Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp3846339ybl; Tue, 21 Jan 2020 08:07:15 -0800 (PST) X-Google-Smtp-Source: APXvYqwqmkS4GUOqyhjOeHlWfOhQfhM/V0w2ohHFMXJuuaRca+lI4NcoSEmczlZvggd0irt5MwN6 X-Received: by 2002:a9d:4e92:: with SMTP id v18mr3967477otk.47.1579622835119; Tue, 21 Jan 2020 08:07:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579622835; cv=none; d=google.com; s=arc-20160816; b=bp/2VxLbUp0l7VV/jEv6mH2rNkMkl7bOPmno8glkAdDqhWs3+qe43IF3hc/IM8ej0N uOHT7eFLZg+MB4FqXVjbHxzdMC1Pwt4j/9pWDxC5PYtoAzxc/CshhWVFM3L9AnqC0+P+ gY1qZDLhmZv2HhSci2Syv6iap4KEeHDguuSpeCY5iOP8yp0aB0IvKufCtRS7Ccaf7rVK k9Q5THXnWnhTG7I0jgkUlVWaV3KP8KT30MmxI54QwsQ2lqympUA3Gg0rXRfOhgq8lpGy e9oL3aVxVikC1SEKEw41gKi74hB1AoUp0MCEEVbjshy1zwtZuzidWVaQ0W+U7WBMV3CX Wxyg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:from:subject:references :mime-version:message-id:in-reply-to:date:dkim-signature; bh=rQnN5kw1tCui7wtVtPb4liBxMrcaouM2L/Dj3ZF7x/U=; b=ZkX9W0FQ1RqdizWB/WuvV0Q9BSm5sXJYULERBKhd+P94CEnvOiWj6lFnxs7ZHeNaZI kzF0Og3WSIur8EE90E3DVSrvkKslESb/wFXIHt6HDj5xx2aL60U/nfcP4CvzgeWX+POM RPZDph31WkfGDOB3RmvhmeYb/XxbyWok47oy7w2XQdTu16ijwDLIh5JkztpB0pBXBKye qeMvViaBSmmn7gWzMkNuRm2WYcTU0nsMCkEd8YRdfaHvdzauofnuy9pHoXHxqQcOxkv6 Oldyfkffbua3rBDxP2Hjx8+w8B6cY8bShb7112p1SNYqNVcVu9kWnuoi1DFtYhqP2ZsW UFRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=vEveYDGl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m85si19826596oig.158.2020.01.21.08.07.03; Tue, 21 Jan 2020 08:07:15 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=vEveYDGl; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729583AbgAUQFk (ORCPT + 99 others); Tue, 21 Jan 2020 11:05:40 -0500 Received: from mail-wm1-f73.google.com ([209.85.128.73]:36899 "EHLO mail-wm1-f73.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727817AbgAUQFk (ORCPT ); Tue, 21 Jan 2020 11:05:40 -0500 Received: by mail-wm1-f73.google.com with SMTP id t4so800924wmf.2 for ; Tue, 21 Jan 2020 08:05:39 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=rQnN5kw1tCui7wtVtPb4liBxMrcaouM2L/Dj3ZF7x/U=; b=vEveYDGlq4RapLlWOaserIRgSK9CDsyfKU3vmnx8XdRv89p7akoY0T/V3FT18RGMDw OnIRpz8GZABv+03aNv6SYWdpma0cOtw9nwvYssWK3KfbfLDiVatxE0ZU6mONsyJ2gVsi uUph1vinxudveUkuNN+jZVXoh30xw79QZx/d492IQ/ZJsFu58ixFWPEECOIRa11zW598 4k41E4HwH4oJuUbSy/y9Vzf1ZfTjNMvyp9/8EXNCZcZ3zUHKkQro+p+EUuLpGaaGn5t3 bL84bLB/URIi83z+l9RZ5xR4S1qwN1Cfzc9oVp+rnNjvEL2wQ4NlOUKRJ+AqA2/tiu9+ 5rMQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=rQnN5kw1tCui7wtVtPb4liBxMrcaouM2L/Dj3ZF7x/U=; b=BCN6u3c8Z/9muwqQho04zkcEOKXJcIbmGHxvRttBOQqcogVYlfDTHzD0CMv0ljZOGx 4iCBskvtjbpTvQ1yPs4pU5+bp/DIZPNIFqeTRvvRXiDBEXKSZnfRsXXAfIC6aGuEMmQr Jmv7wRQIzXKZi0+FEm3eO5/iYcE1S//bULCCZH26DtUYBXoPlzIUARHrombxM1eJMY7o v6ljUdjd1Hi1gJG/HklZHHSQuBydnYM+fjsIVgVvq22pCxUDqCc8vuIve1uUAWvwJFLu BnLRl/+D7IO4YB3nsZ94qlG+MwZkEgjc+2lw4afTcSTY7nRZwy6+Lc9jA5h7BhVI9gF8 1t1w== X-Gm-Message-State: APjAAAUrxHtGWJ8iOYh/AHRk9BbtbiOU4xQQ8aArMvQnhdAVAbgOH36I oybP8usVJAQfm6/5gpxqlEVHbAIKsg== X-Received: by 2002:a05:6000:50:: with SMTP id k16mr5659732wrx.145.1579622738696; Tue, 21 Jan 2020 08:05:38 -0800 (PST) Date: Tue, 21 Jan 2020 17:05:12 +0100 In-Reply-To: <20200121160512.70887-1-elver@google.com> Message-Id: <20200121160512.70887-5-elver@google.com> Mime-Version: 1.0 References: <20200121160512.70887-1-elver@google.com> X-Mailer: git-send-email 2.25.0.341.g760bfbb309-goog Subject: [PATCH v2 5/5] copy_to_user, copy_from_user: Use generic instrumented.h From: Marco Elver To: elver@google.com Cc: