Date: Fri, 27 Mar 2015 16:55:02 -0400 From: Yue Chen <ycyc321@gmail.com> To: Mateusz Guzik <mjguzik@gmail.com>, Oliver Pinter <oliver.pinter@hardenedbsd.org>, Benjamin Kaduk <bjk@freebsd.org>, Yue Chen <ycyc321@gmail.com>, "freebsd-hackers@freebsd.org" <freebsd-hackers@freebsd.org> Subject: Re: How to traverse kernel threads? Message-ID: <CAKtBrB6qeNTyemG-ws7X_OKcB2t-6muxJrOZ1Eyr0CRjjso5mQ@mail.gmail.com> In-Reply-To: <20150327194920.GB18158@dft-labs.eu> References: <CAKtBrB4h13ZFJ=V0fvkDeTG-L6=e5Uz9%2BHfYc8vY523Y3X6N0A@mail.gmail.com> <20150321220246.GE14650@dft-labs.eu> <CAKtBrB5KNqt6UJ1R_BQpPfTvQZdUzGvZZtT7Uz5qd4VrrfgEdw@mail.gmail.com> <20150321232622.GF14650@dft-labs.eu> <alpine.GSO.1.10.1503221644440.22210@multics.mit.edu> <CAPQ4ffuszSi%2B_SopJdCkoFr4OoY9=BZVbO6oo_s0sKrn8Rgjrw@mail.gmail.com> <CAKtBrB6ZF2FVExmDd%2Bt8yFpN0H7xHwaieWgvryR535Vc2cNBjw@mail.gmail.com> <20150327194920.GB18158@dft-labs.eu>
next in thread | previous in thread | raw e-mail | index | archive | help
> Except it seems there routines are supposed to be only used when > execution is 'frozen' (e.g. when escaped to the debugger). It means probably we can run the code in ``smp_rendezvous()'' function, right? > Still nobody knows what you are trying to do. We are trying to enhance FreeBSD's security by randomizing kernel code basic blocks periodically at runtime, to mitigate the attacks like return-oriented programming (ROP). It is basically a stronger form of ASLR. After each randomization procedure, the function return addresses saved in the stack are the ``old'' addresses before randomization, so we need to update them to the new addresses. That's why we need to get all the stack ranges to find those addresses. Also, in kernel, we believe that not only the return addresses in stacks need to be updated, there may exist other ``old'' saved instruction (PC) addresses in memory. Like in exception handling (maybe, do not know), debugging-purpose code and restartable atomic sequences (RAS) implementation. That's why I asked how to traverse all the kernel pages and get their virtual addresses here: https://lists.freebsd.org/pipermail/freebsd-hackers/2015-March/047336.html Now we found that it seems needed to traverse the ``pv_entry'' structure for x86_64 MMU. Another problem is that we do not know if FreeBSD has any form of special encodings or offset form for 64-bit instruction addresses (e.g., saved %RIP) on X86_64, instead of hard-coded addresses. For example, using a 32-bit offset instead of the 64-bit full address; and doing what glibc does for the setjmp/longjmp jmp_buf (special encodings (PTR_MANGLE) for the saved register values). Any suggestion or correction are highly appreciated. Best, Yue On Fri, Mar 27, 2015 at 3:49 PM, Mateusz Guzik <mjguzik@gmail.com> wrote: > On Fri, Mar 27, 2015 at 02:35:55PM -0400, Yue Chen wrote: > > When using the following code on kernel module loading: > > > ------------------------------------------------------------------------------------------ > > struct thread *td = kdb_thr_first(); > > td = kdb_thr_next(td); > > > ------------------------------------------------------------------------------------------ > > The kernel panics. > > > > Panics how? > > Also you can easily see these functions don't lock anything, so it would > be assumed you took appropriate locks. > > Except it seems there routines are supposed to be only used when > execution is 'frozen' (e.g. when escaped to the debugger). > > > > > And when printing all threads in proc0 (all kernel threads?): > > > ------------------------------------------------------------------------------------------ > > struct proc *p = pfind(0); > > FOREACH_THREAD_IN_PROC(p, td) { > > uprintf("td: %x\n", td); > > } > > > > proc0 is an exported symbol, no need to pfind. > > > td = curthread; > > uprintf("cur td: %x\n", td); > > > ------------------------------------------------------------------------------------------ > > The ``curthread'' (from this kernel module running the above code) is not > > in the 0 process group. > > > > There is no 'curthread from kernel module'. > > My guess is you do this work from module initializator, and in that case > curthread is the thread which loads the module, and such a thread is > definitely not linked into proc0. > > Still nobody knows what you are trying to do. > > -- > Mateusz Guzik <mjguzik gmail.com> >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAKtBrB6qeNTyemG-ws7X_OKcB2t-6muxJrOZ1Eyr0CRjjso5mQ>