1. 13 4月, 2015 1 次提交
  2. 13 2月, 2015 1 次提交
    • A
      all arches, signal: move restart_block to struct task_struct · f56141e3
      Andy Lutomirski 提交于
      If an attacker can cause a controlled kernel stack overflow, overwriting
      the restart block is a very juicy exploit target.  This is because the
      restart_block is held in the same memory allocation as the kernel stack.
      
      Moving the restart block to struct task_struct prevents this exploit by
      making the restart_block harder to locate.
      
      Note that there are other fields in thread_info that are also easy
      targets, at least on some architectures.
      
      It's also a decent simplification, since the restart code is more or less
      identical on all architectures.
      
      [james.hogan@imgtec.com: metag: align thread_info::supervisor_stack]
      Signed-off-by: NAndy Lutomirski <luto@amacapital.net>
      Cc: Thomas Gleixner <tglx@linutronix.de>
      Cc: Al Viro <viro@zeniv.linux.org.uk>
      Cc: "H. Peter Anvin" <hpa@zytor.com>
      Cc: Ingo Molnar <mingo@kernel.org>
      Cc: Kees Cook <keescook@chromium.org>
      Cc: David Miller <davem@davemloft.net>
      Acked-by: NRichard Weinberger <richard@nod.at>
      Cc: Richard Henderson <rth@twiddle.net>
      Cc: Ivan Kokshaysky <ink@jurassic.park.msu.ru>
      Cc: Matt Turner <mattst88@gmail.com>
      Cc: Vineet Gupta <vgupta@synopsys.com>
      Cc: Russell King <rmk@arm.linux.org.uk>
      Cc: Catalin Marinas <catalin.marinas@arm.com>
      Cc: Will Deacon <will.deacon@arm.com>
      Cc: Haavard Skinnemoen <hskinnemoen@gmail.com>
      Cc: Hans-Christian Egtvedt <egtvedt@samfundet.no>
      Cc: Steven Miao <realmz6@gmail.com>
      Cc: Mark Salter <msalter@redhat.com>
      Cc: Aurelien Jacquiot <a-jacquiot@ti.com>
      Cc: Mikael Starvik <starvik@axis.com>
      Cc: Jesper Nilsson <jesper.nilsson@axis.com>
      Cc: David Howells <dhowells@redhat.com>
      Cc: Richard Kuo <rkuo@codeaurora.org>
      Cc: "Luck, Tony" <tony.luck@intel.com>
      Cc: Geert Uytterhoeven <geert@linux-m68k.org>
      Cc: Michal Simek <monstr@monstr.eu>
      Cc: Ralf Baechle <ralf@linux-mips.org>
      Cc: Jonas Bonn <jonas@southpole.se>
      Cc: "James E.J. Bottomley" <jejb@parisc-linux.org>
      Cc: Helge Deller <deller@gmx.de>
      Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
      Cc: Paul Mackerras <paulus@samba.org>
      Acked-by: Michael Ellerman <mpe@ellerman.id.au> (powerpc)
      Tested-by: Michael Ellerman <mpe@ellerman.id.au> (powerpc)
      Cc: Martin Schwidefsky <schwidefsky@de.ibm.com>
      Cc: Heiko Carstens <heiko.carstens@de.ibm.com>
      Cc: Chen Liqin <liqin.linux@gmail.com>
      Cc: Lennox Wu <lennox.wu@gmail.com>
      Cc: Chris Metcalf <cmetcalf@ezchip.com>
      Cc: Guan Xuetao <gxt@mprc.pku.edu.cn>
      Cc: Chris Zankel <chris@zankel.net>
      Cc: Max Filippov <jcmvbkbc@gmail.com>
      Cc: Oleg Nesterov <oleg@redhat.com>
      Cc: Guenter Roeck <linux@roeck-us.net>
      Signed-off-by: NJames Hogan <james.hogan@imgtec.com>
      Signed-off-by: NAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
      f56141e3
  3. 06 8月, 2014 1 次提交
  4. 16 10月, 2013 1 次提交
  5. 24 2月, 2013 1 次提交
    • C
      xtensa: add support for TLS · c50842df
      Chris Zankel 提交于
      The Xtensa architecture provides a global register called THREADPTR
      for the purpose of Thread Local Storage (TLS) support. This allows us
      to use a fairly simple implementation, keeping the thread pointer in
      the regset and simply saving and restoring it upon entering/exiting
      the from user space.
      Signed-off-by: NChris Zankel <chris@zankel.net>
      c50842df
  6. 04 2月, 2013 1 次提交
  7. 19 12月, 2012 1 次提交
  8. 01 10月, 2012 2 次提交
  9. 05 6月, 2012 1 次提交
  10. 02 6月, 2012 6 次提交
  11. 24 5月, 2012 1 次提交
  12. 22 5月, 2012 3 次提交
  13. 24 4月, 2012 1 次提交
  14. 22 3月, 2012 4 次提交
  15. 14 2月, 2008 3 次提交
    • C
      [XTENSA] Add support for the sa_restorer function · 44c64e6b
      Chris Zankel 提交于
      Supporting the sa_restorer function allows for better security
      since the sigreturn system call doesn't need to be placed on
      the stack, so the stack doesn't need to be executable. This
      requires support from the c-library as it has to provide the
      restorer function.
      Signed-off-by: NChris Zankel <chris@zankel.net>
      44c64e6b
    • C
      [XTENSA] Add support for configurable registers and coprocessors · c658eac6
      Chris Zankel 提交于
      The Xtensa architecture allows to define custom instructions and
      registers. Registers that are bound to a coprocessor are only
      accessible if the corresponding enable bit is set, which allows
      to implement a 'lazy' context switch mechanism. Other registers
      needs to be saved and restore at the time of the context switch
      or during interrupt handling.
      
