From: David Sterba <dave@jikos.cz> To: kernel-hardening@lists.openwall.com Cc: "Mickaël Salaün" <mic@digikod.net>, linux-kernel@vger.kernel.org, "Alexei Starovoitov" <ast@kernel.org>, "Andy Lutomirski" <luto@amacapital.net>, "Daniel Borkmann" <daniel@iogearbox.net>, "Daniel Mack" <daniel@zonque.org>, "David Drysdale" <drysdale@google.com>, "David S . Miller" <davem@davemloft.net>, "Eric W . Biederman" <ebiederm@xmission.com>, "James Morris" <james.l.morris@oracle.com>, "Jann Horn" <jann@thejh.net>, "Kees Cook" <keescook@chromium.org>, "Paul Moore" <pmoore@redhat.com>, "Sargun Dhillon" <sargun@sargun.me>, "Serge E . Hallyn" <serge@hallyn.com>, "Tejun Heo" <tj@kernel.org>, "Thomas Graf" <tgraf@suug.ch>, "Will Drewry" <wad@chromium.org>, linux-api@vger.kernel.org, linux-security-module@vger.kernel.org, netdev@vger.kernel.org, cgroups@vger.kernel.org Subject: Re: [kernel-hardening] Re: [RFC v4 02/18] bpf: Move u64_to_ptr() to BPF headers and inline it Date: Wed, 26 Oct 2016 15:52:16 +0200 [thread overview] Message-ID: <20161026135216.GE15400@twin.jikos.cz> (raw) In-Reply-To: <4045933.vGduYR3PCp@wuerfel> On Wed, Oct 26, 2016 at 09:19:08AM +0200, Arnd Bergmann wrote: > On Wednesday, October 26, 2016 8:56:38 AM CEST Mickaël Salaün wrote: > > include/linux/bpf.h | 6 ++++++ > > kernel/bpf/syscall.c | 6 ------ > > 2 files changed, 6 insertions(+), 6 deletions(-) > > > > diff --git a/include/linux/bpf.h b/include/linux/bpf.h > > index c201017b5730..cf87db6daf27 100644 > > --- a/include/linux/bpf.h > > +++ b/include/linux/bpf.h > > @@ -283,6 +283,12 @@ static inline void bpf_long_memcpy(void *dst, const void *src, u32 size) > > > > /* verify correctness of eBPF program */ > > int bpf_check(struct bpf_prog **fp, union bpf_attr *attr); > > + > > +/* helper to convert user pointers passed inside __aligned_u64 fields */ > > +static inline void __user *u64_to_ptr(__u64 val) > > +{ > > + return (void __user *) (unsigned long) val; > > +} > > #else > > > > > We already have at least six copies of this helper: > > fs/btrfs/qgroup.c:#define u64_to_ptr(x) ((struct btrfs_qgroup *)(uintptr_t)x) This one does not take __user pointers, unlike the rest. Anyway, the name is misleading, I'll send a cleanup. Thanks. > kernel/bpf/syscall.c:static void __user *u64_to_ptr(__u64 val) > drivers/staging/android/ion/ion_test.c:#define u64_to_uptr(x) ((void __user *)(unsigned long)(x)) > drivers/firewire/core-cdev.c:static void __user *u64_to_uptr(u64 value) > drivers/staging/android/ion/ion_test.c:#define u64_to_uptr(x) ((void __user *)(unsigned long)(x)) > include/linux/kernel.h:#define u64_to_user_ptr(x) ( \ > > Just use the one in linux/kernel.h > > Arnd
WARNING: multiple messages have this Message-ID (diff)
From: David Sterba <dave@jikos.cz> To: kernel-hardening@lists.openwall.com Cc: "Mickaël Salaün" <mic@digikod.net>, linux-kernel@vger.kernel.org, "Alexei Starovoitov" <ast@kernel.org>, "Andy Lutomirski" <luto@amacapital.net>, "Daniel Borkmann" <daniel@iogearbox.net>, "Daniel Mack" <daniel@zonque.org>, "David Drysdale" <drysdale@google.com>, "David S . Miller" <davem@davemloft.net>, "Eric W . Biederman" <ebiederm@xmission.com>, "James Morris" <james.l.morris@oracle.com>, "Jann Horn" <jann@thejh.net>, "Kees Cook" <keescook@chromium.org>, "Paul Moore" <pmoore@redhat.com>, "Sargun