch/x86/include/asm/unwind.h +++ b/arch/x86/include/asm/unwind.h @@ -23,6 +23,12 @@ struct unwind_state { #elif defined(CONFIG_UNWINDER_FRAME_POINTER) bool got_irq; unsigned long *bp, *orig_sp, ip; + /* + * If non-NULL: The current frame is incomplete and doesn't contain a + * valid BP. When looking for the next frame, use this instead of the + * non-existent saved BP. + */ + unsigned long *next_bp; struct pt_regs *regs; #else unsigned long *sp; --- a/arch/x86/kernel/unwind_frame.c +++ b/arch/x86/kernel/unwind_frame.c @@ -320,10 +320,14 @@ bool unwind_next_frame(struct unwind_sta } /* Get the next frame pointer: */ - if (state->regs) + if (state->next_bp) { + next_bp = state->next_bp; + state->next_bp = NULL; + } else if (state->regs) { next_bp = (unsigned long *)state->regs->bp; - else + } else { next_bp = (unsigned long *)READ_ONCE_TASK_STACK(state->task, *state->bp); + } /* Move to the next frame if it's safe: */ if (!update_stack_state(state, next_bp)) @@ -398,6 +402,21 @@ void __unwind_start(struct unwind_state bp = get_frame_pointer(task, regs); + /* + * If we crash with IP==0, the last successfully executed instruction + * was probably an indirect function call with a NULL function pointer. + * That means that SP points into the middle of an incomplete frame: + * *SP is a return pointer, and *(SP-sizeof(unsigned long)) is where we + * would have written a frame pointer if we hadn't crashed. + * Pretend that the frame is complete and that BP points to it, but save + * the real BP so that we can use it when looking for the next frame. + */ + if (regs && regs->ip == 0 && + (unsigned long *)kernel_stack_pointer(regs) >= first_frame) { + state->next_bp = bp; + bp = ((unsigned long *)kernel_stack_pointer(regs)) - 1; + } + /* Initialize stack info and make sure the frame data is accessible: */ get_stack_info(bp, state->task, &state->stack_info, &state->stack_mask); @@ -410,7 +429,7 @@ void __unwind_start(struct unwind_state */ while (!unwind_done(state) && (!on_stack(&state->stack_info, first_frame, sizeof(long)) || - state->bp < first_frame)) + (state->next_bp == NULL && state->bp < first_frame))) unwind_next_frame(state); } EXPORT_SYMBOL_GPL(__unwind_start);