[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20091019073358.GE17960@elte.hu>
Date: Mon, 19 Oct 2009 09:33:58 +0200
From: Ingo Molnar <mingo@...e.hu>
To: Sebastian Andrzej Siewior <sebastian@...akpoint.cc>,
Roland McGrath <roland@...hat.com>,
Oleg Nesterov <oleg@...hat.com>,
"H. Peter Anvin" <hpa@...or.com>,
Thomas Gleixner <tglx@...utronix.de>
Cc: linux-kernel@...r.kernel.org,
Haavard Skinnemoen <hskinnemoen@...el.com>
Subject: Re: [PATCH] consider stack access while checking for alternate
signal stack
(Cc:-ed more folks, quoted mail and patch can be found below.)
* Sebastian Andrzej Siewior <sebastian@...akpoint.cc> wrote:
> The stack pointer can be either first incremented/decremented and then
> used (lets call it PRE) or incremented/decremented after its use (lets
> call it POST). The difference is whether the stack pointer points to the
> last variable on the stack or to the first free slot. This tiny little
> detail caused Debian bug #544905 on AMD64. gcc-4.3 with -O2 optimized
> the code in a way where the signal stack pointer had the same value as
> the real stack pointer. The stack pointer is PRE_DEC and therefore we
> are not on the alternative stack yet.
> This patch should handle all corned cases now. AVR is the only
> architecture which has a POST operation defined and a Linux port
> avaiable. All other architectures are POST_DEC except PA-RISC which is
> POST_INC
>
> Signed-off-by: Sebastian Andrzej Siewior <sebastian@...akpoint.cc>
> ---
> I have also a reduced testcase at [0] which is AMD64 only. Most other
> architectures I've looked at store some register(s) between the stack
> pointer and the first/last variable so I could only trigger it on AMD64.
>
> Haavard: The AVR32 assumption is pure on gcc's STACK_PUSH_CODE which is
> POST_DEC. Could you please ack/nak it?
>
> [0] http://download.breakpoint.cc/tc-sig-stack.c
>
> arch/avr32/Kconfig | 3 +++
> include/linux/sched.h | 24 ++++++++++++++++++++++--
> 2 files changed, 25 insertions(+), 2 deletions(-)
>
> diff --git a/arch/avr32/Kconfig b/arch/avr32/Kconfig
> index 35e3bd9..520c489 100644
> --- a/arch/avr32/Kconfig
> +++ b/arch/avr32/Kconfig
> @@ -70,6 +70,9 @@ config GENERIC_BUG
> def_bool y
> depends on BUG
>
> +config STACK_STORE_POST
> + def_bool y
> +
> source "init/Kconfig"
>
> source "kernel/Kconfig.freezer"
> diff --git a/include/linux/sched.h b/include/linux/sched.h
> index 75e6e60..23e6eb6 100644
> --- a/include/linux/sched.h
> +++ b/include/linux/sched.h
> @@ -2086,11 +2086,31 @@ static inline int is_si_special(const struct siginfo *info)
> return info <= SEND_SIG_FORCED;
> }
>
> -/* True if we are on the alternate signal stack. */
> -
> +/*
> + * True if we are on the alternate signal stack, based on the follwoing
> + * example: The alternative stack handler starts at 0x10 and its size is 0x20
> + * bytes. The numbers behind PRE and POST are aimed as the result.
> + * PRE means the stack is first decremented and than the content of the variale
> + * is stored. This means, the stack pointer points in the PRE case to the last
> + * variable on the stack. In the POST case it points to the first free slot.
> + *
> + * 0 5 10 15 30 40 80
> + * +-----------+-----------+----------+
> + * | | SIG STACK | |
> + * +-----------+-----------+----------+
> + * POST 0 1 1 0 0
> + * PRE 0 0 1 1 0
> + */
> static inline int on_sig_stack(unsigned long sp)
> {
> +#if defined(CONFIG_STACK_STORE_POST)
> return (sp - current->sas_ss_sp < current->sas_ss_size);
> +
> +#else
> + if (!(sp - current->sas_ss_sp))
> + return 0;
> + return (sp - current->sas_ss_sp <= current->sas_ss_size);
> +#endif
> }
>
> static inline int sas_ss_flags(unsigned long sp)
> --
> 1.6.4.GIT
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists