Received: by 2002:a05:6a10:a841:0:0:0:0 with SMTP id d1csp630065pxy; Thu, 22 Apr 2021 09:44:28 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwvgPDCM/yVR+CiaLybE42aBRmfhiHZQAoymtUAFBM8BBFPzXqoj1myPS4z/dvpSbIqxoJP X-Received: by 2002:a17:907:2ccf:: with SMTP id hg15mr4330214ejc.219.1619109868568; Thu, 22 Apr 2021 09:44:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619109868; cv=none; d=google.com; s=arc-20160816; b=WpRwRgb2NW8HXO2b67R68S3RZ941o7CxgMlgGUWKkAVB9h2vQBcdnNINmBDC06LJPB 6Dr61lifofuqJcxnUozgppR5oXYpEjrQ4B7CIsFkRbQQsIGi20IBQF5L6ya2yEp2+gS8 dIQ/5REDGa7lCiPG8YcFV8xwP+YBBYBSuuwu9GADN82KfHFgYlZd3YstY7XxMOseZdbC 7ZPBCS20KvYRJZ1Ly5PlM76RgW2P5hnrIgboQ+XzLU36x3WmiRY4EK356iFZ4u+4z+qp tgOMgAEQGvEI/+WQ+JJWn7361S1M6kN+IkzSs+iDipw4TuuqWXEXg5VfhQOuXChMsxQB YA+g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=1I97ZvDUOMzOrn2xY6UY5CSeYPfOQO1cYrWPsN3Hg2c=; b=mMGpWDzefqO29cFD0gZJ+2GPmjj1zZKAp0INkfM8ZwgQEX1hqNuk1yEl6g5IUrd7qu +P94c6RoEyRnSpPbxgTmlHMIFav2ssdq0yhhVQ3xrPbpx+GaQqcsHzEm1F22ZLWo5gHq 4++7SunzYQ8nSXwnc1WPbDzAWXsWcVyTCwF5n2rZlo0TTEeB5W6wMk8gVYnJuJxPksO6 MjkUeJkLQ1cJEJ4/I+OK2NR0Al/e8PprzkBb3c5CIoiGyCfmvqG+HO94AiolV3gt9DmW kf/O3h77WtQe7QusWKdPGkBozNmLbtR33oo+pNMklMMMe2yPCJCozCAWZjkhlnRqUXDt 9QHg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q24si2506899edw.500.2021.04.22.09.44.05; Thu, 22 Apr 2021 09:44:28 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236780AbhDVQnK (ORCPT + 99 others); Thu, 22 Apr 2021 12:43:10 -0400 Received: from foss.arm.com ([217.140.110.172]:53624 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236058AbhDVQnK (ORCPT ); Thu, 22 Apr 2021 12:43:10 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 63BC011D4; Thu, 22 Apr 2021 09:42:32 -0700 (PDT) Received: from C02TD0UTHF1T.local (unknown [10.57.22.241]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id D7E033F73B; Thu, 22 Apr 2021 09:42:30 -0700 (PDT) Date: Thu, 22 Apr 2021 17:42:28 +0100 From: Mark Rutland To: Will Deacon Cc: Catalin Marinas , He Zhe , oleg@redhat.com, linux-arm-kernel@lists.infradead.org, paul@paul-moore.com, eparis@redhat.com, linux-audit@redhat.com, linux-kernel@vger.kernel.org Subject: Re: [PATCH 1/3] arm64: ptrace: Add is_syscall_success to handle compat Message-ID: <20210422164228.GD66392@C02TD0UTHF1T.local> References: <20210416075533.7720-1-zhe.he@windriver.com> <20210416123322.GA23184@arm.com> <20210416133431.GA2303@C02TD0UTHF1T.local> <20210419121932.GA30004@willie-the-truck> <20210421171005.GA46949@C02TD0UTHF1T.local> <20210422160752.GA2214@willie-the-truck> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210422160752.GA2214@willie-the-truck> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 22, 2021 at 05:07:53PM +0100, Will Deacon wrote: > On Wed, Apr 21, 2021 at 06:10:05PM +0100, Mark Rutland wrote: > > On Mon, Apr 19, 2021 at 01:19:33PM +0100, Will Deacon wrote: > > > On Fri, Apr 16, 2021 at 02:34:41PM +0100, Mark Rutland wrote: > > > > I think this is a problem we created for ourselves back in commit: > > > > > > > > 15956689a0e60aa0 ("arm64: compat: Ensure upper 32 bits of x0 are zero on syscall return) > > > > > > > > AFAICT, the perf regs samples are the only place this matters, since for > > > > ptrace the compat regs are implicitly truncated to compat_ulong_t, and > > > > audit expects the non-truncated return value. Other architectures don't > > > > truncate here, so I think we're setting ourselves up for a game of > > > > whack-a-mole to truncate and extend wherever we need to. > > > > > > > > Given that, I suspect it'd be better to do something like the below. > > > > > > > > Will, thoughts? > > > > > > I think perf is one example, but this is also visible to userspace via the > > > native ptrace interface and I distinctly remember needing this for some > > > versions of arm64 strace to work correctly when tracing compat tasks. > > > > FWIW, you've convinced me on your approach (more on that below), but > > when I went digging here this didn't seem to be exposed via ptrace -- > > for any task tracing a compat task, the GPRs are exposed via > > compat_gpr_{get,set}(), which always truncate to compat_ulong_t, giving > > the lower 32 bits. See task_user_regset_view() for where we get the > > regset. > > > > Am I missing something, or are you thinking of another issue you fixed > > at the same time? > > I think it may depend on whether strace pokes at the GPRs or instead issues > a PTRACE_GET_SYSCALL_INFO request but I've forgotten the details, > unfortunately. I do remember seeing an issue though, and it was only last > year. Ah; I hadn't spotted PTRACE_GET_SYSCALL_INFO, thanks for the pointer. I see that gets at the regs via syscall_get_arguments(), which doesn't truncate them. That makes me wonder whether x86 and others do the right thing here... > > > So I do think that clearing the upper bits on the return path is the right > > > approach, but it sounds like we need some more work to handle syscall(-1) > > > and audit (what exactly is the problem here after these patches have been > > > applied?) > > > > From digging a bit more, I think I agree, and I think these patches are > > sufficient for audit. I have some comments I'll leave separately. > > > > The remaining issues are wherever we assign a signed value to a compat > > GPR without explicit truncation. That'll leak via perf sampling the user > > regs, but I haven't managed to convince myself whether that causes any > > functional change in behaviour for audit, seccomp, or syscall tracing. > > > > Since we mostly use compat_ulong_t for intermediate values in compat > > code, it does look like this is only an issue for x0 where we assign an > > error value, e.g. the -ENOSYS case in el0_svc_common. I'll go see if I > > can find any more. > > > > With those fixed up we can remove the x0 truncation from entry.S, > > which'd be nice too. > > If we remove that then we should probably have a (debug?) check on the > return-to-user path just to make sure. I've hacked that up locally; I'd certainly like to run that along with some other sanity checks (e.g. PSTATE) while fuzzing, but agree that's probably not something to enable in any defconfig build. I'm happy to add that later as and when I remove the bit from entry.S. Thanks, Mark.