From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: ARC-Seal: i=1; a=rsa-sha256; t=1520604130; cv=none; d=google.com; s=arc-20160816; b=mGkgzA2HFLLjcwRX91oGowg8klNztNssnZ+/WuZSl+13U8Gg7mnNASZSKENDr2q5bO R9DaBAKOrDEz34fsrFJK2fWoAI1NY6K19WJSxt1x0q1CgRrf5WQyo8lb5zLtsNV3t8dG Rg7t5xMEREssAES6LNfyEJwSbpPPZwiCwS7NbQZL51DA/asJtzz41tSMrJnJN3hxRhgg PZ43LlqRGdB/D18jBQwLxoENhFsC76tRVd8fOIIyBQBJMbOg4W2YA7OwjOcCOA2hh8UH HjB6cFm1TDHMUXC1b25+h7oCFsXKHAyVdBIkOiBhGO//AjCSamaKI4dAfYWfQDZ5bkiB 0MNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=message-id:date:subject:cc:to:from:dkim-signature :arc-authentication-results; bh=gZz08brrhFST5FaV0viJBc0/5aRp7ApbKS2EC+x028M=; b=UYL5o2QiLUHc977dCiAz/9j1XXml0AG14Rx9IygLMp1WmytF5WGqlo8TLk8MFVqfu+ mtZ1rWxOuLHM5sXeJ8rHreQfGSwdjpvLv1aurH/qVKcdnYHfj9f6X4LNYQcfsWzoBjuF fx3uphX6FSiAA5lOOFdqbWo6VXvv2JV5YsSzSZwA7rFJkFMueeC3kjjQ76+QKS4qQJK8 KAxPTVJDje9eA9AD7/7s4jlPSLwfqrgh6ZJDdoq5IsL2mo/zUwLGE5XrHZWRW4jqSBbt zRHp17tcme767L/O2Yh5BLOH5zSiKVH0qTpE0YUkyq3g28uEkvd4yFedZkLxTDXnc7Hx DzMg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=rh2dOZ4z; spf=pass (google.com: domain of andreyknvl@google.com designates 209.85.220.65 as permitted sender) smtp.mailfrom=andreyknvl@google.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=rh2dOZ4z; spf=pass (google.com: domain of andreyknvl@google.com designates 209.85.220.65 as permitted sender) smtp.mailfrom=andreyknvl@google.com; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com X-Google-Smtp-Source: AG47ELvYWNQoilyaclxWNdMvib+6V1UMTra7MHnmrEmL8NxvYg2eyj8JCEjSAb7r57tENLlLIGjJgQ== From: Andrey Konovalov To: Catalin Marinas , Will Deacon , Mark Rutland , Robin Murphy , Al Viro , Philippe Ombredanne , Greg Kroah-Hartman , Thomas Gleixner , Kate Stewart , Andrew Morton , "Kirill A . Shutemov" , Ingo Molnar , "Aneesh Kumar K . V" , Minchan Kim , Michal Hocko , Shaohua Li , Andrea Arcangeli , Anshuman Khandual , Mike Rapoport , Vlastimil Babka , Naoya Horiguchi , Shakeel Butt , Joonsoo Kim , Hugh Dickins , Mel Gorman , =?UTF-8?q?J=C3=A9r=C3=B4me=20Glisse?= , Mike Kravetz , Zi Yan , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, Richard Henderson , Ivan Kokshaysky , Matt Turner , Vineet Gupta , Russell King , Mark Salter , Aurelien Jacquiot , Mikael Starvik , Jesper Nilsson , Tony Luck , Fenghua Yu , Geert Uytterhoeven , James Hogan , Michal Simek , Ralf Baechle , David Howells , Ley Foon Tan , Jonas Bonn , Stefan Kristiansson , Stafford Horne , "James E . J . Bottomley" , Helge Deller , Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , Palmer Dabbelt , Albert Ou , Chen Liqin , Lennox Wu , Yoshinori Sato , Rich Felker , "David S . Miller" , Ingo Molnar , x86@kernel.org, Chris Zankel , Max Filippov , Arnd Bergmann , linux-alpha@vger.kernel.org, linux-snps-arc@lists.infradead.org, adi-buildroot-devel@lists.sourceforge.net, linux-c6x-dev@linux-c6x.org, linux-cris-kernel@axis.com, linux-ia64@vger.kernel.org, linux-m68k@lists.linux-m68k.org, linux-metag@vger.kernel.org, linux-mips@linux-mips.org, linux-am33-list@redhat.com, nios2-dev@lists.rocketboards.org, openrisc@lists.librecores.