|| ||Alexander van Heukelum <email@example.com> |
|| ||LKML <firstname.lastname@example.org>,
"H. Peter Anvin" <email@example.com> |
|| ||[PATCH 0/3] x86: fix return from kernel to userspace with 16-bit stack |
|| ||Thu, 18 Jun 2009 00:35:56 +0200|
|| ||Ingo Molnar <firstname.lastname@example.org>, Thomas Gleixner <email@example.com>,
Andi Kleen <firstname.lastname@example.org>,
Cyrill Gorcunov <email@example.com>,
Stas Sergeev <firstname.lastname@example.org>, Tejun Heo <email@example.com>,
Jeremy Fitzhardinge <firstname.lastname@example.org>,
Alexander van Heukelum <email@example.com>|
|| ||Article, Thread
This patchset was generated against the current mainline-git tree, but
also applies just fine to the tip tree.
If a userspace application is interrupted by a trap, interrupt, or nmi,
the processor saves ss:esp, the flags register and cs:eip and loads a
new ss:esp from the task segment, modifies the flags and loads cs:eip
from the interrupt descriptor table. After handling the exception, the
saved values are restored and the user process continues as if nothing
happened... With one exception: if the process users a 16-bit stack
segment (as described in the LDT), the processor only restores the low
16 bits of esp from the saved value. The upper 16 bits are left equal to
the upper word of the kernel esp. Only very few applications, like
dosemu and wine, care, but it leads to those applications crashing with,
usually, a bus error.
The implemented fix is to change the stack segment and stack pointer in
a clever way just before returning to the userspace application. The
espfix segment is a normal 32-bit segment, but with a non-zero base. The
base of the espfix segment and the high word of the temporary esp are
changed in unison, such that the temporary stack still points to the
kernel stack, but the high word of esp is already equal to the high word
of the saved userspace esp. On return to userspace the iret-instruction
only loads the low word of esp, but the high word was already set to the
correct value by changing to the temporary espfix stack. Using the
espfix stack in C code is however unsafe, so fixups to change back to
the normal stack before entering C code have to be in place.
patch 1/3: i386: fix return to 16-bit stack from NMI handler
This patch adds switching to the espfix stack if the kernel returns to
userspace from the NMI. Commit 55f327fa9e876758491a82af7491104f1cc3fc4d
("lockdep: irqtrace subsystem, i386 support") removed this check/fixup
from the NMI return path.
patch 2/3: i386: fix/simplify espfix stack switching, move it into assembly
A long-standing problem with the computation of the espfix base address
and the temporary stack segment. The combined result always points to
the kernel stack, but the high word of the espfix stack pointer was not
always equal to the high word of the saved userspace stack pointer. This
patch simplifies the fixup code and fixes it.
patch 3/3: x86: de-assembler-ize asm/desc.h
Cleanup patch, split out form previous versions of patch 2/3. In earlier
versions I forgot to take into account x86_64 when I did the cleanup.
This version compiles fine on x86_64.
arch/x86/include/asm/desc.h | 26 -----------------
arch/x86/kernel/cpu/common.c | 2 +-
arch/x86/kernel/entry_32.S | 64 +++++++++++++++++++++++++++--------------
arch/x86/kernel/head_32.S | 1 -
arch/x86/kernel/head_64.S | 1 -
5 files changed, 43 insertions(+), 51 deletions(-)
I'm typing this message on an Authentic Sempron 2400+ running the