1 // SPDX-License-Identifier: GPL-2.0
3 * This code tests that the current task stack is properly erased (filled
4 * with STACKLEAK_POISON).
7 * Alexander Popov <alex.popov@linux.com>
8 * Tycho Andersen <tycho@tycho.ws>
12 #include <linux/stackleak.h>
14 #if defined(CONFIG_GCC_PLUGIN_STACKLEAK)
16 * Check that stackleak tracks the lowest stack pointer and erases the stack
17 * below this as expected.
19 * To prevent the lowest stack pointer changing during the test, IRQs are
20 * masked and instrumentation of this function is disabled. We assume that the
21 * compiler will create a fixed-size stack frame for this function.
23 * Any non-inlined function may make further use of the stack, altering the
24 * lowest stack pointer and/or clobbering poison values. To avoid spurious
25 * failures we must avoid printing until the end of the test or have already
26 * encountered a failure condition.
28 static void noinstr
check_stackleak_irqoff(void)
30 const unsigned long task_stack_base
= (unsigned long)task_stack_page(current
);
31 const unsigned long task_stack_low
= stackleak_task_low_bound(current
);
32 const unsigned long task_stack_high
= stackleak_task_high_bound(current
);
33 const unsigned long current_sp
= current_stack_pointer
;
34 const unsigned long lowest_sp
= current
->lowest_stack
;
35 unsigned long untracked_high
;
36 unsigned long poison_high
, poison_low
;
37 bool test_failed
= false;
40 * Check that the current and lowest recorded stack pointer values fall
41 * within the expected task stack boundaries. These tests should never
42 * fail unless the boundaries are incorrect or we're clobbering the
43 * STACK_END_MAGIC, and in either casee something is seriously wrong.
45 if (current_sp
< task_stack_low
|| current_sp
>= task_stack_high
) {
46 instrumentation_begin();
47 pr_err("FAIL: current_stack_pointer (0x%lx) outside of task stack bounds [0x%lx..0x%lx]\n",
48 current_sp
, task_stack_low
, task_stack_high
- 1);
52 if (lowest_sp
< task_stack_low
|| lowest_sp
>= task_stack_high
) {
53 instrumentation_begin();
54 pr_err("FAIL: current->lowest_stack (0x%lx) outside of task stack bounds [0x%lx..0x%lx]\n",
55 lowest_sp
, task_stack_low
, task_stack_high
- 1);
61 * Depending on what has run prior to this test, the lowest recorded
62 * stack pointer could be above or below the current stack pointer.
63 * Start from the lowest of the two.
65 * Poison values are naturally-aligned unsigned longs. As the current
66 * stack pointer might not be sufficiently aligned, we must align
67 * downwards to find the lowest known stack pointer value. This is the
68 * high boundary for a portion of the stack which may have been used
69 * without being tracked, and has to be scanned for poison.
71 untracked_high
= min(current_sp
, lowest_sp
);
72 untracked_high
= ALIGN_DOWN(untracked_high
, sizeof(unsigned long));
75 * Find the top of the poison in the same way as the erasing code.
77 poison_high
= stackleak_find_top_of_poison(task_stack_low
, untracked_high
);
80 * Check whether the poisoned portion of the stack (if any) consists
81 * entirely of poison. This verifies the entries that
82 * stackleak_find_top_of_poison() should have checked.
84 poison_low
= poison_high
;
85 while (poison_low
> task_stack_low
) {
86 poison_low
-= sizeof(unsigned long);
88 if (*(unsigned long *)poison_low
== STACKLEAK_POISON
)
91 instrumentation_begin();
92 pr_err("FAIL: non-poison value %lu bytes below poison boundary: 0x%lx\n",
93 poison_high
- poison_low
, *(unsigned long *)poison_low
);
98 instrumentation_begin();
99 pr_info("stackleak stack usage:\n"
100 " high offset: %lu bytes\n"
101 " current: %lu bytes\n"
102 " lowest: %lu bytes\n"
103 " tracked: %lu bytes\n"
104 " untracked: %lu bytes\n"
105 " poisoned: %lu bytes\n"
106 " low offset: %lu bytes\n",
107 task_stack_base
+ THREAD_SIZE
- task_stack_high
,
108 task_stack_high
- current_sp
,
109 task_stack_high
- lowest_sp
,
110 task_stack_high
- untracked_high
,
111 untracked_high
- poison_high
,
112 poison_high
- task_stack_low
,
113 task_stack_low
- task_stack_base
);
117 pr_err("FAIL: the thread stack is NOT properly erased!\n");
119 pr_info("OK: the rest of the thread stack is properly erased\n");
121 instrumentation_end();
124 static void lkdtm_STACKLEAK_ERASING(void)
128 local_irq_save(flags
);
129 check_stackleak_irqoff();
130 local_irq_restore(flags
);
132 #else /* defined(CONFIG_GCC_PLUGIN_STACKLEAK) */
133 static void lkdtm_STACKLEAK_ERASING(void)
135 if (IS_ENABLED(CONFIG_HAVE_ARCH_STACKLEAK
)) {
136 pr_err("XFAIL: stackleak is not enabled (CONFIG_GCC_PLUGIN_STACKLEAK=n)\n");
138 pr_err("XFAIL: stackleak is not supported on this arch (HAVE_ARCH_STACKLEAK=n)\n");
141 #endif /* defined(CONFIG_GCC_PLUGIN_STACKLEAK) */
143 static struct crashtype crashtypes
[] = {
144 CRASHTYPE(STACKLEAK_ERASING
),
147 struct crashtype_category stackleak_crashtypes
= {
148 .crashtypes
= crashtypes
,
149 .len
= ARRAY_SIZE(crashtypes
),