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-riscv@lists.infradead.org, linux-sh@vger.kernel.org, sparclinux@vger.kernel.org, linux-xtensa@linux-xtensa.org, linux-arch@vger.kernel.org Cc: Dmitry Vyukov , Kostya Serebryany , Evgeniy Stepanov , Lee Smith , Ramana Radhakrishnan , Jacob Bramley , Ruben Ayrapetyan , Andrey Konovalov Subject: [RFC PATCH 0/6] arm64: untag user pointers passed to the kernel Date: Fri, 9 Mar 2018 15:01:58 +0100 Message-Id: X-Mailer: git-send-email 2.16.2.395.g2e18187dfd-goog X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: =?utf-8?q?1594468997571598661?= X-GMAIL-MSGID: =?utf-8?q?1594468997571598661?= X-Mailing-List: linux-kernel@vger.kernel.org List-ID: arm64 has a feature called Top Byte Ignore, which allows to embed pointer tags into the top byte of each pointer. Userspace programs (such as HWASan, a memory debugging tool [1]) might use this feature and pass tagged user pointers to the kernel through syscalls or other interfaces. This patch makes a few of the kernel interfaces accept tagged user pointers. The kernel is already able to handle user faults with tagged pointers and has the untagged_addr macro, which this patchset reuses. We're not trying to cover all possible ways the kernel accepts user pointers in one patchset, so this one should be considered as a start. It would be nice to learn about the interfaces that I missed though. Sending this as an RFC, as I'm not sure if this should be committed as is, and would like to receive some feedback. Thanks! [1] http://clang.llvm.org/docs/HardwareAssistedAddressSanitizerDesign.html Andrey Konovalov (6): arm64: add type casts to untagged_addr macro arm64: untag user addresses in copy_from_user and others mm, arm64: untag user addresses in memory syscalls mm, arm64: untag user addresses in mm/gup.c lib, arm64: untag addrs passed to strncpy_from_user and strnlen_user arch: add untagged_addr definition for other arches arch/alpha/include/asm/uaccess.h | 2 ++ arch/arc/include/asm/uaccess.h | 1 + arch/arm/include/asm/uaccess.h | 2 ++ arch/arm64/include/asm/uaccess.h | 9 +++++++-- arch/blackfin/include/asm/uaccess.h | 2 ++ arch/c6x/include/asm/uaccess.h | 2 ++ arch/cris/include/asm/uaccess.h | 2 ++ arch/frv/include/asm/uaccess.h | 2 ++ arch/ia64/include/asm/uaccess.h | 2 ++ arch/m32r/include/asm/uaccess.h | 2 ++ arch/m68k/include/asm/uaccess.h | 2 ++ arch/metag/include/asm/uaccess.h | 2 ++ arch/microblaze/include/asm/uaccess.h | 2 ++ arch/mips/include/asm/uaccess.h | 2 ++ arch/mn10300/include/asm/uaccess.h | 2 ++ arch/nios2/include/asm/uaccess.h | 2 ++ arch/openrisc/include/asm/uaccess.h | 2 ++ arch/parisc/include/asm/uaccess.h | 2 ++ arch/powerpc/include/asm/uaccess.h | 2 ++ arch/riscv/include/asm/uaccess.h | 2 ++ arch/score/include/asm/uaccess.h | 2 ++ arch/sh/include/asm/uaccess.h | 2 ++ arch/sparc/include/asm/uaccess.h | 2 ++ arch/tile/include/asm/uaccess.h | 2 ++ arch/x86/include/asm/uaccess.h | 2 ++ arch/xtensa/include/asm/uaccess.h | 2 ++ include/asm-generic/uaccess.h | 2 ++ lib/strncpy_from_user.c | 2 ++ lib/strnlen_user.c | 2 ++ mm/gup.c | 12 ++++++++++++ mm/madvise.c | 2 ++ mm/mempolicy.c | 6 ++++++ mm/mincore.c | 2 ++ mm/mlock.c | 5 +++++ mm/mmap.c | 9 +++++++++ mm/mprotect.c | 2 ++ mm/mremap.c | 2 ++ mm/msync.c | 3 +++ 38 files changed, 105 insertions(+), 2 deletions(-) -- 2.16.2.395.g2e18187dfd-goog From mboxrd@z Thu Jan 1 00:00:00 1970 From: andreyknvl@google.com (Andrey Konovalov) Date: Fri, 9 Mar 2018 15:01:58 +0100 Subject: [RFC PATCH 0/6] arm64: untag user pointers passed to the kernel Message-ID: To: linux-riscv@lists.infradead.org List-Id: linux-riscv.lists.infradead.org arm64 has a feature called Top Byte Ignore, which allows to embed pointer tags into the top byte of each pointer. Userspace programs (such as HWASan, a memory debugging tool [1]) might use this feature and pass tagged user pointers to the kernel through syscalls or other interfaces. This patch makes a few of the kernel interfaces accept tagged user pointers. The kernel is already able to handle user faults with tagged pointers and has the untagged_addr macro, which this patchset reuses. We're not trying to cover all possible ways the kernel accepts user pointers in one patchset, so this one should be considered as a start. It would be nice to learn about the interfaces that I missed though. Sending this as an RFC, as I'm not sure if this should be committed as is, and would like to receive some feedback. Thanks! [1] http://clang.llvm.org/docs/HardwareAssistedAddressSanitizerDesign.html Andrey Konovalov (6): arm64: add type casts to untagged_addr macro arm64: untag user addresses in copy_from_user and others mm, arm64: untag user addresses in memory syscalls mm, arm64: untag user addresses in mm/gup.c lib, arm64: untag addrs passed to strncpy_from_user and strnlen_user arch: add untagged_addr definition for other arches arch/alpha/include/asm/uaccess.h | 2 ++ arch/arc/include/asm/uaccess.h | 1 + arch/arm/include/asm/uaccess.h | 2 ++ arch/arm64/include/asm/uaccess.h | 9 +++++++-- arch/blackfin/include/asm/uaccess.h | 2 ++ arch/c6x/include/asm/uaccess.h | 2 ++ arch/cris/include/asm/uaccess.h | 2 ++ arch/frv/include/asm/uaccess.h | 2 ++ arch/ia64/include/asm/uaccess.h | 2 ++ arch/m32r/include/asm/uaccess.h | 2 ++ arch/m68k/include/asm/uaccess.h | 2 ++ arch/metag/include/asm/uaccess.h | 2 ++ arch/microblaze/include/asm/uaccess.h | 2 ++ arch/mips/include/asm/uaccess.h | 2 ++ arch/mn10300/include/asm/uaccess.h | 2 ++ arch/nios2/include/asm/uaccess.h | 2 ++ arch/openrisc/include/asm/uaccess.h | 2 ++ arch/parisc/include/asm/uaccess.h | 2 ++ arch/powerpc/include/asm/uaccess.h | 2 ++ arch/riscv/include/asm/uaccess.h | 2 ++ arch/score/include/asm/uaccess.h | 2 ++ arch/sh/include/asm/uaccess.h | 2 ++ arch/sparc/include/asm/uaccess.h | 2 ++ arch/tile/include/asm/uaccess.h | 2 ++ arch/x86/include/asm/uaccess.h | 2 ++ arch/xtensa/include/asm/uaccess.h | 2 ++ include/asm-generic/uaccess.h | 2 ++ lib/strncpy_from_user.c | 2 ++ lib/strnlen_user.c | 2 ++ mm/gup.c | 12 ++++++++++++ mm/madvise.c | 2 ++ mm/mempolicy.c | 6 ++++++ mm/mincore.c | 2 ++ mm/mlock.c | 5 +++++ mm/mmap.c | 9 +++++++++ mm/mprotect.c | 2 ++ mm/mremap.c | 2 ++ mm/msync.c | 3 +++ 38 files changed, 105 insertions(+), 2 deletions(-) -- 2.16.2.395.g2e18187dfd-goog From mboxrd@z Thu Jan 1 00:00:00 1970 From: andreyknvl@google.com (Andrey Konovalov) Date: Fri, 9 Mar 2018 15:01:58 +0100 Subject: [RFC PATCH 0/6] arm64: untag user pointers passed to the kernel List-ID: Message-ID: To: linux-snps-arc@lists.infradead.org arm64 has a feature called Top Byte Ignore, which allows to embed pointer tags into the top byte of each pointer. Userspace programs (such as HWASan, a memory debugging tool [1]) might use this feature and pass tagged user pointers to the kernel through syscalls or other interfaces. This patch makes a few of the kernel interfaces accept tagged user pointers. The kernel is already able to handle user faults with tagged pointers and has the untagged_addr macro, which this patchset reuses. We're not trying to cover all possible ways the kernel accepts user pointers in one patchset, so this one should be considered as a start. It would be nice to learn about the interfaces that I missed though. Sending this as an RFC, as I'm not sure if this should be committed as is, and would like to receive some feedback. Thanks! [1] http://clang.llvm.org/docs/HardwareAssistedAddressSanitizerDesign.html Andrey Konovalov (6): arm64: add type casts to untagged_addr macro arm64: untag user addresses in copy_from_user and others mm, arm64: untag user addresses in memory syscalls mm, arm64: untag user addresses in mm/gup.c lib, arm64: untag addrs passed to strncpy_from_user and strnlen_user arch: add untagged_addr definition for other arches arch/alpha/include/asm/uaccess.h | 2 ++ arch/arc/include/asm/uaccess.h | 1 + arch/arm/include/asm/uaccess.h | 2 ++ arch/arm64/include/asm/uaccess.h | 9 +++++++-- arch/blackfin/include/asm/uaccess.h | 2 ++ arch/c6x/include/asm/uaccess.h | 2 ++ arch/cris/include/asm/uaccess.h | 2 ++ arch/frv/include/asm/uaccess.h | 2 ++ arch/ia64/include/asm/uaccess.h | 2 ++ arch/m32r/include/asm/uaccess.h | 2 ++ arch/m68k/include/asm/uaccess.h | 2 ++ arch/metag/include/asm/uaccess.h | 2 ++ arch/microblaze/include/asm/uaccess.h | 2 ++ arch/mips/include/asm/uaccess.h | 2 ++ arch/mn10300/include/asm/uaccess.h | 2 ++ arch/nios2/include/asm/uaccess.h | 2 ++ arch/openrisc/include/asm/uaccess.h | 2 ++ arch/parisc/include/asm/uaccess.h | 2 ++ arch/powerpc/include/asm/uaccess.h | 2 ++ arch/riscv/include/asm/uaccess.h | 2 ++ arch/score/include/asm/uaccess.h | 2 ++ arch/sh/include/asm/uaccess.h | 2 ++ arch/sparc/include/asm/uaccess.h | 2 ++ arch/tile/include/asm/uaccess.h | 2 ++ arch/x86/include/asm/uaccess.h | 2 ++ arch/xtensa/include/asm/uaccess.h | 2 ++ include/asm-generic/uaccess.h | 2 ++ lib/strncpy_from_user.c | 2 ++ lib/strnlen_user.c | 2 ++ mm/gup.c | 12 ++++++++++++ mm/madvise.c | 2 ++ mm/mempolicy.c | 6 ++++++ mm/mincore.c | 2 ++ mm/mlock.c | 5 +++++ mm/mmap.c | 9 +++++++++ mm/mprotect.c | 2 ++ mm/mremap.c | 2 ++ mm/msync.c | 3 +++ 38 files changed, 105 insertions(+), 2 deletions(-) -- 2.16.2.395.g2e18187dfd-goog From mboxrd@z Thu Jan 1 00:00:00 1970 From: Andrey Konovalov Date: Fri, 9 Mar 2018 15:01:58 +0100 Subject: [OpenRISC] [RFC PATCH 0/6] arm64: untag user pointers passed to the kernel Message-ID: List-Id: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit To: openrisc@lists.librecores.org arm64 has a feature called Top Byte Ignore, which allows to embed pointer tags into the top byte of each pointer. Userspace programs (such as HWASan, a memory debugging tool [1]) might use this feature and pass tagged user pointers to the kernel through syscalls or other interfaces. This patch makes a few of the kernel interfaces accept tagged user pointers. The kernel is already able to handle user faults with tagged pointers and has the untagged_addr macro, which this patchset reuses. We're not trying to cover all possible ways the kernel accepts user pointers in one patchset, so this one should be considered as a start. It would be nice to learn about the interfaces that I missed though. Sending this as an RFC, as I'm not sure if this should be committed as is, and would like to receive some feedback. Thanks! [1] http://clang.llvm.org/docs/HardwareAssistedAddressSanitizerDesign.html Andrey Konovalov (6): arm64: add type casts to untagged_addr macro arm64: untag user addresses in copy_from_user and others mm, arm64: untag user addresses in memory syscalls mm, arm64: untag user addresses in mm/gup.c lib, arm64: untag addrs passed to strncpy_from_user and strnlen_user arch: add untagged_addr definition for other arches arch/alpha/include/asm/uaccess.h | 2 ++ arch/arc/include/asm/uaccess.h | 1 + arch/arm/include/asm/uaccess.h | 2 ++ arch/arm64/include/asm/uaccess.h | 9 +++++++-- arch/blackfin/include/asm/uaccess.h | 2 ++ arch/c6x/include/asm/uaccess.h | 2 ++ arch/cris/include/asm/uaccess.h | 2 ++ arch/frv/include/asm/uaccess.h | 2 ++ arch/ia64/include/asm/uaccess.h | 2 ++ arch/m32r/include/asm/uaccess.h | 2 ++ arch/m68k/include/asm/uaccess.h | 2 ++ arch/metag/include/asm/uaccess.h | 2 ++ arch/microblaze/include/asm/uaccess.h | 2 ++ arch/mips/include/asm/uaccess.h | 2 ++ arch/mn10300/include/asm/uaccess.h | 2 ++ arch/nios2/include/asm/uaccess.h | 2 ++ arch/openrisc/include/asm/uaccess.h | 2 ++ arch/parisc/include/asm/uaccess.h | 2 ++ arch/powerpc/include/asm/uaccess.h | 2 ++ arch/riscv/include/asm/uaccess.h | 2 ++ arch/score/include/asm/uaccess.h | 2 ++ arch/sh/include/asm/uaccess.h | 2 ++ arch/sparc/include/asm/uaccess.h | 2 ++ arch/tile/include/asm/uaccess.h | 2 ++ arch/x86/include/asm/uaccess.h | 2 ++ arch/xtensa/include/asm/uaccess.h | 2 ++ include/asm-generic/uaccess.h | 2 ++ lib/strncpy_from_user.c | 2 ++ lib/strnlen_user.c | 2 ++ mm/gup.c | 12 ++++++++++++ mm/madvise.c | 2 ++ mm/mempolicy.c | 6 ++++++ mm/mincore.c | 2 ++ mm/mlock.c | 5 +++++ mm/mmap.c | 9 +++++++++ mm/mprotect.c | 2 ++ mm/mremap.c | 2 ++ mm/msync.c | 3 +++ 38 files changed, 105 insertions(+), 2 deletions(-) -- 2.16.2.395.g2e18187dfd-goog