Skip to content

Commit d4ccd54

Browse files
thejhkees
authored andcommitted
exit: Put an upper limit on how often we can oops
Many Linux systems are configured to not panic on oops; but allowing an attacker to oops the system **really** often can make even bugs that look completely unexploitable exploitable (like NULL dereferences and such) if each crash elevates a refcount by one or a lock is taken in read mode, and this causes a counter to eventually overflow. The most interesting counters for this are 32 bits wide (like open-coded refcounts that don't use refcount_t). (The ldsem reader count on 32-bit platforms is just 16 bits, but probably nobody cares about 32-bit platforms that much nowadays.) So let's panic the system if the kernel is constantly oopsing. The speed of oopsing 2^32 times probably depends on several factors, like how long the stack trace is and which unwinder you're using; an empirically important one is whether your console is showing a graphical environment or a text console that oopses will be printed to. In a quick single-threaded benchmark, it looks like oopsing in a vfork() child with a very short stack trace only takes ~510 microseconds per run when a graphical console is active; but switching to a text console that oopses are printed to slows it down around 87x, to ~45 milliseconds per run. (Adding more threads makes this faster, but the actual oops printing happens under &die_lock on x86, so you can maybe speed this up by a factor of around 2 and then any further improvement gets eaten up by lock contention.) It looks like it would take around 8-12 days to overflow a 32-bit counter with repeated oopsing on a multi-core X86 system running a graphical environment; both me (in an X86 VM) and Seth (with a distro kernel on normal hardware in a standard configuration) got numbers in that ballpark. 12 days aren't *that* short on a desktop system, and you'd likely need much longer on a typical server system (assuming that people don't run graphical desktop environments on their servers), and this is a *very* noisy and violent approach to exploiting the kernel; and it also seems to take orders of magnitude longer on some machines, probably because stuff like EFI pstore will slow it down a ton if that's active. Signed-off-by: Jann Horn <[email protected]> Link: https://lore.kernel.org/r/[email protected] Reviewed-by: Luis Chamberlain <[email protected]> Signed-off-by: Kees Cook <[email protected]> Link: https://lore.kernel.org/r/[email protected]
1 parent 9360d03 commit d4ccd54

File tree

2 files changed

+50
-0
lines changed

2 files changed

+50
-0
lines changed

Documentation/admin-guide/sysctl/kernel.rst

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -667,6 +667,14 @@ This is the default behavior.
667667
an oops event is detected.
668668

669669

670+
oops_limit
671+
==========
672+
673+
Number of kernel oopses after which the kernel should panic when
674+
``panic_on_oops`` is not set. Setting this to 0 or 1 has the same effect
675+
as setting ``panic_on_oops=1``.
676+
677+
670678
osrelease, ostype & version
671679
===========================
672680

kernel/exit.c

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -72,6 +72,33 @@
7272
#include <asm/unistd.h>
7373
#include <asm/mmu_context.h>
7474

75+
/*
76+
* The default value should be high enough to not crash a system that randomly
77+
* crashes its kernel from time to time, but low enough to at least not permit
78+
* overflowing 32-bit refcounts or the ldsem writer count.
79+
*/
80+
static unsigned int oops_limit = 10000;
81+
82+
#ifdef CONFIG_SYSCTL
83+
static struct ctl_table kern_exit_table[] = {
84+
{
85+
.procname = "oops_limit",
86+
.data = &oops_limit,
87+
.maxlen = sizeof(oops_limit),
88+
.mode = 0644,
89+
.proc_handler = proc_douintvec,
90+
},
91+
{ }
92+
};
93+
94+
static __init int kernel_exit_sysctls_init(void)
95+
{
96+
register_sysctl_init("kernel", kern_exit_table);
97+
return 0;
98+
}
99+
late_initcall(kernel_exit_sysctls_init);
100+
#endif
101+
75102
static void __unhash_process(struct task_struct *p, bool group_dead)
76103
{
77104
nr_threads--;
@@ -874,6 +901,8 @@ void __noreturn do_exit(long code)
874901

875902
void __noreturn make_task_dead(int signr)
876903
{
904+
static atomic_t oops_count = ATOMIC_INIT(0);
905+
877906
/*
878907
* Take the task off the cpu after something catastrophic has
879908
* happened.
@@ -897,6 +926,19 @@ void __noreturn make_task_dead(int signr)
897926
preempt_count_set(PREEMPT_ENABLED);
898927
}
899928

929+
/*
930+
* Every time the system oopses, if the oops happens while a reference
931+
* to an object was held, the reference leaks.
932+
* If the oops doesn't also leak memory, repeated oopsing can cause
933+
* reference counters to wrap around (if they're not using refcount_t).
934+
* This means that repeated oopsing can make unexploitable-looking bugs
935+
* exploitable through repeated oopsing.
936+
* To make sure this can't happen, place an upper bound on how often the
937+
* kernel may oops without panic().
938+
*/
939+
if (atomic_inc_return(&oops_count) >= READ_ONCE(oops_limit))
940+
panic("Oopsed too often (kernel.oops_limit is %d)", oops_limit);
941+
900942
/*
901943
* We're taking recursive faults here in make_task_dead. Safest is to just
902944
* leave this task alone and wait for reboot.

0 commit comments

Comments
 (0)