Dhillon" <sargun@sargun.me>, "Serge E . Hallyn" <serge@hallyn.com>, "Tejun Heo" <tj@kernel.org>, "Thomas Graf" <tgraf@suug.ch>, "Will Drewry" <wad@chromium.org>, linux-api@vger.kernel.org, linux-security-module@vger.kernel.org, netdev@vger.kernel.org, cgroups@vger.kernel.org Subject: Re: Re: [RFC v4 02/18] bpf: Move u64_to_ptr() to BPF headers and inline it Date: Wed, 26 Oct 2016 15:52:16 +0200 [thread overview] Message-ID: <20161026135216.GE15400@twin.jikos.cz> (raw) In-Reply-To: <4045933.vGduYR3PCp@wuerfel> On Wed, Oct 26, 2016 at 09:19:08AM +0200, Arnd Bergmann wrote: > On Wednesday, October 26, 2016 8:56:38 AM CEST Mickaël Salaün wrote: > > include/linux/bpf.h | 6 ++++++ > > kernel/bpf/syscall.c | 6 ------ > > 2 files changed, 6 insertions(+), 6 deletions(-) > > > > diff --git a/include/linux/bpf.h b/include/linux/bpf.h > > index c201017b5730..cf87db6daf27 100644 > > --- a/include/linux/bpf.h > > +++ b/include/linux/bpf.h > > @@ -283,6 +283,12 @@ static inline void bpf_long_memcpy(void *dst, const void *src, u32 size) > > > > /* verify correctness of eBPF program */ > > int bpf_check(struct bpf_prog **fp, union bpf_attr *attr); > > + > > +/* helper to convert user pointers passed inside __aligned_u64 fields */ > > +static inline void __user *u64_to_ptr(__u64 val) > > +{ > > + return (void __user *) (unsigned long) val; > > +} > > #else > > > > > We already have at least six copies of this helper: > > fs/btrfs/qgroup.c:#define u64_to_ptr(x) ((struct btrfs_qgroup *)(uintptr_t)x) This one does not take __user pointers, unlike the rest. Anyway, the name is misleading, I'll send a cleanup. Thanks. > kernel/bpf/syscall.c:static void __user *u64_to_ptr(__u64 val) > drivers/staging/android/ion/ion_test.c:#define u64_to_uptr(x) ((void __user *)(unsigned long)(x)) > drivers/firewire/core-cdev.c:static void __user *u64_to_uptr(u64 value) > drivers/staging/android/ion/ion_test.c:#define u64_to_uptr(x) ((void __user *)(unsigned long)(x)) > include/linux/kernel.h:#define u64_to_user_ptr(x) ( \ > > Just use the one in linux/kernel.h > > Arnd
next prev parent reply other threads:[~2016-10-26 13:53 UTC|newest] Thread overview: 70+ messages / expand[flat|nested] mbox.gz Atom feed top 2016-10-26 6:56 [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 6:56 ` [RFC v4 01/18] landlock: Add Kconfig Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 6:56 ` Mickaël Salaün 2016-10-26 6:56 ` [RFC v4 02/18] bpf: Move u64_to_ptr() to BPF headers and inline it Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 7:19 ` Arnd Bergmann 2016-10-26 7:19 ` [kernel-hardening] " Arnd Bergmann 2016-10-26 13:52 ` David Sterba [this message] 2016-10-26 13:52 ` David Sterba 2016-10-26 6:56 ` [RFC v4 03/18] bpf,landlock: Add a new arraymap type to deal with (Landlock) handles Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 19:01 ` Jann Horn 2016-10-26 19:01 ` Jann Horn 2016-10-26 20:03 ` Mickaël Salaün 2016-10-26 20:03 ` Mickaël Salaün 2016-10-26 20:16 ` [kernel-hardening] " Jann Horn 2016-10-26 20:16 ` Jann Horn 2016-10-26 6:56 ` [RFC v4 04/18] bpf,landlock: Add eBPF program subtype and is_valid_subtype() verifier Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 6:56 ` [RFC v4 05/18] bpf,landlock: Define an eBPF program type for