Source-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[src/netbsd-6]: src/sys/compat/linux/arch/amd64 Pull up following revision(s)...



details:   https://anonhg.NetBSD.org/src/rev/1f9fa1c4849c
branches:  netbsd-6
changeset: 777134:1f9fa1c4849c
user:      snj <snj%NetBSD.org@localhost>
date:      Tue Feb 14 16:59:31 2017 +0000

description:
Pull up following revision(s) (requested by maxv in ticket #1433):
        sys/compat/linux/arch/amd64/linux_machdep.c: 1.50, 1.51
Don't let userland choose %rip. This is the Intel Sysret vulnerability
again.
--
Make sure %rip is in userland. This is harmless, since the return to
userland is made with iret instead of sysret in this path. While here, use
size_t.

diffstat:

 sys/compat/linux/arch/amd64/linux_machdep.c |  15 +++++++++++----
 1 files changed, 11 insertions(+), 4 deletions(-)

diffs (50 lines):

diff -r e0f3fcd665a4 -r 1f9fa1c4849c sys/compat/linux/arch/amd64/linux_machdep.c
--- a/sys/compat/linux/arch/amd64/linux_machdep.c       Sun Feb 05 07:10:10 2017 +0000
+++ b/sys/compat/linux/arch/amd64/linux_machdep.c       Tue Feb 14 16:59:31 2017 +0000
@@ -1,4 +1,4 @@
-/*     $NetBSD: linux_machdep.c,v 1.39 2011/11/18 04:07:43 christos Exp $ */
+/*     $NetBSD: linux_machdep.c,v 1.39.6.1 2017/02/14 16:59:31 snj Exp $ */
 
 /*-
  * Copyright (c) 2005 Emmanuel Dreyfus, all rights reserved.
@@ -33,7 +33,7 @@
 
 #include <sys/cdefs.h>
 
-__KERNEL_RCSID(0, "$NetBSD: linux_machdep.c,v 1.39 2011/11/18 04:07:43 christos Exp $");
+__KERNEL_RCSID(0, "$NetBSD: linux_machdep.c,v 1.39.6.1 2017/02/14 16:59:31 snj Exp $");
 
 #include <sys/param.h>
 #include <sys/types.h>
@@ -254,7 +254,12 @@
        if (error != 0) {
                sigexit(l, SIGILL);
                return;
-       }       
+       }
+
+       if ((vaddr_t)catcher >= VM_MAXUSER_ADDRESS) {
+               sigexit(l, SIGILL);
+               return;
+       }
 
        linux_buildcontext(l, catcher, sp);
        tf->tf_rdi = sigframe.info.lsi_signo;
@@ -485,7 +490,7 @@
 {
        struct trapframe *tf = arg;
        uint64_t retaddr;
-       int vsyscallnr;
+       size_t vsyscallnr;
 
        /*
         * Check for a vsyscall. %rip must be the fault address,
@@ -515,6 +520,8 @@
         */
        if (copyin((void *)tf->tf_rsp, &retaddr, sizeof retaddr) != 0)
                return 0;
+       if ((vaddr_t)retaddr >= VM_MAXUSER_ADDRESS)
+               return 0;
        tf->tf_rip = retaddr;
        tf->tf_rax = linux_vsyscall_to_syscall[vsyscallnr];
        tf->tf_rsp += 8;        /* "pop" the return address */



Home | Main Index | Thread Index | Old Index