On Tue, Nov 18, 2014 at 01:10:34AM +0000, AKASHI Takahiro wrote:
> If tracer specifies -1 as a syscall number, this traced system call should
> be skipped with a return value specified in x0.
> This patch implements this semantics, but there is one restriction here:
> 
>     syscall(-1) always return ENOSYS whatever value is stored in x0
>     (a return value) at syscall entry.
> 
> Normally, with ptrace off, syscall(-1) returns -ENOSYS. With ptrace on,
> however, if a tracer didn't pay any attention to user-issued syscall(-1)
> and just let it go, it would return a value in x0 as in other system call
> cases. This means that this system call might succeed and yet see any bogus
> return value. This should be definitely avoided.
> 
> Please also note:
> * syscall entry tracing and syscall exit tracing (ftrace tracepoint and
>   audit) are always executed, if enabled, even when skipping a system call
>   (that is, -1).
>   In this way, we can avoid a potential bug where audit_syscall_entry()
>   might be called without audit_syscall_exit() at the previous system call
>   being called, that would cause OOPs in audit_syscall_entry().
> 
> Signed-off-by: AKASHI Takahiro <takahiro.aka...@linaro.org>
> ---
>  arch/arm64/kernel/entry.S  |    3 +++
>  arch/arm64/kernel/ptrace.c |   18 ++++++++++++++++++
>  2 files changed, 21 insertions(+)
> 
> diff --git a/arch/arm64/kernel/entry.S b/arch/arm64/kernel/entry.S
> index 726b910..01118b1 100644
> --- a/arch/arm64/kernel/entry.S
> +++ b/arch/arm64/kernel/entry.S
> @@ -670,6 +670,8 @@ ENDPROC(el0_svc)
>  __sys_trace:
>       mov     x0, sp
>       bl      syscall_trace_enter
> +     cmp     w0, #-1                         // skip the syscall?
> +     b.eq    __sys_trace_return_skipped
>       adr     lr, __sys_trace_return          // return address
>       uxtw    scno, w0                        // syscall number (possibly new)
>       mov     x1, sp                          // pointer to regs
> @@ -684,6 +686,7 @@ __sys_trace:
>  
>  __sys_trace_return:
>       str     x0, [sp]                        // save returned x0
> +__sys_trace_return_skipped:
>       mov     x0, sp
>       bl      syscall_trace_exit
>       b       ret_to_user
> diff --git a/arch/arm64/kernel/ptrace.c b/arch/arm64/kernel/ptrace.c
> index 8b98781..34b1e85 100644
> --- a/arch/arm64/kernel/ptrace.c
> +++ b/arch/arm64/kernel/ptrace.c
> @@ -1149,6 +1149,8 @@ static void tracehook_report_syscall(struct pt_regs 
> *regs,
>  
>  asmlinkage int syscall_trace_enter(struct pt_regs *regs)
>  {
> +     int orig_syscallno = regs->syscallno;
> +
>       if (test_thread_flag(TIF_SYSCALL_TRACE))
>               tracehook_report_syscall(regs, PTRACE_SYSCALL_ENTER);
>  
> @@ -1158,6 +1160,22 @@ asmlinkage int syscall_trace_enter(struct pt_regs 
> *regs)
>       audit_syscall_entry(regs->syscallno, regs->orig_x0, regs->regs[1],
>                           regs->regs[2], regs->regs[3]);
>  
> +     if (((int)regs->syscallno == -1) && (orig_syscallno == -1)) {
> +             /*
> +              * user-issued syscall(-1):
> +              * RESTRICTION: We always return ENOSYS whatever value is
> +              *   stored in x0 (a return value) at this point.
> +              * Normally, with ptrace off, syscall(-1) returns -ENOSYS.
> +              * With ptrace on, however, if a tracer didn't pay any
> +              * attention to user-issued syscall(-1) and just let it go
> +              * without a hack here, it would return a value in x0 as in
> +              * other system call cases. This means that this system call
> +              * might succeed and see any bogus return value.
> +              * This should be definitely avoided.
> +              */
> +             regs->regs[0] = -ENOSYS;
> +     }

I'm still really uncomfortable with this, and it doesn't seem to match what
arch/arm/ does either. Doesn't it also prevent a tracer from skipping
syscall(-1)?

Will
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to