* Q: a bogus set_fs(USER_DS) in setup_frame/setup_rt_frame ?
@ 2007-07-17 15:46 Oleg Nesterov
2007-07-17 16:04 ` [patch] i386: remove unnecessary code Ingo Molnar
2007-07-17 16:05 ` Q: a bogus set_fs(USER_DS) in setup_frame/setup_rt_frame ? Linus Torvalds
0 siblings, 2 replies; 5+ messages in thread
From: Oleg Nesterov @ 2007-07-17 15:46 UTC (permalink / raw)
To: Chuck Ebbert, Ingo Molnar, Linus Torvalds, Roland McGrath; +Cc: linux-kernel
I am really puzzled by set_fs(USER_DS) in setup_frame/setup_rt_frame.
How is it possible that current->addr_limit != USER_DS ? If this _is_
possible, how can can we trust the result of access_ok() above?
Thanks in advance,
Oleg.
^ permalink raw reply [flat|nested] 5+ messages in thread
* [patch] i386: remove unnecessary code
2007-07-17 15:46 Q: a bogus set_fs(USER_DS) in setup_frame/setup_rt_frame ? Oleg Nesterov
@ 2007-07-17 16:04 ` Ingo Molnar
2007-07-17 16:05 ` Q: a bogus set_fs(USER_DS) in setup_frame/setup_rt_frame ? Linus Torvalds
1 sibling, 0 replies; 5+ messages in thread
From: Ingo Molnar @ 2007-07-17 16:04 UTC (permalink / raw)
To: Oleg Nesterov; +Cc: Chuck Ebbert, Linus Torvalds, Roland McGrath, linux-kernel
* Oleg Nesterov <oleg@tv-sign.ru> wrote:
> I am really puzzled by set_fs(USER_DS) in setup_frame/setup_rt_frame.
>
> How is it possible that current->addr_limit != USER_DS ? If this _is_
> possible, how can can we trust the result of access_ok() above?
hm, this is _ancient_ code (possibly dating back to the pharaohs). If we
are in KERNEL_DS then we call do_signal() then we are most likely a
kernel thread and regs->esp points to the kernel stack ... the result of
which would be a quite spectacular crash anyway.
Patch below.
Ingo
----------------------------->
Subject: [patch] i386: remove unnecessary code
From: Ingo Molnar <mingo@elte.hu>
Oleg Nesterov pointed out that the set_fs() calls in setup_frame()
and setup_rt_frame() were superfluous.
Signed-off-by: Ingo Molnar <mingo@elte.hu>
---
arch/i386/kernel/signal.c | 2 --
1 file changed, 2 deletions(-)
Index: linux/arch/i386/kernel/signal.c
===================================================================
--- linux.orig/arch/i386/kernel/signal.c
+++ linux/arch/i386/kernel/signal.c
@@ -380,7 +380,6 @@ static int setup_frame(int sig, struct k
regs->edx = (unsigned long) 0;
regs->ecx = (unsigned long) 0;
- set_fs(USER_DS);
regs->xds = __USER_DS;
regs->xes = __USER_DS;
regs->xss = __USER_DS;
@@ -474,7 +473,6 @@ static int setup_rt_frame(int sig, struc
regs->edx = (unsigned long) &frame->info;
regs->ecx = (unsigned long) &frame->uc;
- set_fs(USER_DS);
regs->xds = __USER_DS;
regs->xes = __USER_DS;
regs->xss = __USER_DS;
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Q: a bogus set_fs(USER_DS) in setup_frame/setup_rt_frame ?
2007-07-17 15:46 Q: a bogus set_fs(USER_DS) in setup_frame/setup_rt_frame ? Oleg Nesterov
2007-07-17 16:04 ` [patch] i386: remove unnecessary code Ingo Molnar
@ 2007-07-17 16:05 ` Linus Torvalds
2007-07-17 17:15 ` Oleg Nesterov
1 sibling, 1 reply; 5+ messages in thread
From: Linus Torvalds @ 2007-07-17 16:05 UTC (permalink / raw)
To: Oleg Nesterov; +Cc: Chuck Ebbert, Ingo Molnar, Roland McGrath, linux-kernel
On Tue, 17 Jul 2007, Oleg Nesterov wrote:
>
> I am really puzzled by set_fs(USER_DS) in setup_frame/setup_rt_frame.
>
> How is it possible that current->addr_limit != USER_DS ? If this _is_
> possible, how can can we trust the result of access_ok() above?
Heh. I think it's entirely historical.
Please realize that the whole reason that function is called "set_fs()" is
that it literally used to set the %fs segment register, not
"->addr_limit".
So I think the "set_fs(USER_DS)" is there _only_ to match the other
regs->xds = __USER_DS;
regs->xes = __USER_DS;
regs->xss = __USER_DS;
regs->xcs = __USER_CS;
things, and never mattered. And now it matters even less, and has been
copied to all other architectures where it is just totally insane.
