[LTP] [x86/entry] 2bbc68f837: ltp.ptrace08.fail
Thomas Gleixner
tglx@linutronix.de
Thu Jun 18 22:02:30 CEST 2020
Cyril Hrubis <chrubis@suse.cz> writes:
> What is does is to write:
>
> (void*)1 to u_debugreg[0]
> (void*)1 to u_debugreg[7]
> do_debug addr to u_debugreg[0]
>
> Looking at the kernel code the write to register 7 enables the breakpoints and
> what we attempt here is to change an invalid address to a valid one after we
> enabled the breakpoint but that's as far I can go.
>
> So does anyone has an idea how to trigger the bug without the do_debug function
> address? Would any valid kernel function address suffice?
According to https://www.openwall.com/lists/oss-security/2018/05/01/3
the trigger is to set the breakpoint to do_debug() and then execute
INT1, aka. ICEBP which ends up in do_debug() ....
In principle each kernel address is ok, but do_debug() is interesting
due to the recursion issue because user space can reach it by executing
INT1.
So you might check for exc_debug() if do_debug() is not available and
make the whole thing fail gracefully with a usefu error message.
Thanks,
tglx
More information about the ltp
mailing list