From: Eric Paris <eparis@redhat.com>
To: Andy Lutomirski <luto@amacapital.net>
Cc: rgb@redhat.com, Thomas Gleixner <tglx@linutronix.de>,
Ingo Molnar <mingo@redhat.com>, "H. Peter Anvin" <hpa@zytor.com>,
x86@kernel.org, linux-kernel@vger.kernel.org,
linux-audit@redhat.com
Subject: Re: [PATCH] i386/audit: stop scribbling on the stack frame
Date: Thu, 23 Oct 2014 15:15:32 -0400 [thread overview]
Message-ID: <1414091732.2363.11.camel@redhat.com> (raw)
In-Reply-To: <54494B74.2080504@amacapital.net>
On Thu, 2014-10-23 at 11:39 -0700, Andy Lutomirski wrote:
> On 10/22/2014 09:04 PM, Eric Paris wrote:
> > git commit b4f0d3755c5e9cc86292d5fd78261903b4f23d4a was very very dumb.
> > It was writing over %esp/pt_regs semi-randomly on i686 with the expected
> > "system can't boot" results. As noted in:
> >
> > https://bugs.freedesktop.org/show_bug.cgi?id=85277
> >
> > This patch stops fscking with pt_regs. Instead it sets up the registers
> > for the call to __audit_syscall_entry in the most obvious conceivable
> > way. It then does just a tiny tiny touch of magic. We need to get what
> > started in PT_EDX into 0(%esp) and PT_ESI into 4(%esp). This is as easy
> > as a pair of pushes.
> >
> > After the call to __audit_syscall_entry all we need to do is get that
> > now useless junk off the stack (pair of pops) and reload %eax with the
> > original syscall so other stuff can keep going about it's business.
> >
> > Signed-off-by: Eric Paris <eparis@redhat.com>
> > Cc: Thomas Gleixner <tglx@linutronix.de>
> > Cc: Ingo Molnar <mingo@redhat.com>
> > Cc: "H. Peter Anvin" <hpa@zytor.com>
> > Cc: x86@kernel.org
> > Cc: linux-kernel@vger.kernel.org
> > Cc: linux-audit@redhat.com
> > ---
> > arch/x86/kernel/entry_32.S | 15 +++++++--------
> > 1 file changed, 7 insertions(+), 8 deletions(-)
> >
> > diff --git a/arch/x86/kernel/entry_32.S b/arch/x86/kernel/entry_32.S
> > index f9e3fab..fb01d22 100644
> > --- a/arch/x86/kernel/entry_32.S
> > +++ b/arch/x86/kernel/entry_32.S
> > @@ -447,15 +447,14 @@ sysenter_exit:
> > sysenter_audit:
> > testl $(_TIF_WORK_SYSCALL_ENTRY & ~_TIF_SYSCALL_AUDIT),TI_flags(%ebp)
> > jnz syscall_trace_entry
> > - addl $4,%esp
> > - CFI_ADJUST_CFA_OFFSET -4
> > - movl %esi,4(%esp) /* 5th arg: 4th syscall arg */
> > - movl %edx,(%esp) /* 4th arg: 3rd syscall arg */
> > - /* %ecx already in %ecx 3rd arg: 2nd syscall arg */
> > - movl %ebx,%edx /* 2nd arg: 1st syscall arg */
> > - /* %eax already in %eax 1st arg: syscall number */
> > + /* movl PT_EAX(%esp), %eax already set, syscall number: 1st arg to audit */
> > + movl PT_EBX(%esp), %edx /* ebx/a0: 2nd arg to audit */
> > + /* movl PT_ECX(%esp), %ecx already set, a1: 3nd arg to audit */
> > + pushl_cfi PT_ESI(%esp) /* a3: 5th arg */
> > + pushl_cfi PT_EDX+4(%esp) /* a2: 4th arg */
> > call __audit_syscall_entry
> > - pushl_cfi %ebx
> > + popl_cfi %ecx /* get that remapped edx off the stack */
> > + popl_cfi %ecx /* get that remapped esi off the stack */
> > movl PT_EAX(%esp),%eax /* reload syscall number */
> > jmp sysenter_do_call
> >
> >
>
> This looks reasonably likely to be correct, but this code is complicated
> and now ever slower.
I guess I could just use push/pop and do the CFI_ADJUST_CFA_OFFSET by
hand. But I figured this was reasonable enough...
> How hard would it be to just delete it and replace it with a
> straightforward two-phase trace invocation a la x86_64?
For me? Hard.
next prev parent reply other threads:[~2014-10-23 19:15 UTC|newest]
Thread overview: 26+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-10-23 4:04 [PATCH] i386/audit: stop scribbling on the stack frame Eric Paris
2014-10-23 18:39 ` Andy Lutomirski
2014-10-23 19:13 ` H. Peter Anvin
2014-10-23 19:15 ` Eric Paris [this message]
2014-10-23 19:20 ` Andy Lutomirski
2014-10-23 19:30 ` Eric Paris
2014-10-23 19:30 ` Eric Paris
2014-10-23 19:38 ` Eric Paris
2014-10-24 20:19 ` H. Peter Anvin
2014-10-25 0:00 ` Andy Lutomirski
2014-10-27 2:06 ` Richard Guy Briggs
2014-10-23 20:30 ` Andy Lutomirski
2014-10-24 2:55 ` H. Peter Anvin
2014-10-27 2:01 ` Richard Guy Briggs
2014-10-24 20:31 ` [tip:x86/urgent] " tip-bot for Eric Paris
2014-10-25 8:36 ` Thomas Gleixner
2014-10-27 2:34 ` [PATCH] " Richard Guy Briggs
2014-10-27 13:55 ` Eric Paris
2014-10-27 17:02 ` H. Peter Anvin
2014-10-27 17:29 ` Eric Paris
2014-10-28 6:30 ` Ingo Molnar
2014-10-27 17:38 ` Richard Guy Briggs
2014-10-27 21:18 ` Thomas Gleixner
2014-10-27 21:22 ` Richard Guy Briggs
2014-10-27 20:52 ` Thomas Gleixner
2014-10-27 21:13 ` Eric Paris
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1414091732.2363.11.camel@redhat.com \
--to=eparis@redhat.com \
--cc=hpa@zytor.com \
--cc=linux-audit@redhat.com \
--cc=linux-kernel@vger.kernel.org \
--cc=luto@amacapital.net \
--cc=mingo@redhat.com \
--cc=rgb@redhat.com \
--cc=tglx@linutronix.de \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.