Landlock Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 6:56 ` [RFC v4 06/18] fs: Constify path_is_under()'s arguments Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 6:56 ` Mickaël Salaün 2016-10-26 6:56 ` [RFC v4 07/18] landlock: Add LSM hooks Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 6:56 ` [RFC v4 08/18] landlock: Handle file comparisons Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 6:56 ` [RFC v4 09/18] landlock: Add manager functions Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 6:56 ` [RFC v4 10/18] seccomp: Split put_seccomp_filter() with put_seccomp() Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 6:56 ` [RFC v4 11/18] seccomp,landlock: Handle Landlock hooks per process hierarchy Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 6:56 ` Mickaël Salaün 2016-10-26 6:56 ` [RFC v4 12/18] bpf: Cosmetic change for bpf_prog_attach() Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 6:56 ` [RFC v4 13/18] bpf/cgroup: Replace struct bpf_prog with struct bpf_object Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 6:56 ` [RFC v4 14/18] bpf/cgroup: Make cgroup_bpf_update() return an error code Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 6:56 ` [RFC v4 15/18] bpf/cgroup: Move capability check Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 6:56 ` Mickaël Salaün 2016-10-26 6:56 ` [RFC v4 16/18] bpf/cgroup,landlock: Handle Landlock hooks per cgroup Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 6:56 ` Mickaël Salaün 2016-10-26 6:56 ` [RFC v4 17/18] landlock: Add update and debug access flags Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 6:56 ` Mickaël Salaün 2016-10-26 6:56 ` [RFC v4 18/18] samples/landlock: Add sandbox example Mickaël Salaün 2016-10-26 6:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 6:56 ` Mickaël Salaün 2016-10-26 14:52 ` [RFC v4 00/18] Landlock LSM: Unprivileged sandboxing Jann Horn 2016-10-26 14:52 ` [kernel-hardening] " Jann Horn 2016-10-26 16:56 ` Mickaël Salaün 2016-10-26 16:56 ` [kernel-hardening] " Mickaël Salaün 2016-10-26 17:24 ` Mickaël Salaün 2016-10-26 17:24 ` [kernel-hardening] " Mickaël Salaün 2016-11-13 14:23 ` Mickaël Salaün 2016-11-13 14:23 ` [kernel-hardening] " Mickaël Salaün 2016-11-14 10:35 ` Sargun Dhillon 2016-11-14 10:35 ` [kernel-hardening] " Sargun Dhillon 2016-11-14 10:35 ` Sargun Dhillon 2016-11-14 20:51 ` Mickaël Salaün 2016-11-14 20:51 ` [kernel-hardening] " Mickaël Salaün 2016-11-14 20:51 ` Mickaël Salaün 2016-11-14 20:51 ` Mickaël Salaün
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20161026135216.GE15400@twin.jikos.cz \ --to=dave@jikos.cz \ --cc=ast@kernel.org \ --cc=cgroups@vger.kernel.org \ --cc=daniel@iogearbox.net \ --cc=daniel@zonque.org \ --cc=davem@davemloft.net \ --cc=drysdale@google.com \ --cc=ebiederm@xmission.com \ --cc=james.l.morris@oracle.com \ --cc=jann@thejh.net \ --cc=keescook@chromium.org \ --cc=kernel-hardening@lists.openwall.com \ --cc=linux-api@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-security-module@vger.kernel.org \ --cc=luto@amacapital.net \ --cc=mic@digikod.net \ --cc=netdev@vger.kernel.org \ --cc=pmoore@redhat.com \ --cc=sargun@sargun.me \ --cc=serge@hallyn.com \ --cc=tgraf@suug.ch \ --cc=tj@kernel.org \ --cc=wad@chromium.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.