Skip to content

Commit c98f582

Browse files
committed
Merge branch 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 fixes from Ingo Molnar: "Two fixes and a cleanup-fix, to the syscall entry code and to ptrace" * 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: x86/syscalls/64: Add compat_sys_keyctl for 32-bit userspace x86/ptrace: Stop setting TS_COMPAT in ptrace code x86/vdso: Error out if the vDSO isn't a valid DSO
2 parents 1630e84 + f7d6656 commit c98f582

File tree

7 files changed

+49
-14
lines changed

7 files changed

+49
-14
lines changed

arch/x86/entry/common.c

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -204,8 +204,12 @@ __visible inline void prepare_exit_to_usermode(struct pt_regs *regs)
204204
* handling, because syscall restart has a fixup for compat
205205
* syscalls. The fixup is exercised by the ptrace_syscall_32
206206
* selftest.
207+
*
208+
* We also need to clear TS_REGS_POKED_I386: the 32-bit tracer
209+
* special case only applies after poking regs and before the
210+
* very next return to user mode.
207211
*/
208-
ti->status &= ~TS_COMPAT;
212+
ti->status &= ~(TS_COMPAT|TS_I386_REGS_POKED);
209213
#endif
210214

211215
user_enter_irqoff();

arch/x86/entry/syscalls/syscall_32.tbl

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -294,7 +294,7 @@
294294
# 285 sys_setaltroot
295295
286 i386 add_key sys_add_key
296296
287 i386 request_key sys_request_key
297-
288 i386 keyctl sys_keyctl
297+
288 i386 keyctl sys_keyctl compat_sys_keyctl
298298
289 i386 ioprio_set sys_ioprio_set
299299
290 i386 ioprio_get sys_ioprio_get
300300
291 i386 inotify_init sys_inotify_init

arch/x86/entry/vdso/vdso2c.h

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,9 @@ static void BITSFUNC(go)(void *raw_addr, size_t raw_len,
2222

2323
ELF(Phdr) *pt = (ELF(Phdr) *)(raw_addr + GET_LE(&hdr->e_phoff));
2424

25+
if (hdr->e_type != ET_DYN)
26+
fail("input is not a shared object\n");
27+
2528
/* Walk the segment table. */
2629
for (i = 0; i < GET_LE(&hdr->e_phnum); i++) {
2730
if (GET_LE(&pt[i].p_type) == PT_LOAD) {
@@ -49,6 +52,9 @@ static void BITSFUNC(go)(void *raw_addr, size_t raw_len,
4952
if (stripped_len < load_size)
5053
fail("stripped input is too short\n");
5154

55+
if (!dyn)
56+
fail("input has no PT_DYNAMIC section -- your toolchain is buggy\n");
57+
5258
/* Walk the dynamic table */
5359
for (i = 0; dyn + i < dyn_end &&
5460
GET_LE(&dyn[i].d_tag) != DT_NULL; i++) {

arch/x86/include/asm/syscall.h

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ static inline long syscall_get_error(struct task_struct *task,
6060
* TS_COMPAT is set for 32-bit syscall entries and then
6161
* remains set until we return to user mode.
6262
*/
63-
if (task_thread_info(task)->status & TS_COMPAT)
63+
if (task_thread_info(task)->status & (TS_COMPAT|TS_I386_REGS_POKED))
6464
/*
6565
* Sign-extend the value so (int)-EFOO becomes (long)-EFOO
6666
* and will match correctly in comparisons.
@@ -239,9 +239,6 @@ static inline int syscall_get_arch(void)
239239
* TS_COMPAT is set for 32-bit syscall entry and then
240240
* remains set until we return to user mode.
241241
*
242-
* TIF_IA32 tasks should always have TS_COMPAT set at
243-
* system call time.
244-
*
245242
* x32 tasks should be considered AUDIT_ARCH_X86_64.
246243
*/
247244
if (task_thread_info(current)->status & TS_COMPAT)

arch/x86/include/asm/thread_info.h

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -219,6 +219,9 @@ static inline unsigned long current_stack_pointer(void)
219219
* have to worry about atomic accesses.
220220
*/
221221
#define TS_COMPAT 0x0002 /* 32bit syscall active (64BIT)*/
222+
#ifdef CONFIG_COMPAT
223+
#define TS_I386_REGS_POKED 0x0004 /* regs poked by 32-bit ptracer */
224+
#endif
222225

223226
#ifndef __ASSEMBLY__
224227

arch/x86/kernel/ptrace.c

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -923,15 +923,18 @@ static int putreg32(struct task_struct *child, unsigned regno, u32 value)
923923

924924
case offsetof(struct user32, regs.orig_eax):
925925
/*
926-
* A 32-bit debugger setting orig_eax means to restore
927-
* the state of the task restarting a 32-bit syscall.
928-
* Make sure we interpret the -ERESTART* codes correctly
929-
* in case the task is not actually still sitting at the
930-
* exit from a 32-bit syscall with TS_COMPAT still set.
926+
* Warning: bizarre corner case fixup here. A 32-bit
927+
* debugger setting orig_eax to -1 wants to disable
928+
* syscall restart. Make sure that the syscall
929+
* restart code sign-extends orig_ax. Also make sure
930+
* we interpret the -ERESTART* codes correctly if
931+
* loaded into regs->ax in case the task is not
932+
* actually still sitting at the exit from a 32-bit
933+
* syscall with TS_COMPAT still set.
931934
*/
932935
regs->orig_ax = value;
933936
if (syscall_get_nr(child, regs) >= 0)
934-
task_thread_info(child)->status |= TS_COMPAT;
937+
task_thread_info(child)->status |= TS_I386_REGS_POKED;
935938
break;
936939

937940
case offsetof(struct user32, regs.eflags):

arch/x86/kernel/signal.c

Lines changed: 24 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -760,8 +760,30 @@ handle_signal(struct ksignal *ksig, struct pt_regs *regs)
760760

761761
static inline unsigned long get_nr_restart_syscall(const struct pt_regs *regs)
762762
{
763-
#ifdef CONFIG_X86_64
764-
if (in_ia32_syscall())
763+
/*
764+
* This function is fundamentally broken as currently
765+
* implemented.
766+
*
767+
* The idea is that we want to trigger a call to the
768+
* restart_block() syscall and that we want in_ia32_syscall(),
769+
* in_x32_syscall(), etc. to match whatever they were in the
770+
* syscall being restarted. We assume that the syscall
771+
* instruction at (regs->ip - 2) matches whatever syscall
772+
* instruction we used to enter in the first place.
773+
*
774+
* The problem is that we can get here when ptrace pokes
775+
* syscall-like values into regs even if we're not in a syscall
776+
* at all.
777+
*
778+
* For now, we maintain historical behavior and guess based on
779+
* stored state. We could do better by saving the actual
780+
* syscall arch in restart_block or (with caveats on x32) by
781+
* checking if regs->ip points to 'int $0x80'. The current
782+
* behavior is incorrect if a tracer has a different bitness
783+
* than the tracee.
784+
*/
785+
#ifdef CONFIG_IA32_EMULATION
786+
if (current_thread_info()->status & (TS_COMPAT|TS_I386_REGS_POKED))
765787
return __NR_ia32_restart_syscall;
766788
#endif
767789
#ifdef CONFIG_X86_X32_ABI

0 commit comments

Comments
 (0)