[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.LFD.1.00.0802201836480.7583@apollo.tec.linutronix.de>
Date: Wed, 20 Feb 2008 19:08:30 +0100 (CET)
From: Thomas Gleixner <tglx@...utronix.de>
To: Arne Georg Gleditsch <arne.gleditsch@...phinics.no>
cc: LKML <linux-kernel@...r.kernel.org>,
Roman Zippel <zippel@...ux-m68k.org>,
Ingo Molnar <mingo@...e.hu>, "H. Peter Anvin" <hpa@...or.com>
Subject: Re: arch/x86/kernel/vsyscall_64.c: overeager NOP of syscalls
Arne,
On Wed, 20 Feb 2008, Arne Georg Gleditsch wrote:
> I'm looking at 2.6.25-rc2. vsyscall_sysctl_change contains code to NOP
> out the actual system call instructions of the vsyscall page when
> vsyscall64 is enabled. This seems to interact badly with the fallback
> code in do_vgettimeofday which tries to call gettimeofday if the
> configured clock source does not support vread. (In effect,
> gettimeofday() becomes a nop and time() always returns 0. Not very
> useful.)
Indeed.
> Is there a good reason to keep this? Aren't the instructions in
> question avoided (or invoked) according to the vsyscall64 flag by the
> surrounding logic anyway?
The initial intent of this was to make it harder for malicious code to
attack via the vsysall area.
But you are right, the code is indeed fundamentally unsafe in various
aspects:
1) the patching code runs without synchronizing other CPUs
2) it inserts NOPs even if there is no clock source which provides
vread
3) when the clock source changes to one without vread we run in
exactly the same problem as in #2
The correct solution is randomizing that area, but that's definitely
not an ad hoc fix.
Thanks for pointing this out. I'm looking into fixing this ASAP.
tglx
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists