android_kernel_xiaomi_sm8350/arch/um/sys-x86_64
Bodo Stroesser 81efcd3300 [PATCH] uml: more carefully test whether we are in a system call
For security reasons, UML in is_syscall() needs to have access to code in
vsyscall-page.  The current implementation grants this access by explicitly
allowing access to vsyscall in access_ok_skas().  With this change,
copy_from_user() may be used to read the code.  Ptrace access to vsyscall-page
for debugging already was implemented in get_user_pages() by mainline.  In
i386, copy_from_user can't access vsyscall-page, but returns EFAULT.

To make UML behave as i386 does, I changed is_syscall to use
access_process_vm(current) to read the code from vsyscall-page.  This doesn't
hurt security, but simplifies the code and prepares implementation of
stub-vmas.

Signed-off-by: Bodo Stroesser <bstroesser@fujitsu-siemens.com>
Signed-off-by: Jeff Dike <jdike@addtoit.com>
Cc: Paolo 'Blaisorblade' Giarrusso <blaisorblade@yahoo.it>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-03-27 08:44:38 -08:00
..
bugs.c
delay.c
fault.c
ksyms.c
Makefile [PATCH] uml: fix compilation with CONFIG_MODE_TT disabled 2005-12-29 09:48:15 -08:00
mem.c
ptrace_user.c [PATCH] uml: initialize process FP registers properly 2006-02-07 16:12:32 -08:00
ptrace.c [PATCH] uml: more carefully test whether we are in a system call 2006-03-27 08:44:38 -08:00
sigcontext.c
signal.c [PATCH] uml: fix signal frame copy_user 2005-09-05 00:06:21 -07:00
stub_segv.c [PATCH] uml: properly invoke x86_64 system calls 2005-11-22 09:13:41 -08:00
stub.S [PATCH] uml: skas0 stubs now check system call return values 2005-09-05 00:06:24 -07:00
syscall_table.c
syscalls.c [PATCH] uml: maintain own LDT entries 2005-11-07 07:53:31 -08:00
sysrq.c
um_module.c
unmap.c [PATCH] uml: workaround host bug in "TT mode vs. NPTL link fix" 2005-07-14 09:00:24 -07:00
user-offsets.c [PATCH] uml: move libc-dependent irq code to os-Linux 2006-03-27 08:44:37 -08:00