NetBSD-Bugs archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: kern/53261: kernel crash during test run



The following reply was made to PR kern/53261; it has been noted by GNATS.

From: Kamil Rytarowski <n54%gmx.com@localhost>
To: gnats-bugs%NetBSD.org@localhost
Cc: 
Subject: Re: kern/53261: kernel crash during test run
Date: Wed, 23 May 2018 15:07:33 +0200

 This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
 --QsMnTI8uC6U1WzF5IXl7WJ6aa26iymjy4
 Content-Type: multipart/mixed; boundary="tOpxe8pTwb4arpMZBS7hw5eWPfokKk9vb";
  protected-headers="v1"
 From: Kamil Rytarowski <n54%gmx.com@localhost>
 To: gnats-bugs%NetBSD.org@localhost
 Message-ID: <4eb55e0f-416e-a42b-5dfb-0978720d6252%gmx.com@localhost>
 Subject: Re: kern/53261: kernel crash during test run
 References: <pr-kern-53261%gnats.netbsd.org@localhost>
  <20180523121501.5D1887A21F%mollari.NetBSD.org@localhost>
 In-Reply-To: <20180523121501.5D1887A21F%mollari.NetBSD.org@localhost>
 
 --tOpxe8pTwb4arpMZBS7hw5eWPfokKk9vb
 Content-Type: text/plain; charset=utf-8
 Content-Language: en-US
 Content-Transfer-Encoding: quoted-printable
 
 On 23.05.2018 14:15, Martin Husemann wrote:
 > The following reply was made to PR kern/53261; it has been noted by GNA=
 TS.
 >=20
 > From: Martin Husemann <martin%duskware.de@localhost>
 > To: gnats-bugs%NetBSD.org@localhost
 > Cc:=20
 > Subject: Re: kern/53261: kernel crash during test run
 > Date: Wed, 23 May 2018 14:10:23 +0200
 >=20
 >  On Wed, May 23, 2018 at 12:05:00PM +0000, Kamil Rytarowski wrote:
 >  >  In the mmap() case we can get legal input and output arguments with=
 in
 >  >  the 32-bit range.
 > =20
 >  No, we can't and the kernel will crash.
 > =20
 
 This code works reliably on i386 in 32-bit mode. This includes more
 advanced sanitizer ASan that allocates a lot of memory.
 
 >  A userland program *never* should be able to crash the kernel.
 > =20
 
 Agreed.
 
 >  An alternative is to make the syscall handling code in arm a lot more
 >  complex and check for specific misalignments, but then we would punish=
 
 >  everyone for a stupid
 
 This is the proper solution. Other ports are already mangling the input
 vector for syscall/__syscall. Not sure if any does it for the same
 reason, but it's the proper solution.
 
 > test interface that should just go away.
 > =20
 
 I don't agree that this interface should go away. It's convenient.
 
 If we would like to obsolete it in sanitizers, the alternative is to
 reimplement syscall entry functions for every CPU and syscall separately
 (unless we want to go for hacks with symbol mangling that is not that
 reliable). Reimplementing sanitizers isn't viable, at least now.
 
 >  Martin
 > =20
 >=20
 
 
 --tOpxe8pTwb4arpMZBS7hw5eWPfokKk9vb--
 
 --QsMnTI8uC6U1WzF5IXl7WJ6aa26iymjy4
 Content-Type: application/pgp-signature; name="signature.asc"
 Content-Description: OpenPGP digital signature
 Content-Disposition: attachment; filename="signature.asc"
 
 -----BEGIN PGP SIGNATURE-----
 
 iQJABAEBCAAqFiEELaxVpweEzw+lMDwuS7MI6bAudmwFAlsFZ5UMHG41NEBnbXgu
 Y29tAAoJEEuzCOmwLnZsUwcQAJHUt6Ra/9fk6ihFNc6CzNzuTWvHl/CdLNBFL3n4
 XE1DCS35fT2DmCVtjDvoI3c6UZS4kaASZZ089wdK2rRPB7O7G73XfjL4ghXoFhgF
 cJQxZoqfehhzbnoRynGt1dCj+Un1IqwqEZPai0a1LsQd4xKWVePkTUMH5bR1edbZ
 aeni2OUDg9SS4M7XBcYANDEowdsBt/Pb+4v/n+spEPvyKlj8xHvgtoEKiwlp4H+Q
 h9LFwvj3UI5drfJoGvO53/f37REv5ilGvcUt2cQwn2sDPl/AeVt5v8WYQpEWJCRT
 suKPjyYjyymbRrTVZLM4rlt9bJ4koVtmGk1heSaAHVHwGRxTK9X1gUSNXPDgMzdR
 iw6kS/woLYVG57lTLPdkL3wVejw+wiuDImFDsMExrVaUSS/T6fVisMKHaa0zeCOu
 9zq0Uz+L0qk03uz5hOQ9rwyEJc+S9COV0nhlobFtOiPSBDQPn22wbF8ajue56Iy1
 bcBJS85mmyqTng0qnggcCdnQwEyZulGySw1o1h4CcrXa0pagLqyhkBMprakcy1R0
 DKH8VB3fhNCk8gbikEZCiU8B5mFrjKzL6n08NXUvpNPFN8FlsZJiQpSFm4KR/kvi
 NjzRvr001uWJxRP+ZDlWzyN23N4OgNoTqPwwuxKbcqDXggMOjUgRu3u24Sda6Icl
 ++nm
 =a6q2
 -----END PGP SIGNATURE-----
 
 --QsMnTI8uC6U1WzF5IXl7WJ6aa26iymjy4--
 


Home | Main Index | Thread Index | Old Index