[LTP] [RFC 1/1] Test for vulnerability cve-2016-7117 in recvmmsg error return path
Cyril Hrubis
chrubis@suse.cz
Mon Mar 20 12:23:38 CET 2017
Hi!
> --- /dev/null
> +++ b/testcases/cve/2016-7117/cve-2016-7117.c
Hmm, I would have just put this test directly into the cve/ directory,
there is no point in having one directory per test here.
> @@ -0,0 +1,203 @@
> +/*
> + * Copyright (c) 2017 Richard Palethorpe <rpalethorpe@suse.com>
> + *
> + * This program is free software: you can redistribute it and/or modify
> + * it under the terms of the GNU General Public License as published by
> + * the Free Software Foundation, either version 2 of the License, or
> + * (at your option) any later version.
> + *
> + * This program is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
> + * GNU General Public License for more details.
> + *
> + * You should have received a copy of the GNU General Public License
> + * along with this program. If not, see <http://www.gnu.org/licenses/>.
> + */
> +/*
> + * CVE-2016-7117
> + *
> + * This tests for a use after free caused by a race between recvmmsg() and
> + * close(). The exit path for recvmmsg() in (a2e2725541f: net: Introduce
> + * recvmmsg socket syscall) called fput() on the active file descriptor before
> + * checking the error state and setting the socket's error field.
> + *
> + * If one or more messages are received by recvmmsg() followed by one which
> + * fails, the socket's error field will be set. If just after recvmmsg() calls
> + * fput(), a call to close() is made on the same file descriptor there is a
> + * race between close() releasing the socket object and recvmmsg() setting its
> + * error field.
> + *
> + * fput() does not release a file descriptor's resources (e.g. a socket)
> + * immediatly, it queues them to be released just before a system call returns
> + * to user land. So the close() system call must call fput() after it is
> + * called in recvmmsg(), exit and release the resources all before the socket
> + * error is set.
> + *
> + * Usually if the vulnerability is present the test will be killed with a
> + * kernel null pointer exception. However this is not guaranteed to happen
> + * every time. To maximise the chance of the race occuring the test tries to
> + * align the exit times of the final close() and recvmmsg() plus an offset. It
> + * takes a moving average and uses it to adjust a delay by nanosleep().
> + *
> + * The following was used for reference
> + * https://blog.lizzie.io/notes-about-cve-2016-7117.html
> + */
> +
> +#include <sys/wait.h>
> +#include <sys/types.h>
> +#include <sys/socket.h>
> +#include <sys/syscall.h>
> +#include <stdlib.h>
> +#include <errno.h>
> +
> +#include "tst_test.h"
> +#include "tst_safe_net.h"
> +#include "tst_safe_pthread.h"
> +#include "tst_timer.h"
> +
> +// The bug was present in the kernel before recvmmsg was exposed by glibc
> +#ifndef __NR_recvmmsg
> +#ifdef __i386__
> +#define __NR_recvmmsg 337
> +#elif defined(__x86_64__)
> +#define __NR_recvmmsg 299
> +#endif
> +#endif
We have these for all architectures in autogenerated
linux_syscall_numbers.h, just include that header instead of rolling
your own definitions.
> +#ifndef CLOCK_MONOTONIC_RAW
> +#define CLOCK_MONOTONIC_RAW CLOCK_MONOTONIC
> +#endif
> +
> +#define MSG "abcdefghijklmnop"
> +#define RECV_TIMEOUT 1
> +#define ATTEMPTS 0x1FFFFF
> +#define TARGET_AVG_TDIFF (-1000.0d)
> +#define ALPHA (0.25d)
> +
> +int socket_fds[2];
> +struct mmsghdr msghdrs[2] = {
> + {
> + .msg_hdr = {
> + .msg_iov = &(struct iovec) {
> + .iov_len = sizeof(MSG),
> + },
> + .msg_iovlen = 1
> + }
> + },
> + {
> + .msg_hdr = {
> + .msg_iov = &(struct iovec) {
> + .iov_base = (void *)(0xbadadd),
> + .iov_len = ~0,
> + },
> + .msg_iovlen = 1
> + }
> + }
> +};
> +char rbuf[sizeof(MSG)] = {0};
There is no need to initialize global variables to 0. Also global
variables should be declared static.
