[LTP] [PATCH] Revert "pkey01: Adding test for PKEY_DISABLE_EXECUTE"
Li Wang
liwang@redhat.com
Wed Nov 20 13:57:36 CET 2024
On Tue, Nov 19, 2024 at 9:32 PM Jan Stancek <jstancek@redhat.com> wrote:
> On Tue, Nov 19, 2024 at 2:11 PM Jan Stancek <jstancek@redhat.com> wrote:
> >
> > On Fri, Nov 15, 2024 at 7:58 PM Petr Vorel <pvorel@suse.cz> wrote:
> > >
> > > Hi Li, Martin,
> > >
> > > > Sorry, I forgot to CC Li in the patch.
> > >
> > > > On 15. 11. 24 16:44, Martin Doucha wrote:
> > > > > This reverts commit d2b8a476c29d52c484b387454082bbc906b0b4f8.
> > >
> > > > > Remove the PKEY_DISABLE_EXECUTE subtest. The function_size() code
> > > > > is broken in a way that I cannot easily fix. The function tries
> > > > > to calculate the size of a function by finding the first RET
> > > > > instruction. However, in 32bit LTP builds, the code gets compiled
> > > > > to this:
> > >
> > > > > 0804b690 <function_size>:
> > > > > 804b690: 8b 4c 24 04 mov 0x4(%esp),%ecx
> > > > > 804b694: 0f b6 01 movzbl (%ecx),%eax
> > > > > 804b697: 83 c0 3e add $0x3e,%eax
> > > > > 804b69a: 3c 01 cmp $0x1,%al
> > > > > 804b69c: 76 1a jbe 804b6b8
> <function_size+0x28>
> > > > > 804b69e: 89 c8 mov %ecx,%eax
> > > > > 804b6a0: 83 c0 01 add $0x1,%eax
> > > > > 804b6a3: 0f b6 10 movzbl (%eax),%edx
> > > > > 804b6a6: 83 c2 3e add $0x3e,%edx
> > > > > 804b6a9: 80 fa 01 cmp $0x1,%dl
> > > > > 804b6ac: 77 f2 ja 804b6a0
> <function_size+0x10>
> > > > > 804b6ae: 29 c8 sub %ecx,%eax
> > > > > 804b6b0: 83 c0 10 add $0x10,%eax
> > > > > 804b6b3: c3 ret
> > > > > 804b6b4: 8d 74 26 00 lea
> 0x0(%esi,%eiz,1),%esi
> > > > > 804b6b8: b8 10 00 00 00 mov $0x10,%eax
> > > > > 804b6bd: c3 ret
> > > > > 804b6be: 66 90 xchg %ax,%ax
> > >
> > > > > If you look closely enough, you'll notice a C2 byte in add
> $0x3e,%edx
> > > > > instruction on address 804b6a6. The function will assume this byte
> is
> > > > > a RET instruction, return a size that's 22 bytes too short and then
> > > > > the code execution inside the executable buffer will run past the
> end
> > > > > of buffer, resulting in a segfault.
> > >
> > > Martin, thanks a lot for debugging!
> > >
> > > Acked-by: Petr Vorel <pvorel@suse.cz>
> > >
> > > Other option would be to disable this test only for 32bit (keep it for
> 64bit).
> > > Li, any change you could have look into it?
> >
> > I vaguely recall we already dealt with something similar for a
> > different test, which
> > copied function, then changed protection to EXEC and finally ran it.
> > I'll see if I can find it.
>
> Do we need function_size() to return accurate number? In mprotect04
>
That is a simple method to check that the buffer can be executed correctly.
> we ended up using CFLAGS += -falign-functions=64 and copying everything
> until end of page. Function was dummy, so it always fit and it's not an
> issue if we copied more.
>
Yes, this could work as well, thanks for improving it.
P.s I am on traveling this week, so I wouldn't find a machine to test the
patch.
--
Regards,
Li Wang
More information about the ltp
mailing list