Received: by 2002:ab2:6857:0:b0:1ef:ffd0:ce49 with SMTP id l23csp2608536lqp; Mon, 25 Mar 2024 04:24:58 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXVQF4fortU1MBkhnx7nYKcPi257GFg/EekifVm7LYEPg2Bkf3YvJ0zClZpr0KS8FP7JYsKh7IhMvD+D80trVJ1QOnUMsTJx8Ymcx5PXg== X-Google-Smtp-Source: AGHT+IFOCLBWeiLTKyNrnUuCWhNvDqgfK7i+9qjxIg1kdQVdGRYI0+smWYEJbtC1RQ4lqEeWWmdv X-Received: by 2002:a50:8a97:0:b0:569:a0ea:9f42 with SMTP id j23-20020a508a97000000b00569a0ea9f42mr3397021edj.41.1711365898179; Mon, 25 Mar 2024 04:24:58 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1711365898; cv=pass; d=google.com; s=arc-20160816; b=AERxUwGVGx3iT2UydPYRoSOt+dLdZok2Byypp6bEh4fLLgUhNdcUJH2gdxrgsr7A5b 6xbqj+TYhbxzg44dElmHcCToy1wUe/ZHgzvMubYQB/RSQwQRhTUe8JwPvIEPEYn3z4XF fj9gRD2KTfZaTZTNO+IeSZCxTo7qupGGLLnyLNkpUcgXEsRoVWSvtAbfvrnSgvQbLNuD uET3o1RV4tpPhni1VBV44Jkjtds6dM9D32ckXIAeTGQETHuc/y2vubaV5afjdOgfoway WWxah1EVzyCW3fql20rLxF7R3UF3qW4jN6TW6UjolgJJ83YIkz85kAu9kJzAkgf9ljFq awbg== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:in-reply-to:message-id :date:subject:cc:to:from:dkim-signature; bh=M4R03Rqjm25/s11+33wtSImAQnUjPHrf2tXbGSRG+RA=; fh=seOW+vzJ49Peu8YjT3FGMFB9hE2ve7buTc9Q7KVCfUY=; b=CpfpSvJrTM1CtxF3xHbLFBhPiWSkyKjAsWNmNpMkdT1vfm+hpaietCx1jiujrIfXYC YpQAvrrBc+mQO6CJBYDyPKPT8HPAmYPypR+KdJbyN2OuzHWf8b8Euet+FRWwocUjlAFY YsOulzD6cGwEw8F1b1M3i44ig7C7Wi7MHHPMyLpLRSUWS7hDnPldNQUBLMLd5ZSf5knA R2i1hDeje2PZbEjyqRcT4daNdvKEYK+JjUhsvlMt4UAv8jDWCukfEC0vFUbUQff5Nx11 DGoW74Qyn3nNQoDy5D0R8ukcfHxMLOpP7T2TEPaXN73u3HE6g55PDCvM0tRq9xsMG8+U Ly/Q==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=osaAX36B; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-115582-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-115582-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id f22-20020a056402195600b0056c13613baesi805887edz.644.2024.03.25.04.24.58 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 25 Mar 2024 04:24:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-115582-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=osaAX36B; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-115582-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-115582-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id BCB6E1F35875 for ; Mon, 25 Mar 2024 11:24:57 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 3478512D773; Mon, 25 Mar 2024 02:44:41 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="osaAX36B" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 49F2014BF94; Sun, 24 Mar 2024 22:58:56 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711321138; cv=none; b=Rjee3QGlIfIIRyF+Lu2zYNzGJOF52PbH1qH4sH69Mqz1ju3tXVkKEnyxN73mhHs6t5PChFo56zjbrMTc/YJ/9OrPTssbg0G+JZHDml0ZjmWcofpQ3KI/SW7urW2xffl8u6ey+KEE/v8lhnNcV1nDBNilKS7Q5eNqJhjpp7ekbJ0= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1711321138; c=relaxed/simple; bh=2XYdaDwIQxAFtp7bJ97Ze2DQ/dAGBHGTKD1mDsVG0ZU=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=rESeKXwWJz2/p7a4rEAdCBsKMbqVmB7yMEAjR8L5chIjEV/g4SrjYnB7wQnl4PTRP3PtH1iEW8wjXqkVR+TLxF2qwjxaIOq3RNuL1Tmz0pg3WU/19PzK2awFDN1sHkFXJUS+Lbq8WYg8UfEPEzjzcX9XAJiwm4XZ6NvxkkY50As= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=osaAX36B; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1AABDC43390; Sun, 24 Mar 2024 22:58:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1711321136; bh=2XYdaDwIQxAFtp7bJ97Ze2DQ/dAGBHGTKD1mDsVG0ZU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=osaAX36BfZMoEfo9RlXV2LlZ1rcGdx7iM9Rwc2NVJU90Y++RbzwgDlj7LoXNSYLP3 BARpc4+V143yf/4/ZRxS7jeRgv9Ww/iAkxKJnObmnEF5qLzwLBgyiKGbM2PQgjeEWL TZ79wZXZ01nq4UBjcuwUihebi5E2/qBG8FNcDx/Kp1a399q9YA3A+38zqLp7C7p5rP iCwhBEULi8SAW8DkNnLRxE9KOoIVDPkVAwIpN0blyj85ybzSWcjuB4XDoibidQjofa TRQt7XeUKdTYkb2bB2fOT6o1VJCnhhTiCrHQxq+LPvzku5+cOELpjcX2LwXN9A0Ge6 W71WRYsUxtQmQ== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Sami Tolvanen , Khem Raj , Palmer Dabbelt , Sasha Levin Subject: [PATCH 6.7 698/713] riscv: Fix syscall wrapper for >word-size arguments Date: Sun, 24 Mar 2024 18:47:04 -0400 Message-ID: <20240324224720.1345309-699-sashal@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240324224720.1345309-1-sashal@kernel.org> References: <20240324224720.1345309-1-sashal@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit From: Sami Tolvanen [ Upstream commit a9ad73295cc1e3af0253eee7d08943b2419444c4 ] The current syscall wrapper macros break 64-bit arguments on rv32 because they only guarantee the first N input registers are passed to syscalls that accept N arguments. According to the calling convention, values twice the word size reside in register pairs and as a result, syscall arguments don't always have a direct register mapping on rv32. Instead of using `__MAP(x,__SC_LONG,__VA_ARGS__)` to declare the type of the `__se(_compat)_sys_*` functions on rv32, change the function declarations to accept `ulong` arguments and alias them to the actual syscall implementations, similarly to the existing macros in include/linux/syscalls.h. This matches previous behavior and ensures registers are passed to syscalls as-is, no matter which argument types they expect. Fixes: 08d0ce30e0e4 ("riscv: Implement syscall wrappers") Reported-by: Khem Raj Signed-off-by: Sami Tolvanen Link: https://lore.kernel.org/r/20240311193143.2981310-2-samitolvanen@google.com Signed-off-by: Palmer Dabbelt Signed-off-by: Sasha Levin --- arch/riscv/include/asm/syscall_wrapper.h | 53 +++++++++++++++++------- 1 file changed, 39 insertions(+), 14 deletions(-) diff --git a/arch/riscv/include/asm/syscall_wrapper.h b/arch/riscv/include/asm/syscall_wrapper.h index eeec04b7dae67..980094c2e9761 100644 --- a/arch/riscv/include/asm/syscall_wrapper.h +++ b/arch/riscv/include/asm/syscall_wrapper.h @@ -12,25 +12,51 @@ asmlinkage long __riscv_sys_ni_syscall(const struct pt_regs *); -#define SC_RISCV_REGS_TO_ARGS(x, ...) \ - __MAP(x,__SC_ARGS \ - ,,regs->orig_a0,,regs->a1,,regs->a2 \ +#ifdef CONFIG_64BIT + +#define __SYSCALL_SE_DEFINEx(x, prefix, name, ...) \ + static long __se_##prefix##name(__MAP(x,__SC_LONG,__VA_ARGS__)); \ + static long __se_##prefix##name(__MAP(x,__SC_LONG,__VA_ARGS__)) + +#define SC_RISCV_REGS_TO_ARGS(x, ...) \ + __MAP(x,__SC_ARGS \ + ,,regs->orig_a0,,regs->a1,,regs->a2 \ ,,regs->a3,,regs->a4,,regs->a5,,regs->a6) +#else +/* + * Use type aliasing to ensure registers a0-a6 are correctly passed to the syscall + * implementation when >word-size arguments are used. + */ +#define __SYSCALL_SE_DEFINEx(x, prefix, name, ...) \ + __diag_push(); \ + __diag_ignore(GCC, 8, "-Wattribute-alias", \ + "Type aliasing is used to sanitize syscall arguments"); \ + static long __se_##prefix##name(ulong, ulong, ulong, ulong, ulong, ulong, \ + ulong) \ + __attribute__((alias(__stringify(___se_##prefix##name)))); \ + __diag_pop(); \ + static long noinline ___se_##prefix##name(__MAP(x,__SC_LONG,__VA_ARGS__)); \ + static long ___se_##prefix##name(__MAP(x,__SC_LONG,__VA_ARGS__)) + +#define SC_RISCV_REGS_TO_ARGS(x, ...) \ + regs->orig_a0,regs->a1,regs->a2,regs->a3,regs->a4,regs->a5,regs->a6 + +#endif /* CONFIG_64BIT */ + #ifdef CONFIG_COMPAT #define COMPAT_SYSCALL_DEFINEx(x, name, ...) \ asmlinkage long __riscv_compat_sys##name(const struct pt_regs *regs); \ ALLOW_ERROR_INJECTION(__riscv_compat_sys##name, ERRNO); \ - static long __se_compat_sys##name(__MAP(x,__SC_LONG,__VA_ARGS__)); \ static inline long __do_compat_sys##name(__MAP(x,__SC_DECL,__VA_ARGS__)); \ - asmlinkage long __riscv_compat_sys##name(const struct pt_regs *regs) \ + __SYSCALL_SE_DEFINEx(x, compat_sys, name, __VA_ARGS__) \ { \ - return __se_compat_sys##name(SC_RISCV_REGS_TO_ARGS(x,__VA_ARGS__)); \ + return __do_compat_sys##name(__MAP(x,__SC_DELOUSE,__VA_ARGS__)); \ } \ - static long __se_compat_sys##name(__MAP(x,__SC_LONG,__VA_ARGS__)) \ + asmlinkage long __riscv_compat_sys##name(const struct pt_regs *regs) \ { \ - return __do_compat_sys##name(__MAP(x,__SC_DELOUSE,__VA_ARGS__)); \ + return __se_compat_sys##name(SC_RISCV_REGS_TO_ARGS(x,__VA_ARGS__)); \ } \ static inline long __do_compat_sys##name(__MAP(x,__SC_DECL,__VA_ARGS__)) @@ -51,19 +77,18 @@ asmlinkage long __riscv_sys_ni_syscall(const struct pt_regs *); #define __SYSCALL_DEFINEx(x, name, ...) \ asmlinkage long __riscv_sys##name(const struct pt_regs *regs); \ ALLOW_ERROR_INJECTION(__riscv_sys##name, ERRNO); \ - static long __se_sys##name(__MAP(x,__SC_LONG,__VA_ARGS__)); \ static inline long __do_sys##name(__MAP(x,__SC_DECL,__VA_ARGS__)); \ - asmlinkage long __riscv_sys##name(const struct pt_regs *regs) \ - { \ - return __se_sys##name(SC_RISCV_REGS_TO_ARGS(x,__VA_ARGS__)); \ - } \ - static long __se_sys##name(__MAP(x,__SC_LONG,__VA_ARGS__)) \ + __SYSCALL_SE_DEFINEx(x, sys, name, __VA_ARGS__) \ { \ long ret = __do_sys##name(__MAP(x,__SC_CAST,__VA_ARGS__)); \ __MAP(x,__SC_TEST,__VA_ARGS__); \ __PROTECT(x, ret,__MAP(x,__SC_ARGS,__VA_ARGS__)); \ return ret; \ } \ + asmlinkage long __riscv_sys##name(const struct pt_regs *regs) \ + { \ + return __se_sys##name(SC_RISCV_REGS_TO_ARGS(x,__VA_ARGS__)); \ + } \ static inline long __do_sys##name(__MAP(x,__SC_DECL,__VA_ARGS__)) #define SYSCALL_DEFINE0(sname) \ -- 2.43.0