lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20140707124315.GN6758@twins.programming.kicks-ass.net>
Date: Mon, 7 Jul 2014 14:43:15 +0200
From: Peter Zijlstra <peterz@...radead.org>
To: Pawel Moll <pawel.moll@....com>
Cc: Paul Mackerras <paulus@...ba.org>, Ingo Molnar <mingo@...hat.com>,
Arnaldo Carvalho de Melo <acme@...nel.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
Drew Richardson <Drew.Richardson@....com>
Subject: Re: [PATCH v2] perf: Handle compat ioctl
On Tue, Jul 01, 2014 at 05:06:00PM +0100, Pawel Moll wrote:
> On Tue, 2014-06-17 at 13:43 +0100, Pawel Moll wrote:
> > When running a 32-bit userspace on a 64-bit kernel (eg. i386
> > application on x86_64 kernel or 32-bit arm userspace on arm64
> > kernel) some of the perf ioctls must be treated with special
> > care, as they have a pointer size encoded in the command.
> >
> > For example, PERF_EVENT_IOC_ID in 32-bit world will be encoded
> > as 0x80042407, but 64-bit kernel will expect 0x80082407. In
> > result the ioctl will fail returning -ENOTTY.
> >
> > This patch solves the problem by adding code fixing up the
> > size as compat_ioctl file operation.
> >
> > Reported-by: Drew Richardson <drew.richardson@....com>
> > Signed-off-by: Pawel Moll <pawel.moll@....com>
>
> This just is a polite and friendly nag...
>
> Any, strong or not, opinions on the matter?
Sorry, travel, cracks, falling, etc..
Queued it, we'll see what happens with this one ;-)
Content of type "application/pgp-signature" skipped
Powered by blists - more mailing lists