Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1472732imm; Wed, 25 Jul 2018 19:35:36 -0700 (PDT) X-Google-Smtp-Source: AAOMgpefCW57syNTeNo+qYVyHYxSQuyeqmGgwYZjoQ8ILnTxFIAoTR/t3UTM4UtHgtfszFBn+Zm9 X-Received: by 2002:a17:902:529:: with SMTP id 38-v6mr95275plf.145.1532572536335; Wed, 25 Jul 2018 19:35:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1532572536; cv=none; d=google.com; s=arc-20160816; b=HtS4srv8ham2L12zLHEbamtUaV40Tu7X/R58DoHhebBAoZgQq/uCbob3PZTVNWBi6Q 9Vd+xuJ7PWfddl+Y4VtPVN8mICzLFY82ijkUzTDaHCdTnI5yDnpcHa2VYXnOr1Zth3fX IQvthprvsPauKHDX9437LvBPBJ2iL2FfBwZLip5FnxQMSn2YEQH3h5TImehpfYUrEj4h QNyUBduVR/muusUkBQVa4zOZZJToUBeqYSjnjyPh49+xUG5obZ6gXIoMx5l9ftYE5Bx4 mLRPYl/9lWMP1eewU1/4UTkTktHH2xjoixnEpI3dnvgzXFgX21u+A3zRLjhzx+2N7kRN Fogg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=saBmvlkJjqVPdTWOSuBiQGqyav3gbVBZWhTf01+0XW4=; b=YzRZ9n6K87ukBox0xaw2/HJnJkRZX4pwMdTtbnuzLbsXtKk5iENVmaOvpPHnrJtZYO Ek/AZFXZ2NZ0u389Nil7CXvz1ykuyE5YlGLQ/Pe080kn3FD0KszidT8KAPGm6zWRidPx Lz6O8J9zOdQLimICVRZFY6r7zAhjW3iMsFd4ejbJ85gR1gqodFqKy89XiZ3kh6ueDYKQ v6O2cB0F8q5k480qXx7Xz9u/3pL36Fv4R9IObG6kyVPXjhMLPjI5L8UknVIMFH0rJ6aQ Y3AlhFLBga59S2Yfo5MIeyOFwgkYbdbOgG298h06whrF/lVeLea1XnYsKJo1FHzO4OEs ZE/A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@arista.com header.s=googlenew header.b=gSO1r+rl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=REJECT dis=NONE) header.from=arista.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y78-v6si158738pfj.159.2018.07.25.19.35.21; Wed, 25 Jul 2018 19:35:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@arista.com header.s=googlenew header.b=gSO1r+rl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=REJECT dis=NONE) header.from=arista.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728914AbeGZDqW (ORCPT + 99 others); Wed, 25 Jul 2018 23:46:22 -0400 Received: from mail-ed1-f65.google.com ([209.85.208.65]:35884 "EHLO mail-ed1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728729AbeGZDqV (ORCPT ); Wed, 25 Jul 2018 23:46:21 -0400 Received: by mail-ed1-f65.google.com with SMTP id k15-v6so341475edr.3 for ; Wed, 25 Jul 2018 19:31:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arista.com; s=googlenew; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=saBmvlkJjqVPdTWOSuBiQGqyav3gbVBZWhTf01+0XW4=; b=gSO1r+rlQQ9RWQE/4YX9Eiy3qqG7zZYweyCmihZ8poVXC5dUku4QKmjfRYXBCNb2tg SWDcDQz09w+Z7dXBvlZWClHBUJ/wshaaFmlNP9amFhvcCiMfSGRv9j+hpVOvXHCXV9Bp +pEzQE5VK9CQcGPntohAiykw8vzhwk1vuuPXqLqoOzduMchZYjt+1v11ZgOytXrsAMxl bsd1f5dks/WIoOsQWhVLsFpntAZe4HdiISGNvTtsQzfS84OQ0IzpF8+URAF415UjxGeg XKAdd+fg84T3aXCJMYmam6YpL/mMO2m5rAfTkQH6VKHRl1tXkSATHnEb4pZhZJ8PxGXn 5ssQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=saBmvlkJjqVPdTWOSuBiQGqyav3gbVBZWhTf01+0XW4=; b=ilTrftpNTz238YO+ZazWdN/avFxuwDoT89Ix+wYEfvlz+JJ+kzBj4ppl4pGkE+FAJ2 ThgYLG1sB20f5mhmqUvXZOpI4AczoGj3si6UdNEkm+8NXi0h2XRrQps/0/vYuGu41Rwh 9vSCzGX32McGqjzlVopbOl9d1BxcJIkxq1puJfdz/MRkW3u5Z+npmlibBuAevhQuif0p T9Dy06NQQVfWriR5EGPc1ZUB8/E39du9yxXxrjoV3ooLEkB14+sLMwmcFG8NqnHSd3g8 7sUi//HkPRi+tJ0oXBWFIPcRnQgdcOLgcSnQeSNiUXj9jHdwU+QUHerR2CO9GOlO00Wi