      This patch adds support for these additional states:
      
      - save and restore registers that are used by the compiler upon
        interrupt entry and exit.
      - context switch additional registers unbound to any coprocessor
      - 'lazy' context switch of registers bound to a coprocessor
      - ptrace interface to provide access to additional registers
      - update configuration files in include/asm-xtensa/variant-fsf
      Signed-off-by: NChris Zankel <chris@zankel.net>
      c658eac6
    • C
      [XTENSA] Remove oldmask from sigcontext and fix register flush · 3befce8f
      Chris Zankel 提交于
      Remove oldmask from the sigcontext structure. Also update wmask
      and windowstart when we flush the AR registers to stack.
      Signed-off-by: NChris Zankel <chris@zankel.net>
      3befce8f
  16. 01 6月, 2007 1 次提交
    • C
      [XTENSA] Remove non-rt signal handling · 29c4dfd9
      Chris Zankel 提交于
      The non-rt signal handling was never really used, so we don't break
      anything. This patch also cleans up the signal stack-frame to make
      it independent from the processor configuration. It also improves
      the method used for controlling single-stepping. We now save and
      restore the 'icountlevel' register that controls single stepping
      and set or clear the saved state to enable or disable it.
      Signed-off-by: NChris Zankel <chris@zankel.net>
      29c4dfd9
  17. 09 5月, 2007 1 次提交
  18. 11 12月, 2006 2 次提交
  19. 23 6月, 2006 2 次提交
    • L
      [PATCH] fix incorrect SA_ONSTACK behaviour for 64-bit processes · d09042da
      Laurent MEYER 提交于
      - When setting a sighandler using sigaction() call, if the flag
        SA_ONSTACK is set and no alternate stack is provided via sigaltstack(),
        the kernel still try to install the alternate stack.  This behavior is
        the opposite of the one which is documented in Single Unix Specifications
        V3.
      
      - Also when setting an alternate stack using sigaltstack() with the flag
        SS_DISABLE, the kernel try to install the alternate stack on signal
        delivery.
      
      These two use cases makes the process crash at signal delivery.
      Signed-off-by: NLaurent Meyer <meyerlau@fr.ibm.com>
      Cc: Richard Henderson <rth@twiddle.net>
      Cc: Ivan Kokshaysky <ink@jurassic.park.msu.ru>
      Cc: David Howells <dhowells@redhat.com>
      Cc: Yoshinori Sato <ysato@users.sourceforge.jp>
      Cc: Geert Uytterhoeven <geert@linux-m68k.org>
      Cc: Roman Zippel <zippel@linux-m68k.org>
      Cc: Kyle McMartin <kyle@mcmartin.ca>
      Cc: Paul Mundt <lethal@linux-sh.org>
      Cc: Kazumoto Kojima <kkojima@rr.iij4u.or.jp>
      Cc: Chris Zankel <chris@zankel.net>
      Signed-off-by: NAndrew Morton <akpm@osdl.org>
      Signed-off-by: NLinus Torvalds <torvalds@osdl.org>
      d09042da
    • J
      [PATCH] xtensa: remove verify_area macros · b9e122c8
      Jesper Juhl 提交于
      verify_area() is still alive on xtensa in 2.6.17-rc3-git13 It would be nice
      to finally be rid of that function across the board.
      Signed-off-by: NChris Zankel <chris@zankel.net>
      Signed-off-by: NAndrew Morton <akpm@osdl.org>
      Signed-off-by: NLinus Torvalds <torvalds@osdl.org>
      b9e122c8
  20. 23 9月, 2005 1 次提交
  21. 30 8月, 2005 1 次提交
    • S
      [PATCH] convert signal handling of NODEFER to act like other Unix boxes. · 69be8f18
      Steven Rostedt 提交于
      It has been reported that the way Linux handles NODEFER for signals is
      not consistent with the way other Unix boxes handle it.  I've written a
      program to test the behavior of how this flag affects signals and had
      several reports from people who ran this on various Unix boxes,
      confirming that Linux seems to be unique on the way this is handled.
      
      The way NODEFER affects signals on other Unix boxes is as follows:
      
      1) If NODEFER is set, other signals in sa_mask are still blocked.
      
      2) If NODEFER is set and the signal is in sa_mask, then the signal is
      still blocked. (Note: this is the behavior of all tested but Linux _and_
      NetBSD 2.0 *).
      
      The way NODEFER affects signals on Linux:
      
      1) If NODEFER is set, other signals are _not_ blocked regardless of
      sa_mask (Even NetBSD doesn't do this).
      
      2) If NODEFER is set and the signal is in sa_mask, then the signal being
      handled is not blocked.
      
      The patch converts signal handling in all current Linux architectures to
      the way most Unix boxes work.
      
      Unix boxes that were tested:  DU4, AIX 5.2, Irix 6.5, NetBSD 2.0, SFU
      3.5 on WinXP, AIX 5.3, Mac OSX, and of course Linux 2.6.13-rcX.
      
      * NetBSD was the only other Unix to behave like Linux on point #2. The
      main concern was brought up by point #1 which even NetBSD isn't like
      Linux.  So with this patch, we leave NetBSD as the lonely one that
      behaves differently here with #2.
      Signed-off-by: NLinus Torvalds <torvalds@osdl.org>
      69be8f18
  22. 24 6月, 2005 1 次提交
新手
引导
客服 返回
顶部