Linus
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Q: a bogus set_fs(USER_DS) in setup_frame/setup_rt_frame ?
2007-07-17 16:05 ` Q: a bogus set_fs(USER_DS) in setup_frame/setup_rt_frame ? Linus Torvalds
@ 2007-07-17 17:15 ` Oleg Nesterov
2007-07-17 19:36 ` David Miller
0 siblings, 1 reply; 5+ messages in thread
From: Oleg Nesterov @ 2007-07-17 17:15 UTC (permalink / raw)
To: Linus Torvalds
Cc: Chuck Ebbert, Ingo Molnar, Roland McGrath, linux-kernel, davem
On 07/17, Linus Torvalds wrote:
>
> On Tue, 17 Jul 2007, Oleg Nesterov wrote:
> >
> > I am really puzzled by set_fs(USER_DS) in setup_frame/setup_rt_frame.
> >
> > How is it possible that current->addr_limit != USER_DS ? If this _is_
> > possible, how can can we trust the result of access_ok() above?
>
> Heh. I think it's entirely historical.
>
> Please realize that the whole reason that function is called "set_fs()" is
> that it literally used to set the %fs segment register, not
> "->addr_limit".
>
> So I think the "set_fs(USER_DS)" is there _only_ to match the other
>
> regs->xds = __USER_DS;
> regs->xes = __USER_DS;
> regs->xss = __USER_DS;
> regs->xcs = __USER_CS;
>
> things, and never mattered.
Thanks!
> And now it matters even less, and has been
> copied to all other architectures where it is just totally insane.
Yes.
Also, sparc does something strange with do_sigaltstack(). It first copies
stack_t to the local variable, then sets KERNEL_DS to access it from
do_sigaltstack().
IOW, what's wrong with the patch below? Why should we ignore errors other
than -EFAULT?
Oleg.
--- arch/sparc64/kernel/signal.c~ 2007-05-21 13:57:49.000000000 +0400
+++ arch/sparc64/kernel/signal.c 2007-07-17 21:04:32.000000000 +0400
@@ -291,7 +291,6 @@ void do_rt_sigreturn(struct pt_regs *reg
__siginfo_fpu_t __user *fpu_save;
mm_segment_t old_fs;
sigset_t set;
- stack_t st;
int err;
/* Always make any pending restarted system calls return -EINTR */
@@ -327,20 +326,13 @@ void do_rt_sigreturn(struct pt_regs *reg
err |= restore_fpu_state(regs, &sf->fpu_state);
err |= __copy_from_user(&set, &sf->mask, sizeof(sigset_t));
- err |= __copy_from_user(&st, &sf->stack, sizeof(stack_t));
-
+ err |= do_sigaltstack(&st->stack, NULL, (unsigned long)sf);
+
if (err)
goto segv;
-
+
regs->tpc = tpc;
regs->tnpc = tnpc;
-
- /* It is more difficult to avoid calling this function than to
- call it and ignore errors. */
- old_fs = get_fs();
- set_fs(KERNEL_DS);
- do_sigaltstack((const stack_t __user *) &st, NULL, (unsigned long)sf);
- set_fs(old_fs);
sigdelsetmask(&set, ~_BLOCKABLE);
spin_lock_irq(¤t->sighand->siglock);
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: Q: a bogus set_fs(USER_DS) in setup_frame/setup_rt_frame ?
2007-07-17 17:15 ` Oleg Nesterov
@ 2007-07-17 19:36 ` David Miller
0 siblings, 0 replies; 5+ messages in thread
From: David Miller @ 2007-07-17 19:36 UTC (permalink / raw)
To: oleg; +Cc: torvalds, 76306.1226, mingo, roland, linux-kernel
From: Oleg Nesterov <oleg@tv-sign.ru>
Date: Tue, 17 Jul 2007 21:15:35 +0400
> Also, sparc does something strange with do_sigaltstack(). It first copies
> stack_t to the local variable, then sets KERNEL_DS to access it from
> do_sigaltstack().
>
> IOW, what's wrong with the patch below? Why should we ignore errors other
> than -EFAULT?
Nothing wrong with it.
The code is this way because it was simply copied over from
the signal32.c implementation which has to translate around
the 32-bit types into the 64-bit ones the kernel wants.
But since the 64-bit side doesn't need the translations,
it doesn't need to do the funny do_sigaltstack() call sequence
either.
I'll apply your patch, thanks!
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2007-07-17 19:36 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2007-07-17 15:46 Q: a bogus set_fs(USER_DS) in setup_frame/setup_rt_frame ? Oleg Nesterov
2007-07-17 16:04 ` [patch] i386: remove unnecessary code Ingo Molnar
2007-07-17 16:05 ` Q: a bogus set_fs(USER_DS) in setup_frame/setup_rt_frame ? Linus Torvalds
2007-07-17 17:15 ` Oleg Nesterov
2007-07-17 19:36 ` David Miller
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox