From: Seraphime Kirkovski <kirkseraph@gmail.com>
To: qemu-devel@nongnu.org
Cc: riku.voipio@iki.fi, Seraphime Kirkovski <kirkseraph@gmail.com>
Subject: [Qemu-devel] [PATCH] target-arm/abi32: check for segfault in do_kernel_trap
Date: Mon, 19 Dec 2016 21:50:54 +0100 [thread overview]
Message-ID: <20161219205054.4677-1-kirkseraph@gmail.com> (raw)
Currently, the cmpxchg implementation tests whether the destination address
is readable:
- if it is, we read the value and continue with the comparison
- if isn't, i.e. access to addr would segfault, we assume that src != dest
rather than queuing a SIGSEGV.
The same problem exists in the case where src == dest: the code doesn't
check whether put_user_u32 succeeds.
This fixes both problems by sending a SIGSEGV when the destination address
is inaccessible.
Signed-off-by: Seraphime Kirkovski <kirkseraph@gmail.com>
---
linux-user/main.c | 24 +++++++++++++++++++-----
1 file changed, 19 insertions(+), 5 deletions(-)
diff --git a/linux-user/main.c b/linux-user/main.c
index 75b199f..376b0c3 100644
--- a/linux-user/main.c
+++ b/linux-user/main.c
@@ -503,6 +503,7 @@ do_kernel_trap(CPUARMState *env)
uint32_t addr;
uint32_t cpsr;
uint32_t val;
+ target_siginfo_t info;
switch (env->regs[15]) {
case 0xffff0fa0: /* __kernel_memory_barrier */
@@ -516,13 +517,16 @@ do_kernel_trap(CPUARMState *env)
start_exclusive();
cpsr = cpsr_read(env);
addr = env->regs[2];
- /* FIXME: This should SEGV if the access fails. */
- if (get_user_u32(val, addr))
- val = ~env->regs[0];
+ if (get_user_u32(val, addr)) {
+ env->exception.vaddress = addr;
+ goto segv;
+ }
if (val == env->regs[0]) {
val = env->regs[1];
- /* FIXME: Check for segfaults. */
- put_user_u32(val, addr);
+ if (put_user_u32(val, addr)) {
+ env->exception.vaddress = addr;
+ goto segv;
+ }
env->regs[0] = 0;
cpsr |= CPSR_C;
} else {
@@ -551,6 +555,16 @@ do_kernel_trap(CPUARMState *env)
env->regs[15] = addr;
return 0;
+
+segv:
+ end_exclusive();
+ info.si_signo = TARGET_SIGSEGV;
+ info.si_errno = 0;
+ /* XXX: check env->error_code */
+ info.si_code = TARGET_SEGV_MAPERR;
+ info._sifields._sigfault._addr = env->exception.vaddress;
+ queue_signal(env, info.si_signo, QEMU_SI_FAULT, &info);
+ return 0;
}
void cpu_loop(CPUARMState *env)
--
2.10.2
next reply other threads:[~2016-12-19 20:51 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-12-19 20:50 Seraphime Kirkovski [this message]
-- strict thread matches above, loose matches on Subject: below --
2017-01-07 12:35 [Qemu-devel] [PATCH] target-arm/abi32: check for segfault in do_kernel_trap Seraphime Kirkovski
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20161219205054.4677-1-kirkseraph@gmail.com \
--to=kirkseraph@gmail.com \
--cc=qemu-devel@nongnu.org \
--cc=riku.voipio@iki.fi \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).