diff mbox series

[v3,1/3] kgdb: Honour the kprobe blocklist when setting breakpoints

Message ID 20200914130143.1322802-2-daniel.thompson@linaro.org
State Accepted
Commit f2d10ff4a903813df767a4b56b651a26b938df06
Headers show
Series kgdb: Honour the kprobe blocklist when setting breakpoints | expand

Commit Message

Daniel Thompson Sept. 14, 2020, 1:01 p.m. UTC
Currently kgdb has absolutely no safety rails in place to discourage or
prevent a user from placing a breakpoint in dangerous places such as
the debugger's own trap entry/exit and other places where it is not safe
to take synchronous traps.

Introduce a new config symbol KGDB_HONOUR_BLOCKLIST and modify the
default implementation of kgdb_validate_break_address() so that we use
the kprobe blocklist to prohibit instrumentation of critical functions
if the config symbol is set. The config symbol dependencies are set to
ensure that the blocklist will be enabled by default if we enable KGDB
and are compiling for an architecture where we HAVE_KPROBES.

Suggested-by: Peter Zijlstra <peterz@infradead.org>
Reviewed-by: Douglas Anderson <dianders@chromium.org>

Signed-off-by: Daniel Thompson <daniel.thompson@linaro.org>

---
 include/linux/kgdb.h      | 18 ++++++++++++++++++
 kernel/debug/debug_core.c |  4 ++++
 kernel/debug/kdb/kdb_bp.c |  9 +++++++++
 lib/Kconfig.kgdb          | 14 ++++++++++++++
 4 files changed, 45 insertions(+)

-- 
2.25.4

Comments

Masami Hiramatsu (Google) Sept. 15, 2020, 12:58 a.m. UTC | #1
On Mon, 14 Sep 2020 14:01:41 +0100
Daniel Thompson <daniel.thompson@linaro.org> wrote:

> Currently kgdb has absolutely no safety rails in place to discourage or

> prevent a user from placing a breakpoint in dangerous places such as

> the debugger's own trap entry/exit and other places where it is not safe

> to take synchronous traps.

> 

> Introduce a new config symbol KGDB_HONOUR_BLOCKLIST and modify the

> default implementation of kgdb_validate_break_address() so that we use

> the kprobe blocklist to prohibit instrumentation of critical functions

> if the config symbol is set. The config symbol dependencies are set to

> ensure that the blocklist will be enabled by default if we enable KGDB

> and are compiling for an architecture where we HAVE_KPROBES.


This looks good to me.

Reviewed-by: Masami Hiramatsu <mhiramat@kernel.org>


Thank you,

> 

> Suggested-by: Peter Zijlstra <peterz@infradead.org>

> Reviewed-by: Douglas Anderson <dianders@chromium.org>

> Signed-off-by: Daniel Thompson <daniel.thompson@linaro.org>

> ---

>  include/linux/kgdb.h      | 18 ++++++++++++++++++

>  kernel/debug/debug_core.c |  4 ++++

>  kernel/debug/kdb/kdb_bp.c |  9 +++++++++

>  lib/Kconfig.kgdb          | 14 ++++++++++++++

>  4 files changed, 45 insertions(+)

> 

> diff --git a/include/linux/kgdb.h b/include/linux/kgdb.h

> index 477b8b7c908f..0d6cf64c8bb1 100644

> --- a/include/linux/kgdb.h

> +++ b/include/linux/kgdb.h

> @@ -16,6 +16,7 @@

>  #include <linux/linkage.h>

>  #include <linux/init.h>

>  #include <linux/atomic.h>

> +#include <linux/kprobes.h>

>  #ifdef CONFIG_HAVE_ARCH_KGDB

>  #include <asm/kgdb.h>

>  #endif

> @@ -335,6 +336,23 @@ extern int kgdb_nmicallin(int cpu, int trapnr, void *regs, int err_code,

>  			  atomic_t *snd_rdy);

>  extern void gdbstub_exit(int status);

>  

> +/*

> + * kgdb and kprobes both use the same (kprobe) blocklist (which makes sense

> + * given they are both typically hooked up to the same trap meaning on most

> + * architectures one cannot be used to debug the other)

> + *

> + * However on architectures where kprobes is not (yet) implemented we permit

> + * breakpoints everywhere rather than blocking everything by default.

> + */

> +static inline bool kgdb_within_blocklist(unsigned long addr)

> +{

> +#ifdef CONFIG_KGDB_HONOUR_BLOCKLIST

> +	return within_kprobe_blacklist(addr);

> +#else

> +	return false;

> +#endif

> +}

> +

>  extern int			kgdb_single_step;

>  extern atomic_t			kgdb_active;

>  #define in_dbg_master() \

> diff --git a/kernel/debug/debug_core.c b/kernel/debug/debug_core.c

> index b16dbc1bf056..b1277728a835 100644

> --- a/kernel/debug/debug_core.c

> +++ b/kernel/debug/debug_core.c

> @@ -188,6 +188,10 @@ int __weak kgdb_validate_break_address(unsigned long addr)

>  {

>  	struct kgdb_bkpt tmp;

>  	int err;

> +

> +	if (kgdb_within_blocklist(addr))

> +		return -EINVAL;

> +

>  	/* Validate setting the breakpoint and then removing it.  If the

>  	 * remove fails, the kernel needs to emit a bad message because we

>  	 * are deep trouble not being able to put things back the way we

> diff --git a/kernel/debug/kdb/kdb_bp.c b/kernel/debug/kdb/kdb_bp.c

> index d7ebb2c79cb8..ec4940146612 100644

> --- a/kernel/debug/kdb/kdb_bp.c

> +++ b/kernel/debug/kdb/kdb_bp.c

> @@ -306,6 +306,15 @@ static int kdb_bp(int argc, const char **argv)

>  	if (!template.bp_addr)

>  		return KDB_BADINT;

>  

> +	/*

> +	 * This check is redundant (since the breakpoint machinery should

> +	 * be doing the same check during kdb_bp_install) but gives the

> +	 * user immediate feedback.

