Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp47050pxy; Wed, 21 Apr 2021 18:04:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwZd1agCqXPeiY6/5ONNt2ztITLQkMbAHnAETN1ckBkwDmSLHi2NWHfkzrC49o2GFF2BmkM X-Received: by 2002:a17:902:8308:b029:e9:d69:a2f with SMTP id bd8-20020a1709028308b02900e90d690a2fmr997135plb.20.1619053498133; Wed, 21 Apr 2021 18:04:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619053498; cv=none; d=google.com; s=arc-20160816; b=mTorY1Ul2Ri8PEWVkWzcTWqZ8AHXDEVFdsmGha+zCEqpQ0MH3kUXvSGe1WjcYtBUvZ YZME/yyJvKWOQ5nTPvGqgeky3HQ9C82bq1G0Uqjdp4TrrVUThe8Q7p22T2MELcQ+xqc8 ueorYySoP45sVeM8bu6Z5UAaHXFyHRFmORsx8ZCh9LHl6CtygvPTUb8+ncNaRA0Ochz6 6IgeZKXWxnhSM48xm4jVlgUUK/z0CVV0RjDZ2jIjhdpIS4jfVa+5j9M6ltIxj7SwAgZt nxf0h1sLg10fwE4zboMqZNGR6rAutEOqvE17Hbx04JmCNcvflOdyVCfgQJFbLxtAf6Hk nMgA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=oZ26Qn3geL2r0Hef3GeZBPIzKw/I3KeVowmSufr0R2g=; b=ORq8O3JkWH9pYdsG97QMjYiIWa82whgzWgDmxUbZXaEedI4SdhyDUcgXRJqb+Nqr2N uwN4QuGQUQzOdj6f4kF0T54SmsfN8CumkabdumG7v6X8X6QfVy/GFfg+IaMXd2ihKq+s rPSwPCmD+C10i8X8ZRzRHh4rFUyb+h+MviPWgQUMuPcdso6bmxuKVDAGg0c+3RbnWhKb vXNBJIcnvS1Q3gPxYskDvXN2Vb/eVmFXkX5xJ9vLPN4Z1pURvMFiyU26ETW/DB6scQdK 7l4ZUjifrdySjGxkN7H65A64iYvfkHwca3o4wtAPEl/1EbDF9DClzm+9KWAGw4jAepdl Uvxw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o2si1041243plg.401.2021.04.21.18.04.44; Wed, 21 Apr 2021 18:04:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S244612AbhDURK7 (ORCPT + 99 others); Wed, 21 Apr 2021 13:10:59 -0400 Received: from foss.arm.com ([217.140.110.172]:38296 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237858AbhDURKv (ORCPT ); Wed, 21 Apr 2021 13:10:51 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 0047E11FB; Wed, 21 Apr 2021 10:10:16 -0700 (PDT) Received: from C02TD0UTHF1T.local (unknown [10.57.3.41]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 7BC1C3F694; Wed, 21 Apr 2021 10:10:14 -0700 (PDT) Date: Wed, 21 Apr 2021 18:10:05 +0100 From: Mark Rutland To: Will Deacon Cc: Catalin Marinas , He Zhe , oleg@redhat.com, linux-arm-kernel@lists.infradead.org, paul@paul-moore.com, eparis@redhat.com, linux-audit@redhat.com, linux-kernel@vger.kernel.org Subject: Re: [PATCH 1/3] arm64: ptrace: Add is_syscall_success to handle compat Message-ID: <20210421171005.GA46949@C02TD0UTHF1T.local> References: <20210416075533.7720-1-zhe.he@windriver.com> <20210416123322.GA23184@arm.com> <20210416133431.GA2303@C02TD0UTHF1T.local> <20210419121932.GA30004@willie-the-truck> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210419121932.GA30004@willie-the-truck> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Apr 19, 2021 at 01:19:33PM +0100, Will Deacon wrote: > On Fri, Apr 16, 2021 at 02:34:41PM +0100, Mark Rutland wrote: > > I think this is a problem we created for ourselves back in commit: > > > > 15956689a0e60aa0 ("arm64: compat: Ensure upper 32 bits of x0 are zero on syscall return) > > > > AFAICT, the perf regs samples are the only place this matters, since for > > ptrace the compat regs are implicitly truncated to compat_ulong_t, and > > audit expects the non-truncated return value. Other architectures don't > > truncate here, so I think we're setting ourselves up for a game of > > whack-a-mole to truncate and extend wherever we need to. > > > > Given that, I suspect it'd be better to do something like the below. > > > > Will, thoughts? > > I think perf is one example, but this is also visible to userspace via the > native ptrace interface and I distinctly remember needing this for some > versions of arm64 strace to work correctly when tracing compat tasks. FWIW, you've convinced me on your approach (more on that below), but when I went digging here this didn't seem to be exposed via ptrace -- for any task tracing a compat task, the GPRs are exposed via compat_gpr_{get,set}(), which always truncate to compat_ulong_t, giving the lower 32 bits. See task_user_regset_view() for where we get the regset. Am I missing something, or are you thinking of another issue you fixed at the same time? > So I do think that clearing the upper bits on the return path is the right > approach, but it sounds like we need some more work to handle syscall(-1) > and audit (what exactly is the problem here after these patches have been > applied?) From digging a bit more, I think I agree, and I think these patches are sufficient for audit. I have some comments I'll leave separately. The remaining issues are wherever we assign a signed value to a compat GPR without explicit truncation. That'll leak via perf sampling the user regs, but I haven't managed to convince myself whether that causes any functional change in behaviour for audit, seccomp, or syscall tracing. Since we mostly use compat_ulong_t for intermediate values in compat code, it does look like this is only an issue for x0 where we assign an error value, e.g. the -ENOSYS case in el0_svc_common. I'll go see if I can find any more. With those fixed up we can remove the x0 truncation from entry.S, which'd be nice too. Thanks, Mark.