On Tuesday 28 March 2006 22:02, Jeff Dike wrote: > On Mon, Mar 27, 2006 at 11:30:05PM +0100, Blaisorblade wrote: > > That is problem #1, and exists; but when answering I thought to problem > > #2, i.e. that the stub code currently hardcodes the location of the stub > > data page, and that this must be fixed; I didn't notice that we must > > first put the stubs somewhere.
> I see - you're one problem ahead of me. > I'm wondering if we can play some linker tricks for this. Stick a > word of data on the code page and put the data page address in it. > Then the stub just reads that in order to get the data. After you place the stubs somewhere, you can pass them the address in a register. Indeed, we already do that since the stack in located inside the data page, so you simply need to round that (hardcoding at compile-time the data size page, but we already do that). Passing that in a memory word doesn't work unless you use Instruction Pointer relative addressing, only available (to my knowledge) in x86_64 as RIP-relative addressing. > That will work, too, but (as you point > out) requires a register. Not a big problem - you can recalculate it at will so that's not a real problem as long as we can recalculate if without problems (which could probably require switching to full assembler). > > > Another approach is to start with the current top of stack > Hmmmm :-) Maybe easier said than done. I was thinking about figuring > that out as basically the first thing in main, but I can think of > reasons that wouldn't be robust. Can we remove the assumption the pages are at the absolute top of the address space? The guest process doesn't risk unmapping them because we stop it from that, with gate_vma's for instance, even if I know that's a work in progress from Bodo's comments (not yet begun). We could block mmapping over the used address, and we must do that anyway - SKAS3 indeed would fail on 2G/2G and such hosts exactly because we don't do that and our mmap() returns addresses beyond host TASK_SIZE. However, this doesn't happen because we already implement the "top of the stack" detection technique in arch/um/kernel/skas/mem.c. So we've well-tested code doing this, even if maybe at times suboptimal. But how much does stack randomization changes? That's the only remaining doubt. -- Inform me of my mistakes, so I can keep imitating Homer Simpson's "Doh!". Paolo Giarrusso, aka Blaisorblade (Skype ID "PaoloGiarrusso", ICQ 215621894) http://www.user-mode-linux.org/~blaisorblade ___________________________________ Yahoo! Mail: gratis 1GB per i messaggi e allegati da 10MB http://mail.yahoo.it ------------------------------------------------------- This SF.Net email is sponsored by xPML, a groundbreaking scripting language that extends applications into web and mobile media. Attend the live webcast and join the prime developer group breaking into this new coding territory! http://sel.as-us.falkag.net/sel?cmd=lnk&kid=110944&bid=241720&dat=121642 _______________________________________________ User-mode-linux-user mailing list User-mode-linux-user@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/user-mode-linux-user