[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <orzlt9rq0d.fsf@oliva.athome.lsd.ic.unicamp.br>
Date: Sat, 08 Mar 2008 16:10:10 -0300
From: Alexandre Oliva <aoliva@...hat.com>
To: Olivier Galibert <galibert@...ox.com>
Cc: David Daney <ddaney@...rex.com>, Michael Matz <matz@...e.de>,
Joe Buck <Joe.Buck@...opsys.COM>, Jan Hubicka <hubicka@....cz>,
Aurelien Jarno <aurelien@...el32.net>,
"H. Peter Anvin" <hpa@...or.com>, linux-kernel@...r.kernel.org,
gcc@....gnu.org
Subject: Re: RELEASE BLOCKER: Linux doesn't follow x86/x86-64 ABI wrt direction flag
On Mar 6, 2008, Olivier Galibert <galibert@...ox.com> wrote:
> It's extremely rare, no doubt about it. It's just that it *yells*
> security issue in the making. It's not a source bug, i.e. not easily
> reviewable. It's related to signal handlers which are the mark of a
> server and/or more failure-conscious program than usual. It's obscure
> (breaking a stringop, probably memset, or a not-paranoid-enough inline
> asm in a signal handler through a running memmove in the main program,
> oh my) but reasonably predictable for someone looking for an
> exploitable flaw.
> It's gcc's job to adapt to the realities of its running environment,
> not the other way around.
I smell a false dilemma here.
The problem doesn't have to be fixed/worked-around in either the
kernel or GCC. Per your argument, one might claim it's the userland
library's, or even the application's job to adapt to the realities of
its running environment.
GCC doesn't know what functions are signal handlers to insert cld in
them. How could it fix the problem, then? How could it possibly fix
custom assembly? How could it possibly fix object code containing
signal handlers, compiled by other compilers?
A userland system library, in theory, knows what functions are signal
handlers. It could wrap function pointers passed as arguments to
signal() such that they get cld. But then, applications that couldn't
care less about this would take a hit.
Applications, on the other hand, know when they might need cld. So,
per your argument, they should adapt to the realities of their running
environment, and add asm("cld"); to signal handlers that might need
it. At times, it may be hard for them to know whether they need it,
because too many factors may affect this need. E.g.:
- if the kernel does cld for them, then they don't need it. But
that's a run-time property, so it can't be tested at build time: the
code may run on a different kernel that doesn't do it.
- if none of the libraries they use mess with this flag, or none of
the libraries they use from signal handlers depend on this flag, then
they don't need it. But then, again, libraries may vary over time,
and you can't assume the (dynamic) library that's available at build
time will behave the same way at run time.
So an application would have to do it conservatively, adding cld to
their signal handlers just in case.
But then, it would be more convenient if the library did it.
And then, by the same argument, it would be more convenient if the
kernel did it.
(Compiler can't do it, since it doesn't know what's a signal handler
in the general case.)
And that's an argument to support the ABI specs as they are.
It would be just silly to try to work around this deviation from the
specs, at a performance penalty, in every affected compiler, library
*and* application. And anything less than fixing all of them would be
an incomplete work around.
Which is not an argument against providing work arounds where
possible, just an argument in favor of fixing the problem where it can
be fixed for good.
--
Alexandre Oliva http://www.lsd.ic.unicamp.br/~oliva/
FSF Latin America Board Member http://www.fsfla.org/
Red Hat Compiler Engineer aoliva@...dhat.com, gcc.gnu.org}
Free Software Evangelist oliva@...d.ic.unicamp.br, gnu.org}
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists