Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp387330ybe; Fri, 6 Sep 2019 00:44:21 -0700 (PDT) X-Google-Smtp-Source: APXvYqxjr8gh351BrND5JS5JDOElq6Zf+TyHvrgFRcl+Vxhzxj6zL2MLCpwCwHQEB5M6Tpg2XF7Y X-Received: by 2002:a17:902:142:: with SMTP id 60mr7922883plb.155.1567755861707; Fri, 06 Sep 2019 00:44:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567755861; cv=none; d=google.com; s=arc-20160816; b=uBDD3kZQiap5PeMpSA3PnLwd0STk3GdGI3RjaYj0qCvMPrlWEVh1Ig3Da36gKQ5G+U fTcV9y+2NMr4Rven+ATauBioddDavlwhVVLmXjQ1uUHNwX/xuKGTuWCVxjzl4Hol5sgk O5VEdfSC0a8AH53WMt2Ip873xyUB0G99FNPmoNwRDT7QjdnexwhsYz4K2lb1/PEVvuKB bzL2NtpWdgOoSf7Kl/fiio4YJtfbkz+vrFgcUO8kQhhM/qCdFQon0jJFbMQO4l5HcIrr 675/cyvd3pOolhHbEyOngKfy6Fyk0o4zoZW+4/k+rtYh0L5xIRlT1M15dIIEKP46pEaC 49rA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=+c4KnP2GiFtKKtQDSqLYWxQ/uSpVI97surerhfrGxUg=; b=OC+qaOz6QBWD38I4Aeb9UGFVmOU4DX7wFi16BNzFWH7ltaeg6Ghg9VCdSHPWoKZuhR Y2JBq5849oTK7Xdk25vFEPIPa53Zyti3G49RThZyA26qLwl2o6t4SC5EDRxK7UT6mXw4 1H0+ZvC/Ht4Ju5jx70HU+AbGceFlu4Esf15HW7vRmRj+p43uYuMoj+6XJeK/Ekb2hOXJ xXxN0idAys4G0++eOGt/LBPplLuz9uMTLZD3ZkEzkJEfGkeOoIQMb5h/aoTaNyimaTfI Qoh7DSn6qSYY9RIAmePH3Aoo+oLYti/ss4U3i1mJ/CEBLEz453lNixrvubbs/PMZTk0U R4Fw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 1si4349320pjf.45.2019.09.06.00.44.06; Fri, 06 Sep 2019 00:44:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390142AbfIEWca (ORCPT + 99 others); Thu, 5 Sep 2019 18:32:30 -0400 Received: from zeniv.linux.org.uk ([195.92.253.2]:43054 "EHLO ZenIV.linux.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732639AbfIEWc2 (ORCPT ); Thu, 5 Sep 2019 18:32:28 -0400 Received: from viro by ZenIV.linux.org.uk with local (Exim 4.92.1 #3 (Red Hat Linux)) id 1i60I9-0001pN-0U; Thu, 05 Sep 2019 22:31:49 +0000 Date: Thu, 5 Sep 2019 23:31:48 +0100 From: Al Viro To: Aleksa Sarai Cc: Christian Brauner , Jeff Layton , "J. Bruce Fields" , Arnd Bergmann , David Howells , Shuah Khan , Shuah Khan , Ingo Molnar , Peter Zijlstra , Christian Brauner , Rasmus Villemoes , Eric Biederman , Andy Lutomirski , Andrew Morton , Alexei Starovoitov , Kees Cook , Jann Horn , Tycho Andersen , David Drysdale , Chanho Min , Oleg Nesterov , Alexander Shishkin , Jiri Olsa , Namhyung Kim , Aleksa Sarai , Linus Torvalds , containers@lists.linux-foundation.org, linux-alpha@vger.kernel.org, linux-api@vger.kernel.org, linux-arch@vger.kernel.org, linux-arm-kernel@lists.infradead.org, linux-fsdevel@vger.kernel.org, linux-ia64@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-m68k@lists.linux-m68k.org, linux-mips@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org, linux-xtensa@linux-xtensa.org, sparclinux@vger.kernel.org Subject: Re: [PATCH v12 01/12] lib: introduce copy_struct_{to,from}_user helpers Message-ID: <20190905223148.GS1131@ZenIV.linux.org.uk> References: <20190904201933.10736-1-cyphar@cyphar.com> <20190904201933.10736-2-cyphar@cyphar.com> <20190905180750.GQ1131@ZenIV.linux.org.uk> <20190905182303.7f6bxpa2enbgcegv@wittgenstein> <20190905182801.GR1131@ZenIV.linux.org.uk> <20190905195618.pwzgvuzadkfpznfz@yavin.dot.cyphar.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190905195618.pwzgvuzadkfpznfz@yavin.dot.cyphar.com> User-Agent: Mutt/1.12.0 (2019-05-25) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Sep 06, 2019 at 05:56:18AM +1000, Aleksa Sarai wrote: > On 2019-09-05, Al Viro wrote: > > On Thu, Sep 05, 2019 at 08:23:03PM +0200, Christian Brauner wrote: > > > > > Because every caller of that function right now has that limit set > > > anyway iirc. So we can either remove it from here and place it back for > > > the individual callers or leave it in the helper. > > > Also, I'm really asking, why not? Is it unreasonable to have an upper > > > bound on the size (for a long time probably) or are you disagreeing with > > > PAGE_SIZE being used? PAGE_SIZE limit is currently used by sched, perf, > > > bpf, and clone3 and in a few other places. > > > > For a primitive that can be safely used with any size (OK, any within > > the usual 2Gb limit)? Why push the random policy into the place where > > it doesn't belong? > > > > Seriously, what's the point? If they want to have a large chunk of > > userland memory zeroed or checked for non-zeroes - why would that > > be a problem? > > Thinking about it some more, there isn't really any r/w amplification -- > so there isn't much to gain by passing giant structs. Though, if we are > going to permit 2GB buffers, isn't that also an argument to use > memchr_inv()? :P I'm not sure I understand the last bit. If you look at what copy_from_user() does on misaligned source/destination, especially on architectures that really, really do not like unaligned access... Case in point: alpha (and it's not unusual in that respect). What it boils down to is copy bytes until the destination is aligned if source and destination are both aligned copy word by word else read word by word, storing the mix of two adjacent words copy the rest byte by byte The unpleasant case (to and from having different remainders modulo 8) is basically if (count >= 8) { u64 *aligned = (u64 *)(from & ~7); u64 *dest = (u64 *)to; int bitshift = (from & 7) * 8; u64 prev, next; prev = aligned[0]; do { next = aligned[1]; prev <<= bitshift; prev |= next >> (64 - bitshift); *dest++ = prev; aligned++; prev = next; from += 8; to += 8; count -= 8; } while (count >= 8); } Now, mix that with "... and do memchr_inv() on the copy to find if we'd copied any non-zeroes, nevermind where" and it starts looking really ridiculous. We should just read the fscking source, aligned down to word boundary and check each word being read. The first and the last ones - masked. All there is to it. On almost all architectures that'll work well enough; s390 might want something more elaborate (there even word-by-word copies are costly, but I'd suggest talking to them for details). Something like bool all_zeroes_user(const void __user *p, size_t count) would probably be a sane API...