> +	 */

> +	diag = kgdb_validate_break_address(template.bp_addr);

> +	if (diag)

> +		return diag;

> +

>  	/*

>  	 * Find an empty bp structure to allocate

>  	 */

> diff --git a/lib/Kconfig.kgdb b/lib/Kconfig.kgdb

> index 256f2486f9bd..713c17fe789c 100644

> --- a/lib/Kconfig.kgdb

> +++ b/lib/Kconfig.kgdb

> @@ -24,6 +24,20 @@ menuconfig KGDB

>  

>  if KGDB

>  

> +config KGDB_HONOUR_BLOCKLIST

> +	bool "KGDB: use kprobe blocklist to prohibit unsafe breakpoints"

> +	depends on HAVE_KPROBES

> +	select KPROBES

> +	default y

> +	help

> +	  If set to Y the debug core will use the kprobe blocklist to

> +	  identify symbols where it is unsafe to set breakpoints.

> +	  In particular this disallows instrumentation of functions

> +	  called during debug trap handling and thus makes it very

> +	  difficult to inadvertently provoke recursive trap handling.

> +

> +	  If unsure, say Y.

> +

>  config KGDB_SERIAL_CONSOLE

>  	tristate "KGDB: use kgdb over the serial console"

>  	select CONSOLE_POLL

> -- 

> 2.25.4

> 



-- 
Masami Hiramatsu <mhiramat@kernel.org>
diff mbox series

Patch

diff --git a/include/linux/kgdb.h b/include/linux/kgdb.h
index 477b8b7c908f..0d6cf64c8bb1 100644
--- a/include/linux/kgdb.h
+++ b/include/linux/kgdb.h
@@ -16,6 +16,7 @@ 
 #include <linux/linkage.h>
 #include <linux/init.h>
 #include <linux/atomic.h>
+#include <linux/kprobes.h>
 #ifdef CONFIG_HAVE_ARCH_KGDB
 #include <asm/kgdb.h>
 #endif
@@ -335,6 +336,23 @@  extern int kgdb_nmicallin(int cpu, int trapnr, void *regs, int err_code,
 			  atomic_t *snd_rdy);
 extern void gdbstub_exit(int status);
 
+/*
+ * kgdb and kprobes both use the same (kprobe) blocklist (which makes sense
+ * given they are both typically hooked up to the same trap meaning on most
+ * architectures one cannot be used to debug the other)
+ *
+ * However on architectures where kprobes is not (yet) implemented we permit
+ * breakpoints everywhere rather than blocking everything by default.
+ */
+static inline bool kgdb_within_blocklist(unsigned long addr)
+{
+#ifdef CONFIG_KGDB_HONOUR_BLOCKLIST
+	return within_kprobe_blacklist(addr);
+#else
+	return false;
+#endif
+}
+
 extern int			kgdb_single_step;
 extern atomic_t			kgdb_active;
 #define in_dbg_master() \
diff --git a/kernel/debug/debug_core.c b/kernel/debug/debug_core.c
index b16dbc1bf056..b1277728a835 100644
--- a/kernel/debug/debug_core.c
+++ b/kernel/debug/debug_core.c
@@ -188,6 +188,10 @@  int __weak kgdb_validate_break_address(unsigned long addr)
 {
 	struct kgdb_bkpt tmp;
 	int err;
+
+	if (kgdb_within_blocklist(addr))
+		return -EINVAL;
+
 	/* Validate setting the breakpoint and then removing it.  If the
 	 * remove fails, the kernel needs to emit a bad message because we
 	 * are deep trouble not being able to put things back the way we
diff --git a/kernel/debug/kdb/kdb_bp.c b/kernel/debug/kdb/kdb_bp.c
index d7ebb2c79cb8..ec4940146612 100644
--- a/kernel/debug/kdb/kdb_bp.c
+++ b/kernel/debug/kdb/kdb_bp.c
@@ -306,6 +306,15 @@  static int kdb_bp(int argc, const char **argv)
 	if (!template.bp_addr)
 		return KDB_BADINT;
 
+	/*
+	 * This check is redundant (since the breakpoint machinery should
+	 * be doing the same check during kdb_bp_install) but gives the
+	 * user immediate feedback.
+	 */
+	diag = kgdb_validate_break_address(template.bp_addr);
+	if (diag)
+		return diag;
+
 	/*
 	 * Find an empty bp structure to allocate
 	 */
diff --git a/lib/Kconfig.kgdb b/lib/Kconfig.kgdb
index 256f2486f9bd..713c17fe789c 100644
--- a/lib/Kconfig.kgdb
+++ b/lib/Kconfig.kgdb
@@ -24,6 +24,20 @@  menuconfig KGDB
 
 if KGDB
 
+config KGDB_HONOUR_BLOCKLIST
+	bool "KGDB: use kprobe blocklist to prohibit unsafe breakpoints"
+	depends on HAVE_KPROBES
+	select KPROBES
+	default y
+	help
+	  If set to Y the debug core will use the kprobe blocklist to
+	  identify symbols where it is unsafe to set breakpoints.
+	  In particular this disallows instrumentation of functions
+	  called during debug trap handling and thus makes it very
+	  difficult to inadvertently provoke recursive trap handling.
+
+	  If unsure, say Y.
+
 config KGDB_SERIAL_CONSOLE
 	tristate "KGDB: use kgdb over the serial console"
 	select CONSOLE_POLL