Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp10804985imu; Thu, 6 Dec 2018 07:05:24 -0800 (PST) X-Google-Smtp-Source: AFSGD/Wi7twrV7vJpzZGDUChSTyaaCDQTL4tZ3ICbL78rlK9ZFA0AUWClxoTZbIXQ0w1i1/m3Sqe X-Received: by 2002:a62:2547:: with SMTP id l68mr28459620pfl.131.1544108724026; Thu, 06 Dec 2018 07:05:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544108723; cv=none; d=google.com; s=arc-20160816; b=SWz9kyjkeSCRZkddK1omUsmIEVVyxVJdy34/WFZ9CV95RpRnlgZWc0oit5I9CiyjBV dyDoUdPO3Kq8vRyHSKmq4xv3zBs3ksK4YGkKCnhtPZVUoMSy2XMPWofW4QNGGyTwwhg3 XrjBEmS/XF9xhpYFBNU9LnIDGWCio8ng7vUf6EwvRYbWH6OtAvBdIxl6vXp9HMYznAgs 1uZYtWuS36gS6+6pf1Jn98nrFmVS9o5fhSAcihkoY0qajTusSD3JBbK6Z6u5guaohaMN XpJpbyio31p3BzQuGMeKB4EuIZP6HVvuFCZpaEWjwe28uXP2jOrE7BGtcHJRlaChxJZ5 LOCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=4m+VGxXWqzzk+UmYyKJAtJtNfco3vK/6BU20MncbTSg=; b=R/5lNNS1b/ATDGTQ0jjrT8B5jStt87ghExX1RC9RBSh2DMx6zP5rIUPuFuQ3jlFqeV mSau5kxtpTGwK/+BbOoXUBfPX4gA/eexTzCH7S0cgyE3daiCSZ9P8p/x3gDJEj8Wu6ZK WzIDlDslo0MSad3wEedQBWpJqvsd8lc6uA27A5Op2u8pErG+R7//GKTzoNWLUZXIgupP QjGjXV60tRq98Sjxfo9OHbTcfqV01zsM+BCOUDpZwNmzNmyH1gP0G+uF2MCWKRSK28PE l9Co15UiCV1gKWUTFA2aYLYJcKK4JpXNpRnOM6fR4bPTAaVsPkIRRBR73xURYn5izVLC WXlA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=AoWoU9KD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o11si445800pll.160.2018.12.06.07.04.58; Thu, 06 Dec 2018 07:05:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=AoWoU9KD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726229AbeLFPCT (ORCPT + 99 others); Thu, 6 Dec 2018 10:02:19 -0500 Received: from mail-wr1-f65.google.com ([209.85.221.65]:39057 "EHLO mail-wr1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725989AbeLFPCR (ORCPT ); Thu, 6 Dec 2018 10:02:17 -0500 Received: by mail-wr1-f65.google.com with SMTP id t27so801471wra.6 for ; Thu, 06 Dec 2018 07:02:16 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=4m+VGxXWqzzk+UmYyKJAtJtNfco3vK/6BU20MncbTSg=; b=AoWoU9KDHDQYaQPWpw5KuLwv/1GAQqp+BrIM+YLMxWKoGXYVNalfOqHXDkpSNclk5j 7YhG2uss3UxJnsAAcJSMGY4julk0/gX8cimiVcrP70qjWuwCXNlpnL3+urPOQZ6bsFSa eTprO4juwSxg3iKj5RFcYwHLkd2NkEs9MsFowWn2+dJphT1qunRjXeOV0chp+fbuNPPr AjriJ2VQXcmu26wNn+eBy6dBtX4mVkW6Omg4R2V1mcCNJUdlwO8YGhP0S8TqhCNGO+hy XrTydIM0esFYvi5/kfaXEEB30PiOsTAza5xB3mazRBgUSbXpNSdLP5fkzDUOUWHQNklo ZuzQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=4m+VGxXWqzzk+UmYyKJAtJtNfco3vK/6BU20MncbTSg=; b=Pwj7bvejrtE80qxZoElDBFA7rD0XKHzNjhKKbjq2zvMXPUMwEDUzTYEeRwOYYaTXaI C5fEv6QiWdax0J+sK4W0kdBT6LojM14ym3iofSXa+OBdBOubK+2VjiC9NY4kFmWdywJ+ m7TmBOP68Wlfnv2L9IBlB1XFKNY6sXSRzN++rz7wl8p9zVcWyPueqd+XjDLujxJ4q9R6 c3apBZ+9MY/j2fqcJyR0ZEiL3h2KP2TtnbDVSQaweHpsSMiGCehHg8DbYE5GvaFONhR3 G1BZSFkuBWdy+L0EIl8X0uGDsRmIQ9J/+FlCBSO7Z4Bkv/MXbeuBm9wQZVmAkwY3fSIQ iToA== X-Gm-Message-State: AA+aEWb7V4huX99H4Lh00p1hQiiFnL1JdVdZGk4gOo8FVo1LLmiRhWkA gZLunqWRIJdO7kU9xCq3FX8= X-Received: by 2002:a05:6000:12c4:: with SMTP id l4mr24658040wrx.134.1544108535714; Thu, 06 Dec 2018 07:02:15 -0800 (PST) Received: from localhost.localdomain (ip-76.net-89-3-178.rev.numericable.fr. [89.3.178.76]) by smtp.gmail.com with ESMTPSA id 14sm1629981wmv.36.2018.12.06.07.02.14 