Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp5939122ybi; Wed, 12 Jun 2019 11:03:31 -0700 (PDT) X-Google-Smtp-Source: APXvYqwpjpcy8MyD2m/iaeXU7Fj9LtzFwMaIF77DYuqz0b1Wk79AvX3ri02U2aH51ezIfDaa1sx9 X-Received: by 2002:a65:668e:: with SMTP id b14mr22124660pgw.407.1560362611201; Wed, 12 Jun 2019 11:03:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1560362611; cv=none; d=google.com; s=arc-20160816; b=FzJ/3XvtRMwy3MbaLDqfH01d3/geTe2awBGLFBjyK8sMJhCgn2dnG2ruH1MSAAtj7K /Mf6cnuRZ6YoLXXcM9/d/f8H6V4RBqxKpANIq+ErvmxLu+vOlX5p9ye71rYLDgqlwxBY ua0Elg82CPIGue+/SinmnP167k1VQyKujj1led+hOLHmq64DxV+2neQzGnivRGvhpZjE B8rIYWyKolfTqtVCORflZrrzYm0o6vEAUth7cVFtxbbK0e7dCiktpyb+z5WZETbMoCRb M8Klb76l+++T89CNWLkalktwEZlVVfXtdzgjDxzbDYZjqwwI7igNtN8uo8MimqCIl9W7 fNOQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=QUclQzbR/gE703+0j0Dltao83T2ZQMnOXnwwPZMnVdc=; b=zbOmB4zjI5ee0H2m1HtDVAvZgObQw+gk55NU+h04lYPHyDaFqrsjGq8I7up8FUdNZJ +1D+8ZLLTSwyrfDek5ifsJYzhUHBG7RTeCzMmqgY03H4GfsFFzHRq2hp067c4HL8HdLT k0PItC/RU4yoNFB9Dcx8yUl0NsVCEbZ9xS136GeK9ast4nY2Xzs91/0Ti42QRJ1ncVyn KD2NWU2IrDwcwYBcJXT7Bt0mYp2PiyEVDsMxdzW1KAK3bBWU3xTZPlD8JaIGDCVRPEq6 JprPJ8VhJe2hzXBYK3PZGM55/eTWoKaKWZvSUDtYisuuPOvL6LPs6XJy7+BE5HZ/zojv oLXA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f1si405205pgi.432.2019.06.12.11.03.16; Wed, 12 Jun 2019 11:03:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2437861AbfFLOkX (ORCPT + 99 others); Wed, 12 Jun 2019 10:40:23 -0400 Received: from foss.arm.com ([217.140.110.172]:54772 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727626AbfFLOkX (ORCPT ); Wed, 12 Jun 2019 10:40:23 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 373762B; Wed, 12 Jun 2019 07:40:22 -0700 (PDT) Received: from [10.1.196.72] (e119884-lin.cambridge.arm.com [10.1.196.72]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 9DE913F557; Wed, 12 Jun 2019 07:40:17 -0700 (PDT) Subject: Re: [PATCH v17 08/15] userfaultfd, arm64: untag user pointers To: Andrey Konovalov , linux-arm-kernel@lists.infradead.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, amd-gfx@lists.freedesktop.org, dri-devel@lists.freedesktop.org, linux-rdma@vger.kernel.org, linux-media@vger.kernel.org, kvm@vger.kernel.org, linux-kselftest@vger.kernel.org Cc: Catalin Marinas , Will Deacon , Mark Rutland , Andrew Morton , Greg Kroah-Hartman , Kees Cook , Yishai Hadas , Felix Kuehling , Alexander Deucher , Christian Koenig , Mauro Carvalho Chehab , Jens Wiklander , Alex Williamson , Leon Romanovsky , Luc Van Oostenryck , Dave Martin , Khalid Aziz , enh , Jason Gunthorpe , Christoph Hellwig , Dmitry Vyukov , Kostya Serebryany , Evgeniy Stepanov , Lee Smith , Ramana Radhakrishnan , Jacob Bramley , Ruben Ayrapetyan , Robin Murphy , Kevin Brodsky , Szabolcs Nagy References: From: Vincenzo Frascino Message-ID: <48893efc-039a-f7e8-19f0-1bd7b188b2c1@arm.com> Date: Wed, 12 Jun 2019 15:40:16 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 12/06/2019 12:43, Andrey Konovalov wrote: > This patch is a