E7aQ== X-Gm-Message-State: AOUpUlEIv5p3hbYkSXWblJMLywMULHX++vQdQzZXlJ58PC2s6PItEJdC DACPN98FAMG4sxi1ejrUPrYIzkFEWk0= X-Received: by 2002:a50:b2a6:: with SMTP id p35-v6mr487967edd.215.1532572307567; Wed, 25 Jul 2018 19:31:47 -0700 (PDT) Received: from dhcp.ire.aristanetworks.com ([217.173.96.166]) by smtp.gmail.com with ESMTPSA id x13-v6sm241024edx.17.2018.07.25.19.31.46 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Wed, 25 Jul 2018 19:31:47 -0700 (PDT) From: Dmitry Safonov To: linux-kernel@vger.kernel.org Cc: Dmitry Safonov , "David S. Miller" , Herbert Xu , Steffen Klassert , Dmitry Safonov <0x7f454c46@gmail.com>, netdev@vger.kernel.org, Andy Lutomirski , Ard Biesheuvel , "H. Peter Anvin" , Ingo Molnar , John Stultz , "Kirill A. Shutemov" , Oleg Nesterov , Stephen Boyd , Steven Rostedt , Thomas Gleixner , x86@kernel.org, linux-efi@vger.kernel.org Subject: [PATCH 01/18] x86/compat: Adjust in_compat_syscall() to generic code under !COMPAT Date: Thu, 26 Jul 2018 03:31:27 +0100 Message-Id: <20180726023144.31066-2-dima@arista.com> X-Mailer: git-send-email 2.13.6 In-Reply-To: <20180726023144.31066-1-dima@arista.com> References: <20180726023144.31066-1-dima@arista.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The result of in_compat_syscall() can be pictured as: x86 platform: --------------------------------------------------- | Arch\syscall | 64-bit | ia32 | x32 | |-------------------------------------------------| | x86_64 | false | true | true | |-------------------------------------------------| | i686 | false | | false | --------------------------------------------------- Other platforms: ------------------------------------------------ | Arch\syscall | 64-bit | compat (32?) | |----------------------------------------------| | 64-bit | false | true | |----------------------------------------------| | 32-bit(?) | false | | ------------------------------------------------ As it seen, the result of in_compat_syscall() on generic 32-bit platform differs from i686. There is no reason for in_compat_syscall() == true on native i686. It also easy to misread code if the result on native 32-bit platform differs between arches. Because of that non arch-specific code has many places with: if (IS_ENABLED(CONFIG_COMPAT) && in_compat_syscall()) in different variations. It looks-like the only non-x86 code which uses in_compat_syscall() not under CONFIG_COMPAT guard is in amd/amdkfd. But according to the commit a18069c132cb ("amdkfd: Disable support for 32-bit user processes"), it actually should be disabled on native i686. Rename in_compat_syscall() to in_32bit_syscall() for x86-specific code and make in_compat_syscall() false under !CONFIG_COMPAT. With a following patch I'll clean generic users which were forced to check IS_ENABLED(CONFIG_COMPAT) with in_compat_syscall(). Cc: Andy Lutomirski Cc: Ard Biesheuvel Cc: "David S. Miller" Cc: Herbert Xu Cc: "H. Peter Anvin" Cc: Ingo Molnar Cc: John Stultz Cc: "Kirill A. Shutemov" Cc: Oleg Nesterov Cc: Steffen Klassert Cc: Stephen Boyd Cc: Steven