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Thu, 06 Dec 2018 07:02:15 -0800 (PST) From: David Abdurachmanov To: palmer@sifive.com, aou@eecs.berkeley.edu, keescook@chromium.org, luto@amacapital.net, wad@chromium.org, green.hu@gmail.com, deanbo422@gmail.com, linux-kernel@vger.kernel.org, linux-riscv@lists.infradead.org Cc: David Abdurachmanov Subject: [PATCH 2/2] riscv: fix syscall_{get,set}_arguments Date: Thu, 6 Dec 2018 16:01:56 +0100 Message-Id: <20181206150156.28210-3-david.abdurachmanov@gmail.com> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181206150156.28210-1-david.abdurachmanov@gmail.com> References: <20181206150156.28210-1-david.abdurachmanov@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Testing with libseccomp master branch revealed that testcases with filters on syscall arguments were failing due to wrong values. Seccomp uses syscall_get_argumentsi() to copy syscall arguments, and there is a bug in pointer arithmetics in memcpy() call. Two alternative implementation were tested: the one in this patch and another one based on while-break loop. Both delivered the same results. This implementation is also used in arm, arm64 and nds32 arches. Signed-off-by: David Abdurachmanov --- arch/riscv/include/asm/syscall.h | 42 ++++++++++++++++++++++++-------- 1 file changed, 32 insertions(+), 10 deletions(-) diff --git a/arch/riscv/include/asm/syscall.h b/arch/riscv/include/asm/syscall.h index bba3da6ef157..26ceb434a433 100644 --- a/arch/riscv/include/asm/syscall.h +++ b/arch/riscv/include/asm/syscall.h @@ -70,19 +70,32 @@ static inline void syscall_set_return_value(struct task_struct *task, regs->a0 = (long) error ?: val; } +#define SYSCALL_MAX_ARGS 6 + static inline void syscall_get_arguments(struct task_struct *task, struct pt_regs *regs, unsigned int i, unsigned int n, unsigned long *args) { - BUG_ON(i + n > 6); + if (n == 0) + return; + + if (i + n > SYSCALL_MAX_ARGS) { + unsigned long *args_bad = args + SYSCALL_MAX_ARGS - i; + unsigned int n_bad = n + i - SYSCALL_MAX_ARGS; + pr_warning("%s called with max args %d, handling only %d\n", + __func__, i + n, SYSCALL_MAX_ARGS); + memset(args_bad, 0, n_bad * sizeof(args[0])); + } + if (i == 0) { args[0] = regs->orig_a0; args++; i++; n--; } - memcpy(args, ®s->a1 + i * sizeof(regs->a1), n * sizeof(args[0])); + + memcpy(args, ®s->a0 + i, n * sizeof(args[0])); } static inline void syscall_set_arguments(struct task_struct *task, @@ -90,14 +103,23 @@ static inline void syscall_set_arguments(struct task_struct *task, unsigned int i, unsigned int n, const unsigned long *args) { - BUG_ON(i + n > 6); - if (i == 0) { - regs->orig_a0 = args[0]; - args++; - i++; - n--; - } - memcpy(®s->a1 + i * sizeof(regs->a1), args, n * sizeof(regs->a0)); + if (n == 0) + return; + + if (i + n > SYSCALL_MAX_ARGS) { + pr_warning("%s called with max args %d, handling only %d\n", + __func__, i + n, SYSCALL_MAX_ARGS); + n = SYSCALL_MAX_ARGS - i; + } + + if (i == 0) { + regs->orig_a0 = args[0]; + args++; + i++; + n--; + } + + memcpy(®s->a0 + i, args, n * sizeof(args[0])); } static inline int syscall_get_arch(void) -- 2.19.2