Commit c98f5827 authored by Linus Torvalds's avatar Linus Torvalds

Merge branch 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip

Pull x86 fixes from Ingo Molnar:
 "Two fixes and a cleanup-fix, to the syscall entry code and to ptrace"

* 'x86-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
  x86/syscalls/64: Add compat_sys_keyctl for 32-bit userspace
  x86/ptrace: Stop setting TS_COMPAT in ptrace code
  x86/vdso: Error out if the vDSO isn't a valid DSO
parents 1630e843 f7d66562
...@@ -204,8 +204,12 @@ __visible inline void prepare_exit_to_usermode(struct pt_regs *regs) ...@@ -204,8 +204,12 @@ __visible inline void prepare_exit_to_usermode(struct pt_regs *regs)
* handling, because syscall restart has a fixup for compat * handling, because syscall restart has a fixup for compat
* syscalls. The fixup is exercised by the ptrace_syscall_32 * syscalls. The fixup is exercised by the ptrace_syscall_32
* selftest. * selftest.
*
* We also need to clear TS_REGS_POKED_I386: the 32-bit tracer
* special case only applies after poking regs and before the
* very next return to user mode.
*/ */
ti->status &= ~TS_COMPAT; ti->status &= ~(TS_COMPAT|TS_I386_REGS_POKED);
#endif #endif
user_enter_irqoff(); user_enter_irqoff();
......
...@@ -294,7 +294,7 @@ ...@@ -294,7 +294,7 @@
# 285 sys_setaltroot # 285 sys_setaltroot
286 i386 add_key sys_add_key 286 i386 add_key sys_add_key
287 i386 request_key sys_request_key 287 i386 request_key sys_request_key
288 i386 keyctl sys_keyctl 288 i386 keyctl sys_keyctl compat_sys_keyctl
289 i386 ioprio_set sys_ioprio_set 289 i386 ioprio_set sys_ioprio_set
290 i386 ioprio_get sys_ioprio_get 290 i386 ioprio_get sys_ioprio_get
291 i386 inotify_init sys_inotify_init 291 i386 inotify_init sys_inotify_init
......
...@@ -22,6 +22,9 @@ static void BITSFUNC(go)(void *raw_addr, size_t raw_len, ...@@ -22,6 +22,9 @@ static void BITSFUNC(go)(void *raw_addr, size_t raw_len,
ELF(Phdr) *pt = (ELF(Phdr) *)(raw_addr + GET_LE(&hdr->e_phoff)); ELF(Phdr) *pt = (ELF(Phdr) *)(raw_addr + GET_LE(&hdr->e_phoff));
if (hdr->e_type != ET_DYN)
fail("input is not a shared object\n");
/* Walk the segment table. */ /* Walk the segment table. */
for (i = 0; i < GET_LE(&hdr->e_phnum); i++) { for (i = 0; i < GET_LE(&hdr->e_phnum); i++) {
if (GET_LE(&pt[i].p_type) == PT_LOAD) { if (GET_LE(&pt[i].p_type) == PT_LOAD) {
...@@ -49,6 +52,9 @@ static void BITSFUNC(go)(void *raw_addr, size_t raw_len, ...@@ -49,6 +52,9 @@ static void BITSFUNC(go)(void *raw_addr, size_t raw_len,
if (stripped_len < load_size) if (stripped_len < load_size)
fail("stripped input is too short\n"); fail("stripped input is too short\n");
if (!dyn)
fail("input has no PT_DYNAMIC section -- your toolchain is buggy\n");
/* Walk the dynamic table */ /* Walk the dynamic table */
for (i = 0; dyn + i < dyn_end && for (i = 0; dyn + i < dyn_end &&
GET_LE(&dyn[i].d_tag) != DT_NULL; i++) { GET_LE(&dyn[i].d_tag) != DT_NULL; i++) {
......
...@@ -60,7 +60,7 @@ static inline long syscall_get_error(struct task_struct *task, ...@@ -60,7 +60,7 @@ static inline long syscall_get_error(struct task_struct *task,
* TS_COMPAT is set for 32-bit syscall entries and then * TS_COMPAT is set for 32-bit syscall entries and then
* remains set until we return to user mode. * remains set until we return to user mode.
*/ */
if (task_thread_info(task)->status & TS_COMPAT) if (task_thread_info(task)->status & (TS_COMPAT|TS_I386_REGS_POKED))
/* /*
* Sign-extend the value so (int)-EFOO becomes (long)-EFOO * Sign-extend the value so (int)-EFOO becomes (long)-EFOO
* and will match correctly in comparisons. * and will match correctly in comparisons.
...@@ -239,9 +239,6 @@ static inline int syscall_get_arch(void) ...@@ -239,9 +239,6 @@ static inline int syscall_get_arch(void)