Rostedt Cc: Thomas Gleixner Cc: x86@kernel.org Cc: linux-efi@vger.kernel.org Cc: netdev@vger.kernel.org Signed-off-by: Dmitry Safonov --- arch/x86/include/asm/compat.h | 9 ++++++++- arch/x86/include/asm/ftrace.h | 4 +--- arch/x86/kernel/process_64.c | 4 ++-- arch/x86/kernel/sys_x86_64.c | 11 ++++++----- arch/x86/mm/hugetlbpage.c | 4 ++-- arch/x86/mm/mmap.c | 2 +- include/linux/compat.h | 4 ++-- 7 files changed, 22 insertions(+), 16 deletions(-) diff --git a/arch/x86/include/asm/compat.h b/arch/x86/include/asm/compat.h index fb97cf7c4137..626bcf1d037d 100644 --- a/arch/x86/include/asm/compat.h +++ b/arch/x86/include/asm/compat.h @@ -232,11 +232,18 @@ static inline bool in_x32_syscall(void) return false; } -static inline bool in_compat_syscall(void) +static inline bool in_32bit_syscall(void) { return in_ia32_syscall() || in_x32_syscall(); } + +#ifdef CONFIG_COMPAT +static inline bool in_compat_syscall(void) +{ + return in_32bit_syscall(); +} #define in_compat_syscall in_compat_syscall /* override the generic impl */ +#endif struct compat_siginfo; int __copy_siginfo_to_user32(struct compat_siginfo __user *to, diff --git a/arch/x86/include/asm/ftrace.h b/arch/x86/include/asm/ftrace.h index c18ed65287d5..cf350639e76d 100644 --- a/arch/x86/include/asm/ftrace.h +++ b/arch/x86/include/asm/ftrace.h @@ -76,9 +76,7 @@ static inline bool arch_syscall_match_sym_name(const char *sym, const char *name #define ARCH_TRACE_IGNORE_COMPAT_SYSCALLS 1 static inline bool arch_trace_is_compat_syscall(struct pt_regs *regs) { - if (in_compat_syscall()) - return true; - return false; + return in_32bit_syscall(); } #endif /* CONFIG_FTRACE_SYSCALLS && CONFIG_IA32_EMULATION */ #endif /* !COMPILE_OFFSETS */ diff --git a/arch/x86/kernel/process_64.c b/arch/x86/kernel/process_64.c index 12bb445fb98d..3a6f3cf27808 100644 --- a/arch/x86/kernel/process_64.c +++ b/arch/x86/kernel/process_64.c @@ -564,10 +564,10 @@ static void __set_personality_x32(void) current->mm->context.ia32_compat = TIF_X32; current->personality &= ~READ_IMPLIES_EXEC; /* - * in_compat_syscall() uses the presence of the x32 syscall bit + * in_32bit_syscall() uses the presence of the x32 syscall bit * flag to determine compat status. The x86 mmap() code relies on * the syscall bitness so set x32 syscall bit right here to make - * in_compat_syscall() work during exec(). + * in_32bit_syscall() work during exec(). * * Pretend to come from a x32 execve. */ diff --git a/arch/x86/kernel/sys_x86_64.c b/arch/x86/kernel/sys_x86_64.c index 6a78d4b36a79..f7476ce23b6e 100644 --- a/arch/x86/kernel/sys_x86_64.c +++ b/arch/x86/kernel/sys_x86_64.c @@ -105,7 +105,7 @@ SYSCALL_DEFINE6(mmap, unsigned long, addr, unsigned long, len, static void find_start_end(unsigned long addr, unsigned long flags, unsigned long *begin, unsigned long *end) { - if (!in_compat_syscall() && (flags & MAP_32BIT)) { + if (!in_32bit_syscall() && (flags & MAP_32BIT)) { /* This is usually used needed to map code in small model, so it needs to be in the first 31bit. Limit it to that. This means we need to move the @@ -122,7 +122,7 @@ static void find_start_end(unsigned long addr, unsigned long flags, } *begin = get_mmap_base(1); - if (in_compat_syscall()) + if (in_32bit_syscall()) *end = task_size_32bit(); else *end = task_size_64bit(addr > DEFAULT_MAP_WINDOW); @@ -193,7 +193,7 @@ arch_get_unmapped_area_topdown(struct file *filp, const unsigned long addr0, return addr; /* for MAP_32BIT mappings we force the legacy mmap base */ - if (!in_compat_syscall() && (flags & MAP_32BIT)) + if (!in_32bit_syscall() && (flags & MAP_32BIT)) goto bottomup; /* requesting a specific address */ @@ -217,9 +217,10 @@ arch_get_unmapped_area_topdown(struct file *filp, const unsigned long addr0, * If hint address is above DEFAULT_MAP_WINDOW, look for unmapped area * in the full address space. * - * !in_compat_syscall() check to avoid high addresses for x32. + * !in_32bit_syscall() check to avoid high addresses for x32 + * (and make it no op on native i386). */ - if (addr > DEFAULT_MAP_WINDOW && !in_compat_syscall()) + if (addr > DEFAULT_MAP_WINDOW && !in_32bit_syscall()) info.high_limit += TASK_SIZE_MAX - DEFAULT_MAP_WINDOW; info.align_mask = 0; diff --git a/arch/x86/mm/hugetlbpage.c b/arch/x86/mm/hugetlbpage.c index 00b296617ca4..92e4c4b85bba 100644 --- a/arch/x86/mm/hugetlbpage.c +++ b/arch/x86/mm/hugetlbpage.c @@ -92,7 +92,7 @@ static unsigned long hugetlb_get_unmapped_area_bottomup(struct file *file, * If hint address is above DEFAULT_MAP_WINDOW, look for unmapped area * in the full address space. */ - info.high_limit = in_compat_syscall() ? + info.high_limit = in_32bit_syscall() ? task_size_32bit() : task_size_64bit(addr > DEFAULT_MAP_WINDOW); info.align_mask = PAGE_MASK & ~huge_page_mask(h); @@ -116,7 +116,7 @@ static unsigned long hugetlb_get_unmapped_area_topdown(struct file *file, * If hint address is above DEFAULT_MAP_WINDOW, look for unmapped area * in the full address space. */ - if (addr > DEFAULT_MAP_WINDOW && !in_compat_syscall()) + if (addr > DEFAULT_MAP_WINDOW && !in_32bit_syscall()) info.high_limit += TASK_SIZE_MAX - DEFAULT_MAP_WINDOW; info.align_mask = PAGE_MASK & ~huge_page_mask(h); diff --git a/arch/x86/mm/mmap.c b/arch/x86/mm/mmap.c index 48c591251600..36334ce78be8 100644 --- a/arch/x86/mm/mmap.c +++ b/arch/x86/mm/mmap.c @@ -166,7 +166,7 @@ unsigned long get_mmap_base(int is_legacy) struct mm_struct *mm = current->mm; #ifdef CONFIG_HAVE_ARCH_COMPAT_MMAP_BASES - if (in_compat_syscall()) { + if (in_32bit_syscall()) { return is_legacy ? mm->mmap_compat_legacy_base : mm->mmap_compat_base; } diff --git a/include/linux/compat.h b/include/linux/compat.h index c68acc47da57..4dd4b00407ab 100644 --- a/include/linux/compat.h +++ b/include/linux/compat.h @@ -1031,9 +1031,9 @@ static inline struct compat_timeval ns_to_compat_timeval(s64 nsec) #else /* !CONFIG_COMPAT */ #define is_compat_task() (0) -#ifndef in_compat_syscall +/* Ensure no one redefines in_compat_syscall() under !CONFIG_COMPAT */ +#define in_compat_syscall in_compat_syscall static inline bool in_compat_syscall(void) { return false; } -#endif #endif /* CONFIG_COMPAT */ -- 2.13.6