Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp2550919pxk; Sun, 20 Sep 2020 08:06:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx9dhoR21TH/+VOAIG8p1cCHBGxgHyLJX0MdYr3SEVJvJcrMjr4s3ipBZmAJl96JNjly0B6 X-Received: by 2002:a17:906:af42:: with SMTP id ly2mr43431159ejb.362.1600614409399; Sun, 20 Sep 2020 08:06:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600614409; cv=none; d=google.com; s=arc-20160816; b=aSs8iKkbGCJBMU1vml30GCG2TubdVf0E/Nvifu9FZxjbSY3BmathKMe5oIuO5vT745 jTfPzgDQVuUEgDC+1sfmj6u+5+v71Q9kZ7RZ6uQroA1wOJGDTDKTRmmUQxkSmmyghzjT mzJ6zfoH1Sl3oYJ5x+Puiac4SF4V6M2jTlDeYFep0YyUVKMVfsszAMz+CiBeXtu9t7mh ycnNOZYX2O0EMj27kYH6zmUXTdFFJIHPxEK6rjZpQEfsP02FD0hExqICMIixO5HogLfH 7Jj7b4xxw906KolSuzRcbBvUUehta986T3DPineSPbC/5cfTpALIIrMWrdB4OclBlCTg h1jQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=cDTcXrrOnG0rExczdk51fZLKZaMZ37n6TSLEvJjJvyE=; b=yyYm4cJcsCQ1KIzCqXYAtXlPyP2oDxmHw0K+MhgMd3QTfGUphxYfY07y30WpYHxeh1 YcBJXnYyDU3DFPFb8fE1cuzUoE6uwAUV1BsK95hgos7je4hu0J8Xis4JqK0ACYqZ3ygy NzL+XhM8WufsvpyYIzRC51qr/4Y18RBB/aPq5lEGac+IhYNjUizUL5llYoJpqjI4ytVC dQjDQiUVaHa5JioB1HAiA5AlTRVXBa/pyYkPoEUjQzP+kmO9x4zdIk1d8IFACyLk8hHP FhldUIE9o58MWIn7/Ap0jU7U4S37mECP7egwfvrzqr6bR6mf7T/H6mEiYsiuKA4guE1c WxEA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p3si6263086edx.219.2020.09.20.08.06.26; Sun, 20 Sep 2020 08:06:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726406AbgITPC7 (ORCPT + 99 others); Sun, 20 Sep 2020 11:02:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51552 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726267AbgITPC6 (ORCPT ); Sun, 20 Sep 2020 11:02:58 -0400 Received: from ZenIV.linux.org.uk (zeniv.linux.org.uk [IPv6:2002:c35c:fd02::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 77085C061755; Sun, 20 Sep 2020 08:02:58 -0700 (PDT) Received: from viro by ZenIV.linux.org.uk with local (Exim 4.92.3 #3 (Red Hat Linux)) id 1kK0rT-002VoG-Vd; Sun, 20 Sep 2020 15:02:44 +0000 Date: Sun, 20 Sep 2020 16:02:43 +0100 From: Al Viro To: Arnd Bergmann Cc: Christoph Hellwig , Andrew Morton , Jens Axboe , David Howells , Linux ARM , the arch/x86 maintainers , "linux-kernel@vger.kernel.org" , "open list:BROADCOM NVRAM DRIVER" , Parisc List , linuxppc-dev , linux-s390 , sparclinux , linux-block , linux-scsi , Linux FS-devel Mailing List , linux-aio , io-uring@vger.kernel.org, linux-arch , Linux-MM , Networking , keyrings@vger.kernel.org, LSM List Subject: Re: [PATCH 1/9] kernel: add a PF_FORCE_COMPAT flag Message-ID: <20200920150243.GM3421308@ZenIV.linux.org.uk> References: <20200918124533.3487701-1-hch@lst.de> <20200918124533.3487701-2-hch@lst.de> <20200918134012.GY3421308@ZenIV.linux.org.uk> <20200918134406.GA17064@lst.de> <20200918135822.GZ3421308@ZenIV.linux.org.uk> <20200918151615.GA23432@lst.de> <20200919220920.GI3421308@ZenIV.linux.org.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: Al Viro Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Sep 20, 2020 at 03:55:47PM +0200, Arnd Bergmann wrote: > On Sun, Sep 20, 2020 at 12:09 AM Al Viro wrote: > > On Fri, Sep 18, 2020 at 05:16:15PM +0200, Christoph Hellwig wrote: > > > On Fri, Sep 18, 2020 at 02:58:22PM +0100, Al Viro wrote: > > > > Said that, why not provide a variant that would take an explicit > > > > "is it compat" argument and use it there? And have the normal > > > > one pass in_compat_syscall() to that... > > > > > > That would help to not introduce a regression with this series yes. > > > But it wouldn't fix existing bugs when io_uring is used to access > > > read or write methods that use in_compat_syscall(). One example that > > > I recently ran into is drivers/scsi/sg.c. > > > > So screw such read/write methods - don't use them with io_uring. > > That, BTW, is one of the reasons I'm sceptical about burying the > > decisions deep into the callchain - we don't _want_ different > > data layouts on read/write depending upon the 32bit vs. 64bit > > caller, let alone the pointer-chasing garbage that is /dev/sg. > > Would it be too late to limit what kind of file descriptors we allow > io_uring to read/write on? > > If io_uring can get changed to return -EINVAL on trying to > read/write something other than S_IFREG file descriptors, > that particular problem space gets a lot simpler, but this > is of course only possible if nobody actually relies on it yet. S_IFREG is almost certainly too heavy as a restriction. Looking through the stuff sensitive to 32bit/64bit, we seem to have * /dev/sg - pointer-chasing horror * sysfs files for efivar - different layouts for compat and native, shitty userland ABI design ( struct efi_variable { efi_char16_t VariableName[EFI_VAR_NAME_LEN/sizeof(efi_char16_t)]; efi_guid_t VendorGuid; unsigned long DataSize; __u8 Data[1024]; efi_status_t Status; __u32 Attributes; } __attribute__((packed)); ) is the piece of crap in question; 'DataSize' is where the headache comes from. Regular files, BTW... * uhid - character device, milder pointer-chasing horror. Trouble comes from this: /* Obsolete! Use UHID_CREATE2. */ struct uhid_create_req { __u8 name[128]; __u8 phys[64]; __u8 uniq[64]; __u8 __user *rd_data; __u16 rd_size; __u16 bus; __u32 vendor; __u32 product; __u32 version; __u32 country; } __attribute__((__packed__)); and suggested replacement doesn't do any pointer-chasing (rd_data is an embedded array in the end of struct uhid_create2_req). * evdev, uinput - bitness-sensitive layout, due to timestamps * /proc/bus/input/devices - weird crap with printing bitmap, different _text_ layouts seen by 32bit and 64bit readers. Binary structures are PITA, but with sufficient effort you can screw the text just as hard... Oh, and it's a regular file. * similar in sysfs analogue And AFAICS, that's it for read/write-related method instances.