Add a sanity check to ensure the stack only grows down, and print a
warning if the check fails.

Signed-off-by: Josh Poimboeuf <jpoim...@redhat.com>
---
 arch/x86/kernel/unwind_frame.c | 26 ++++++++++++++++++++++++--
 1 file changed, 24 insertions(+), 2 deletions(-)

diff --git a/arch/x86/kernel/unwind_frame.c b/arch/x86/kernel/unwind_frame.c
index 5496462..f21b7ef 100644
--- a/arch/x86/kernel/unwind_frame.c
+++ b/arch/x86/kernel/unwind_frame.c
@@ -32,6 +32,15 @@ unsigned long unwind_get_return_address(struct unwind_state 
*state)
 }
 EXPORT_SYMBOL_GPL(unwind_get_return_address);
 
+static size_t regs_size(struct pt_regs *regs)
+{
+       /* x86_32 regs from kernel mode are two words shorter */
+       if (IS_ENABLED(CONFIG_X86_32) && !user_mode(regs))
+               return sizeof(*regs) - (2*sizeof(long));
+
+       return sizeof(*regs);
+}
+
 static bool is_last_task_frame(struct unwind_state *state)
 {
        unsigned long bp = (unsigned long)state->bp;
@@ -85,6 +94,7 @@ bool unwind_next_frame(struct unwind_state *state)
        struct pt_regs *regs;
        unsigned long *next_bp, *next_sp;
        size_t next_len;
+       enum stack_type prev_type = state->stack_info.type;
 
        if (unwind_done(state))
                return false;
@@ -140,6 +150,18 @@ bool unwind_next_frame(struct unwind_state *state)
        if (!update_stack_state(state, next_sp, next_len))
                goto bad_address;
 
+       /* make sure it only unwinds up and doesn't overlap the last frame */
+       if (state->stack_info.type == prev_type) {
+               if (state->regs &&
+                   (void *)next_sp < (void *)state->regs +
+                                     regs_size(state->regs))
+                       goto bad_address;
+
+               if (state->bp &&
+                   (void *)next_sp < (void *)state->bp + FRAME_HEADER_SIZE)
+                       goto bad_address;
+       }
+
        /* move to the next frame */
        if (regs) {
                state->regs = regs;
@@ -156,12 +178,12 @@ bad_address:
                printk_deferred_once(KERN_WARNING
                        "WARNING: kernel stack regs at %p in %s:%d has bad 'bp' 
value %p\n",
                        state->regs, state->task->comm,
-                       state->task->pid, next_bp);
+                       state->task->pid, next_sp);
        else
                printk_deferred_once(KERN_WARNING
                        "WARNING: kernel stack frame pointer at %p in %s:%d has 
bad value %p\n",
                        state->bp, state->task->comm,
-                       state->task->pid, next_bp);
+                       state->task->pid, next_sp);
 the_end:
        state->stack_info.type = STACK_TYPE_UNKNOWN;
        return false;
-- 
2.7.4

Reply via email to