paulmck@kernel.org, andreyknvl@google.com, glider@google.com, dvyukov@google.com, kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, mark.rutland@arm.com, will@kernel.org, peterz@infradead.org, boqun.feng@gmail.com, arnd@arndb.de, viro@zeniv.linux.org.uk, dja@axtens.net, christophe.leroy@c-s.fr, mpe@ellerman.id.au, mhiramat@kernel.org, rostedt@goodmis.org, mingo@kernel.org, christian.brauner@ubuntu.com, daniel@iogearbox.net, keescook@chromium.org, cyphar@cyphar.com, linux-arch@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This replaces the KASAN instrumentation with generic instrumentation, implicitly adding KCSAN instrumentation support. For KASAN no functional change is intended. Suggested-by: Arnd Bergmann Signed-off-by: Marco Elver --- v2: * Use updated instrumented.h, removing post-hooks for user-copies. --- include/linux/uaccess.h | 14 +++++++------- lib/usercopy.c | 7 ++++--- 2 files changed, 11 insertions(+), 10 deletions(-) diff --git a/include/linux/uaccess.h b/include/linux/uaccess.h index 67f016010aad..8a215c5c1aed 100644 --- a/include/linux/uaccess.h +++ b/include/linux/uaccess.h @@ -2,9 +2,9 @@ #ifndef __LINUX_UACCESS_H__ #define __LINUX_UACCESS_H__ +#include #include #include -#include #define uaccess_kernel() segment_eq(get_fs(), KERNEL_DS) @@ -58,7 +58,7 @@ static __always_inline __must_check unsigned long __copy_from_user_inatomic(void *to, const void __user *from, unsigned long n) { - kasan_check_write(to, n); + instrument_copy_from_user(to, from, n); check_object_size(to, n, false); return raw_copy_from_user(to, from, n); } @@ -67,7 +67,7 @@ static __always_inline __must_check unsigned long __copy_from_user(void *to, const void __user *from, unsigned long n) { might_fault(); - kasan_check_write(to, n); + instrument_copy_from_user(to, from, n); check_object_size(to, n, false); return raw_copy_from_user(to, from, n); } @@ -88,7 +88,7 @@ __copy_from_user(void *to, const void __user *from, unsigned long n) static __always_inline __must_check unsigned long __copy_to_user_inatomic(void __user *to, const void *from, unsigned long n) { - kasan_check_read(from, n); + instrument_copy_to_user(to, from, n); check_object_size(from, n, true); return raw_copy_to_user(to, from, n); } @@ -97,7 +97,7 @@ static __always_inline __must_check unsigned long __copy_to_user(void __user *to, const void *from, unsigned long n) { might_fault(); - kasan_check_read(from, n); + instrument_copy_to_user(to, from, n); check_object_size(from, n, true); return raw_copy_to_user(to, from, n); } @@ -109,7 +109,7 @@ _copy_from_user(void *to, const void __user *from, unsigned long n) unsigned long res = n; might_fault(); if (likely(access_ok(from, n))) { - kasan_check_write(to, n); + instrument_copy_from_user(to, from, n); res = raw_copy_from_user(to, from, n); } if (unlikely(res)) @@ -127,7 +127,7 @@ _copy_to_user(void __user *to, const void *from, unsigned long n) { might_fault(); if (access_ok(to, n)) { - kasan_check_read(from, n); + instrument_copy_to_user(to, from, n); n = raw_copy_to_user(to, from, n); } return n; diff --git a/lib/usercopy.c b/lib/usercopy.c index cbb4d9ec00f2..4bb1c5e7a3eb 100644 --- a/lib/usercopy.c +++ b/lib/usercopy.c @@ -1,6 +1,7 @@ // SPDX-License-Identifier: GPL-2.0 -#include #include +#include +#include /* out-of-line parts */ @@ -10,7 +11,7 @@ unsigned long _copy_from_user(void *to, const void __user *from, unsigned long n unsigned long res = n; might_fault(); if (likely(access_ok(from, n))) { - kasan_check_write(to, n); + instrument_copy_from_user(to, from, n); res = raw_copy_from_user(to, from, n); } if (unlikely(res)) @@ -25,7 +26,7 @@ unsigned long _copy_to_user(void __user *to, const void *from, unsigned long n) { might_fault(); if (likely(access_ok(to, n))) { - kasan_check_read(from, n); + instrument_copy_to_user(to, from, n); n = raw_copy_to_user(to, from, n); } return n; -- 2.25.0.341.g760bfbb309-goog