H. Peter Anvin wrote:
> Sticking kernel mode values in those fields would add no value, except
> as a poison (since %ss == KERNEL_DS and would cause a #GP(0) if it ever
> reached IRET.) If anything, those fields should be pushed as zero or
> some other poison bits. That would be slightly better
H. Peter Anvin wrote:
Sticking kernel mode values in those fields would add no value, except
as a poison (since %ss == KERNEL_DS and would cause a #GP(0) if it ever
reached IRET.) If anything, those fields should be pushed as zero or
some other poison bits. That would be slightly better than
H. Peter Anvin wrote:
Sticking kernel mode values in those fields would add no value, except
as a poison (since %ss == KERNEL_DS and would cause a #GP(0) if it ever
reached IRET.)
#SS(0), rather, of course.
-hpa
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel"
Philipp Kohlbecher wrote:
>>
>> In other words, your patch doesn't actually fix anything, it *masks*
>> potential bugs which would also be triggered by interrupts in kernel
>> mode. This is bad.
>
> I am not sure these potential bugs would also be triggered by interrupts
> in kernel mode. After
H. Peter Anvin wrote:
> Philipp Kohlbecher wrote:
>> (This may be superfluous, but I don't think it hurts and it might
>> prevent future errors.)
>
> ... and it may *cause* future errors by making it harder to find bugs, too.
>
> In other words, your patch doesn't actually fix anything, it
H. Peter Anvin wrote:
Philipp Kohlbecher wrote:
(This may be superfluous, but I don't think it hurts and it might
prevent future errors.)
... and it may *cause* future errors by making it harder to find bugs, too.
In other words, your patch doesn't actually fix anything, it *masks*
Philipp Kohlbecher wrote:
In other words, your patch doesn't actually fix anything, it *masks*
potential bugs which would also be triggered by interrupts in kernel
mode. This is bad.
I am not sure these potential bugs would also be triggered by interrupts
in kernel mode. After all,
H. Peter Anvin wrote:
Sticking kernel mode values in those fields would add no value, except
as a poison (since %ss == KERNEL_DS and would cause a #GP(0) if it ever
reached IRET.)
#SS(0), rather, of course.
-hpa
-
To unsubscribe from this list: send the line unsubscribe linux-kernel
Philipp Kohlbecher wrote:
>
> I don't know of any problems this causes. The kernel needs to be aware
> of the fact that the xss and esp fields of the pt_regs struct may
> contain wrong values anyway, as hardware interrupts arriving while the
> CPU is in kernel mode would also lead to this
H. Peter Anvin wrote:
> Philipp Kohlbecher wrote:
>> From: Philipp Kohlbecher <[EMAIL PROTECTED]>
>>
>> The kernel_execve function issues a software interrupt (int 0x80) to make
>> a system call to sys_execve. This function expects to find the stack segment
>> and stack pointer of the function
From: Philipp Kohlbecher <[EMAIL PROTECTED]>
The kernel_execve function issues a software interrupt (int 0x80) to make
a system call to sys_execve. This function expects to find the stack segment
and stack pointer of the function that issued the system call in the pt_regs
struct. The syscall
Philipp Kohlbecher wrote:
> From: Philipp Kohlbecher <[EMAIL PROTECTED]>
>
> The kernel_execve function issues a software interrupt (int 0x80) to make
> a system call to sys_execve. This function expects to find the stack segment
> and stack pointer of the function that issued the system call in
Philipp Kohlbecher wrote:
From: Philipp Kohlbecher [EMAIL PROTECTED]
The kernel_execve function issues a software interrupt (int 0x80) to make
a system call to sys_execve. This function expects to find the stack segment
and stack pointer of the function that issued the system call in the
From: Philipp Kohlbecher [EMAIL PROTECTED]
The kernel_execve function issues a software interrupt (int 0x80) to make
a system call to sys_execve. This function expects to find the stack segment
and stack pointer of the function that issued the system call in the pt_regs
struct. The syscall entry
H. Peter Anvin wrote:
Philipp Kohlbecher wrote:
From: Philipp Kohlbecher [EMAIL PROTECTED]
The kernel_execve function issues a software interrupt (int 0x80) to make
a system call to sys_execve. This function expects to find the stack segment
and stack pointer of the function that issued the
Philipp Kohlbecher wrote:
I don't know of any problems this causes. The kernel needs to be aware
of the fact that the xss and esp fields of the pt_regs struct may
contain wrong values anyway, as hardware interrupts arriving while the
CPU is in kernel mode would also lead to this condition.
16 matches
Mail list logo