[PATCH trusty SRU] x86-64, modify_ldt: Make support for 16-bit segments a runtime option

Tim Gardner tim.gardner at canonical.com
Mon Jun 16 17:01:16 UTC 2014


You're gonna have to provide a bit more detail 'cause I don't know
anything about espfix64.

rtg

On 06/16/2014 10:24 AM, Chris J Arges wrote:
> Will this patch be superseeded by espfix64 when that lands?
> --chris
> 
> On 06/16/2014 11:17 AM, Tim Gardner wrote:
>> From: Linus Torvalds <torvalds at linux-foundation.org>
>>
>> BugLink: http://bugs.launchpad.net/bugs/1328965
>>
>> Checkin:
>>
>> b3b42ac2cbae x86-64, modify_ldt: Ban 16-bit segments on 64-bit kernels
>>
>> disabled 16-bit segments on 64-bit kernels due to an information
>> leak.  However, it does seem that people are genuinely using Wine to
>> run old 16-bit Windows programs on Linux.
>>
>> A proper fix for this ("espfix64") is coming in the upcoming merge
>> window, but as a temporary fix, create a sysctl to allow the
>> administrator to re-enable support for 16-bit segments.
>>
>> It adds a "/proc/sys/abi/ldt16" sysctl that defaults to zero (off). If
>> you hit this issue and care about your old Windows program more than
>> you care about a kernel stack address information leak, you can do
>>
>>    echo 1 > /proc/sys/abi/ldt16
>>
>> as root (add it to your startup scripts), and you should be ok.
>>
>> The sysctl table is only added if you have COMPAT support enabled on
>> x86-64, but I assume anybody who runs old windows binaries very much
>> does that ;)
>>
>> Signed-off-by: H. Peter Anvin <hpa at linux.intel.com>
>> Link: http://lkml.kernel.org/r/CA%2B55aFw9BPoD10U1LfHbOMpHWZkvJTkMcfCs9s3urPr1YyWBxw@mail.gmail.com
>> Cc: <stable at vger.kernel.org>
>> (cherry picked from commit fa81511bb0bbb2b1aace3695ce869da9762624ff)
>> Signed-off-by: Tim Gardner <tim.gardner at canonical.com>
>> ---
>>  arch/x86/kernel/ldt.c        | 4 +++-
>>  arch/x86/vdso/vdso32-setup.c | 8 ++++++++
>>  2 files changed, 11 insertions(+), 1 deletion(-)
>>
>> diff --git a/arch/x86/kernel/ldt.c b/arch/x86/kernel/ldt.c
>> index af1d14a..dcbbaa1 100644
>> --- a/arch/x86/kernel/ldt.c
>> +++ b/arch/x86/kernel/ldt.c
>> @@ -20,6 +20,8 @@
>>  #include <asm/mmu_context.h>
>>  #include <asm/syscalls.h>
>>  
>> +int sysctl_ldt16 = 0;
>> +
>>  #ifdef CONFIG_SMP
>>  static void flush_ldt(void *current_mm)
>>  {
>> @@ -234,7 +236,7 @@ static int write_ldt(void __user *ptr, unsigned long bytecount, int oldmode)
>>  	 * IRET leaking the high bits of the kernel stack address.
>>  	 */
>>  #ifdef CONFIG_X86_64
>> -	if (!ldt_info.seg_32bit) {
>> +	if (!ldt_info.seg_32bit && !sysctl_ldt16) {
>>  		error = -EINVAL;
>>  		goto out_unlock;
>>  	}
>> diff --git a/arch/x86/vdso/vdso32-setup.c b/arch/x86/vdso/vdso32-setup.c
>> index d6bfb87..f1d633a 100644
>> --- a/arch/x86/vdso/vdso32-setup.c
>> +++ b/arch/x86/vdso/vdso32-setup.c
>> @@ -41,6 +41,7 @@ enum {
>>  #ifdef CONFIG_X86_64
>>  #define vdso_enabled			sysctl_vsyscall32
>>  #define arch_setup_additional_pages	syscall32_setup_pages
>> +extern int sysctl_ldt16;
>>  #endif
>>  
>>  /*
>> @@ -380,6 +381,13 @@ static struct ctl_table abi_table2[] = {
>>  		.mode		= 0644,
>>  		.proc_handler	= proc_dointvec
>>  	},
>> +	{
>> +		.procname	= "ldt16",
>> +		.data		= &sysctl_ldt16,
>> +		.maxlen		= sizeof(int),
>> +		.mode		= 0644,
>> +		.proc_handler	= proc_dointvec
>> +	},
>>  	{}
>>  };
>>  
>>


-- 
Tim Gardner tim.gardner at canonical.com




More information about the kernel-team mailing list