part of a series that extends arm64 kernel ABI to allow to > pass tagged user pointers (with the top byte set to something else other > than 0x00) as syscall arguments. > > userfaultfd code use provided user pointers for vma lookups, which can > only by done with untagged pointers. > > Untag user pointers in validate_range(). > > Reviewed-by: Catalin Marinas > Reviewed-by: Kees Cook > Signed-off-by: Andrey Konovalov Reviewed-by: Vincenzo Frascino > --- > fs/userfaultfd.c | 22 ++++++++++++---------- > 1 file changed, 12 insertions(+), 10 deletions(-) > > diff --git a/fs/userfaultfd.c b/fs/userfaultfd.c > index 3b30301c90ec..24d68c3b5ee2 100644 > --- a/fs/userfaultfd.c > +++ b/fs/userfaultfd.c > @@ -1263,21 +1263,23 @@ static __always_inline void wake_userfault(struct userfaultfd_ctx *ctx, > } > > static __always_inline int validate_range(struct mm_struct *mm, > - __u64 start, __u64 len) > + __u64 *start, __u64 len) > { > __u64 task_size = mm->task_size; > > - if (start & ~PAGE_MASK) > + *start = untagged_addr(*start); > + > + if (*start & ~PAGE_MASK) > return -EINVAL; > if (len & ~PAGE_MASK) > return -EINVAL; > if (!len) > return -EINVAL; > - if (start < mmap_min_addr) > + if (*start < mmap_min_addr) > return -EINVAL; > - if (start >= task_size) > + if (*start >= task_size) > return -EINVAL; > - if (len > task_size - start) > + if (len > task_size - *start) > return -EINVAL; > return 0; > } > @@ -1327,7 +1329,7 @@ static int userfaultfd_register(struct userfaultfd_ctx *ctx, > goto out; > } > > - ret = validate_range(mm, uffdio_register.range.start, > + ret = validate_range(mm, &uffdio_register.range.start, > uffdio_register.range.len); > if (ret) > goto out; > @@ -1516,7 +1518,7 @@ static int userfaultfd_unregister(struct userfaultfd_ctx *ctx, > if (copy_from_user(&uffdio_unregister, buf, sizeof(uffdio_unregister))) > goto out; > > - ret = validate_range(mm, uffdio_unregister.start, > + ret = validate_range(mm, &uffdio_unregister.start, > uffdio_unregister.len); > if (ret) > goto out; > @@ -1667,7 +1669,7 @@ static int userfaultfd_wake(struct userfaultfd_ctx *ctx, > if (copy_from_user(&uffdio_wake, buf, sizeof(uffdio_wake))) > goto out; > > - ret = validate_range(ctx->mm, uffdio_wake.start, uffdio_wake.len); > + ret = validate_range(ctx->mm, &uffdio_wake.start, uffdio_wake.len); > if (ret) > goto out; > > @@ -1707,7 +1709,7 @@ static int userfaultfd_copy(struct userfaultfd_ctx *ctx, > sizeof(uffdio_copy)-sizeof(__s64))) > goto out; > > - ret = validate_range(ctx->mm, uffdio_copy.dst, uffdio_copy.len); > + ret = validate_range(ctx->mm, &uffdio_copy.dst, uffdio_copy.len); > if (ret) > goto out; > /* > @@ -1763,7 +1765,7 @@ static int userfaultfd_zeropage(struct userfaultfd_ctx *ctx, > sizeof(uffdio_zeropage)-sizeof(__s64))) > goto out; > > - ret = validate_range(ctx->mm, uffdio_zeropage.range.start, > + ret = validate_range(ctx->mm, &uffdio_zeropage.range.start, > uffdio_zeropage.range.len); > if (ret) > goto out; > -- Regards, Vincenzo