> +struct timespec timeout = { .tv_sec = RECV_TIMEOUT };
> +struct timespec close_exit;
> +struct timespec recvmmsg_exit;
> +
> +void cleanup(void)
> +{
> + close(socket_fds[0]);
> + close(socket_fds[1]);
> +}
> +
> +struct timespec exit_time(void)
> +{
> + struct timespec t;
> +
> + clock_gettime(CLOCK_MONOTONIC_RAW, &t);
> + return t;
> +}
> +
> +void *send_and_close(void *arg)
> +{
> + struct timespec *delay = (struct timespec *)arg;
> +
> + send(socket_fds[0], MSG, sizeof(MSG), 0);
> + send(socket_fds[0], MSG, sizeof(MSG), 0);
> +
> + nanosleep(delay, 0);
> +
> + close(socket_fds[0]);
> + close(socket_fds[1]);
> + close_exit = exit_time();
More usuall way of passing structures in C is by pointer, if you just
did exit_time(&close_exit) here you could just pass the pointer to
clock_gettime() call instead of copying the value on the stack...
> + return 0;
> +}
> +
> +void run(void)
> +{
> +#ifndef __NR_recvmmsg
> + tst_brk(TCONF, "No definition for __NR_recvmmsg");
> +#endif
> + pthread_t pt_send;
> + int i, stat, too_early_count = 0;
> + long tdiff = 0, delay = 0;
> + double avg_tdiff = 0;
> + struct timespec recv_delay = {0}, clos_delay = {0};
> +
> + msghdrs[0].msg_hdr.msg_iov->iov_base = (void *)&rbuf;
> +
> + for (i = 1; i < ATTEMPTS; i++) {
> + if (socketpair(AF_LOCAL, SOCK_DGRAM, 0, socket_fds))
> + tst_brk(TBROK | TERRNO, "Socket creation failed");
> +
> + SAFE_PTHREAD_CREATE(&pt_send, 0, send_and_close, &clos_delay);
> +
> + nanosleep(&recv_delay, 0);
> +
> + stat = syscall(__NR_recvmmsg,
> + socket_fds[1], msghdrs, 2, 0, &timeout);
> + recvmmsg_exit = exit_time();
Here as well.
> + if (stat < 0 && errno == EBADF)
> + too_early_count++;
> + else if (stat == 0)
> + tst_res(TWARN, "No messages received, should be one");
> + else if (stat < 0)
> + tst_res(TWARN | TERRNO, "recvmmsg failed unexpectedly");
> +
> + SAFE_PTHREAD_JOIN(pt_send, 0);
> +
> + tdiff = recvmmsg_exit.tv_nsec - close_exit.tv_nsec;
> + avg_tdiff = ALPHA * tdiff + (1.0d - ALPHA) * avg_tdiff;
> + if (!(i & 0xF)) {
> + if (avg_tdiff < TARGET_AVG_TDIFF)
> + delay++;
> + else if (avg_tdiff > TARGET_AVG_TDIFF)
> + delay--;
> +
> + if (delay > 0) {
> + recv_delay.tv_nsec = delay;
> + clos_delay.tv_nsec = 1;
> + } else if (delay < 0) {
> + recv_delay.tv_nsec = 1;
> + clos_delay.tv_nsec = -delay;
> + } else {
> + recv_delay.tv_nsec = 1;
> + clos_delay.tv_nsec = 1;
> + }
> + }
> +
> + if (!(i & 0x7FFFF)) {
> + tst_res(TINFO, "Early: %.1f%%, diff: %ldns, avg_tdiff: %.5gns",
> + 100 * too_early_count / (float)i,
> + tdiff, avg_tdiff);
> + tst_res(TINFO, "Receive delay: %ldns, close delay: %ldns",
> + recv_delay.tv_nsec, clos_delay.tv_nsec);
> + }
> + }
> +
> + tst_res(TPASS, "Nothing happened after %d attempts", ATTEMPTS);
> +}
> +
> +static struct tst_test test = {
> + .tid = "cve-2016-7117",
> + .test_all = run,
> + .cleanup = cleanup,
> + .min_kver = "2.6.33",
> +};
Otherwise the code looks fine.
It's missing Makefile, runtest file and .gitignore record though...
--
Cyril Hrubis
chrubis@suse.cz
More information about the ltp
mailing list