* TS_COMPAT is set for 32-bit syscall entry and then * TS_COMPAT is set for 32-bit syscall entry and then
* remains set until we return to user mode. * remains set until we return to user mode.
* *
* TIF_IA32 tasks should always have TS_COMPAT set at
* system call time.
*
* x32 tasks should be considered AUDIT_ARCH_X86_64. * x32 tasks should be considered AUDIT_ARCH_X86_64.
*/ */
if (task_thread_info(current)->status & TS_COMPAT) if (task_thread_info(current)->status & TS_COMPAT)
......
...@@ -219,6 +219,9 @@ static inline unsigned long current_stack_pointer(void) ...@@ -219,6 +219,9 @@ static inline unsigned long current_stack_pointer(void)
* have to worry about atomic accesses. * have to worry about atomic accesses.
*/ */
#define TS_COMPAT 0x0002 /* 32bit syscall active (64BIT)*/ #define TS_COMPAT 0x0002 /* 32bit syscall active (64BIT)*/
#ifdef CONFIG_COMPAT
#define TS_I386_REGS_POKED 0x0004 /* regs poked by 32-bit ptracer */
#endif
#ifndef __ASSEMBLY__ #ifndef __ASSEMBLY__
......
...@@ -923,15 +923,18 @@ static int putreg32(struct task_struct *child, unsigned regno, u32 value) ...@@ -923,15 +923,18 @@ static int putreg32(struct task_struct *child, unsigned regno, u32 value)
case offsetof(struct user32, regs.orig_eax): case offsetof(struct user32, regs.orig_eax):
/* /*
* A 32-bit debugger setting orig_eax means to restore * Warning: bizarre corner case fixup here. A 32-bit
* the state of the task restarting a 32-bit syscall. * debugger setting orig_eax to -1 wants to disable
* Make sure we interpret the -ERESTART* codes correctly * syscall restart. Make sure that the syscall
* in case the task is not actually still sitting at the * restart code sign-extends orig_ax. Also make sure
* exit from a 32-bit syscall with TS_COMPAT still set. * we interpret the -ERESTART* codes correctly if
* loaded into regs->ax in case the task is not
* actually still sitting at the exit from a 32-bit
* syscall with TS_COMPAT still set.
*/ */
regs->orig_ax = value; regs->orig_ax = value;
if (syscall_get_nr(child, regs) >= 0) if (syscall_get_nr(child, regs) >= 0)
task_thread_info(child)->status |= TS_COMPAT; task_thread_info(child)->status |= TS_I386_REGS_POKED;
break; break;
case offsetof(struct user32, regs.eflags): case offsetof(struct user32, regs.eflags):
......
...@@ -760,8 +760,30 @@ handle_signal(struct ksignal *ksig, struct pt_regs *regs) ...@@ -760,8 +760,30 @@ handle_signal(struct ksignal *ksig, struct pt_regs *regs)
static inline unsigned long get_nr_restart_syscall(const struct pt_regs *regs) static inline unsigned long get_nr_restart_syscall(const struct pt_regs *regs)
{ {
#ifdef CONFIG_X86_64 /*
if (in_ia32_syscall()) * This function is fundamentally broken as currently
* implemented.
*
* The idea is that we want to trigger a call to the
* restart_block() syscall and that we want in_ia32_syscall(),
* in_x32_syscall(), etc. to match whatever they were in the
* syscall being restarted. We assume that the syscall
* instruction at (regs->ip - 2) matches whatever syscall
* instruction we used to enter in the first place.
*
* The problem is that we can get here when ptrace pokes
* syscall-like values into regs even if we're not in a syscall
* at all.
*
* For now, we maintain historical behavior and guess based on
* stored state. We could do better by saving the actual
* syscall arch in restart_block or (with caveats on x32) by
* checking if regs->ip points to 'int $0x80'. The current
* behavior is incorrect if a tracer has a different bitness
* than the tracee.
*/
#ifdef CONFIG_IA32_EMULATION
if (current_thread_info()->status & (TS_COMPAT|TS_I386_REGS_POKED))
return __NR_ia32_restart_syscall; return __NR_ia32_restart_syscall;
#endif #endif
#ifdef CONFIG_X86_X32_ABI #ifdef CONFIG_X86_X32_ABI
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment