lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <1316086860.6545.66.camel@localhost.localdomain>
Date:	Thu, 15 Sep 2011 13:40:55 +0200
From:	Thomas Meyer <thomas@...3r.de>
To:	Linux Kernel Mailing List <linux-kernel@...r.kernel.org>
Cc:	viro@...iv.linux.org.uk, mingo@...hat.com
Subject: Re: a question regarding sys_poll() on x86_64 via tha ia32 layer

cc'ed some people on this assumed bug.

Am Dienstag, den 13.09.2011, 14:04 +0200 schrieb Thomas Meyer:
> Hello,
> 
> the ia32 poll system call is routed through the "standard" function
> sys_poll().
> 
> This function is defined as:
> 
> SYSCALL_DEFINE3(poll, struct pollfd __user *, ufds, unsigned int, nfds,
> 		long, timeout_msecs)
> 
> in fs/select.c
> 
> timeout_msecs is of type long which is AFAIK is 4 bytes on x86 and 8
> bytes on x86_64.
> 
> the test for sign (i.e. < 0) in the objdump is done against the 64 bit
> register (here %rbx):
> 
> ffffffff811313e0 <sys_poll>:
> ffffffff811313e0:       55                      push   %rbp
> ffffffff811313e1:       48 89 e5                mov    %rsp,%rbp
> ffffffff811313e4:       48 83 ec 30             sub    $0x30,%rsp
> ffffffff811313e8:       48 89 5d e8             mov    %rbx,-0x18(%rbp)
> ffffffff811313ec:       48 89 d3                mov    %rdx,%rbx
> ffffffff811313ef:       31 d2                   xor    %edx,%edx
> ffffffff811313f1:       48 85 db                test   %rbx,%rbx
> ffffffff811313f4:       4c 89 65 f0             mov    %r12,-0x10(%rbp)
> ffffffff811313f8:       4c 89 6d f8             mov    %r13,-0x8(%rbp)
> ffffffff811313fc:       41 89 f4                mov    %esi,%r12d
> ffffffff811313ff:       49 89 fd                mov    %rdi,%r13
> ffffffff81131402:       78 42                   js     ffffffff81131446 <sys_poll+0x66>
> 
> on an x86 kernel the test is done against %ebx
> 
> so when the system call is called with %rbx = 00000000ffffffff (i.e. -1
> from %ebx) on an x86_64 kernel via the ia32 layer the test for sign will
> fail and the timer will be set.
> 
> btw. <sys/poll.h> seems to define the function as
> 
> extern int poll (struct pollfd *__fds, nfds_t __nfds, int __timeout);
> 
> what am I overloking?
> 
> mfg
> thomas


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