1 /*
2 * Copyright (c) 2017 Richard Palethorpe <rpalethorpe@suse.com>
3 *
4 * This program is free software: you can redistribute it and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation, either version 2 of the License, or
7 * (at your option) any later version.
8 *
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this program. If not, see <http://www.gnu.org/licenses/>.
16 */
17 /* Test for CVE-2017-7308 on a raw socket's ring buffer
18 *
19 * Try to set tpacket_req3.tp_sizeof_priv to a value with the high bit set. So
20 * that tp_block_size < tp_sizeof_priv. If the vulnerability is present then
21 * this will cause an integer arithmetic overflow and the absurd
22 * tp_sizeof_priv value will be allowed. If it has been fixed then setsockopt
23 * will fail with EINVAL.
24 *
25 * We also try a good configuration to make sure it is not failing with EINVAL
26 * for some other reason.
27 *
28 * For a better and more interesting discussion of this CVE see:
29 * https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html
30 */
31
32 #include <errno.h>
33 #include "tst_test.h"
34 #include "tst_safe_net.h"
35 #include "config.h"
36
37 #ifdef HAVE_LINUX_IF_PACKET_H
38 # include <linux/if_packet.h>
39 #endif
40
41 #ifdef HAVE_LINUX_IF_ETHER_H
42 # include <linux/if_ether.h>
43 #endif
44
45 #ifndef ETH_P_ALL
46 # define ETH_P_ALL 0x0003
47 #endif
48
49 #ifndef PACKET_RX_RING
50 # define PACKET_RX_RING 5
51 #endif
52
53 #ifndef PACKET_VERSION
54 # define PACKET_VERSION 10
55 #endif
56
57 #ifndef HAVE_STRUCT_TPACKET_REQ3
58 # define TPACKET_V3 2
59
60 struct tpacket_req3 {
61 unsigned int tp_block_size;
62 unsigned int tp_block_nr;
63 unsigned int tp_frame_size;
64 unsigned int tp_frame_nr;
65 unsigned int tp_retire_blk_tov;
66 unsigned int tp_sizeof_priv;
67 unsigned int tp_feature_req_word;
68 };
69 #endif
70
71 static int sk;
72 static long pgsz;
73
setup(void)74 static void setup(void)
75 {
76 pgsz = SAFE_SYSCONF(_SC_PAGESIZE);
77 }
78
cleanup(void)79 static void cleanup(void)
80 {
81 if (sk > 0)
82 SAFE_CLOSE(sk);
83 }
84
create_skbuf(unsigned int sizeof_priv)85 static int create_skbuf(unsigned int sizeof_priv)
86 {
87 int ver = TPACKET_V3;
88 struct tpacket_req3 req = {};
89
90 req.tp_block_size = pgsz;
91 req.tp_block_nr = 2;
92 req.tp_frame_size = req.tp_block_size;
93 req.tp_frame_nr = req.tp_block_nr;
94 req.tp_retire_blk_tov = 100;
95
96 req.tp_sizeof_priv = sizeof_priv;
97
98 sk = SAFE_SOCKET(AF_PACKET, SOCK_RAW, htons(ETH_P_ALL));
99 TEST(setsockopt(sk, SOL_PACKET, PACKET_VERSION, &ver, sizeof(ver)));
100 if (TST_RET && TST_ERR == EINVAL)
101 tst_brk(TCONF | TTERRNO, "TPACKET_V3 not supported");
102 if (TST_RET)
103 tst_brk(TBROK | TTERRNO, "setsockopt(sk, SOL_PACKET, PACKET_VERSION, TPACKET_V3)");
104
105 return setsockopt(sk, SOL_PACKET, PACKET_RX_RING, &req, sizeof(req));
106 }
107
good_size(void)108 static void good_size(void)
109 {
110 TEST(create_skbuf(512));
111 if (TST_RET)
112 tst_brk(TBROK | TTERRNO, "Can't create ring buffer with good settings");
113
114 tst_res(TPASS, "Can create ring buffer with good settinegs");
115 }
116
bad_size(void)117 static void bad_size(void)
118 {
119 TEST(create_skbuf(3U << 30));
120 if (TST_RET && TST_ERR != EINVAL)
121 tst_brk(TBROK | TTERRNO, "Unexpected setsockopt() error");
122 if (TST_RET)
123 tst_res(TPASS | TTERRNO, "Refused bad tp_sizeof_priv value");
124 else
125 tst_res(TFAIL, "Allowed bad tp_sizeof_priv value");
126 }
127
run(unsigned int i)128 static void run(unsigned int i)
129 {
130 if (i == 0)
131 good_size();
132 else
133 bad_size();
134
135 SAFE_CLOSE(sk);
136 }
137
138 static struct tst_test test = {
139 .test = run,
140 .tcnt = 2,
141 .needs_root = 1,
142 .setup = setup,
143 .cleanup = cleanup,
144 .min_kver = "3.2",
145 };
146