From: Andrew Morton <akpm@linux-foundation.org> To: akpm@linux-foundation.org, ast@kernel.org, daniel@iogearbox.net, hch@lst.de, hpa@zytor.com, linux-mm@kvack.org, mhiramat@kernel.org, mingo@elte.hu, mm-commits@vger.kernel.org, tglx@linutronix.de, torvalds@linux-foundation.org Subject: [patch 88/93] maccess: always use strict semantics for probe_kernel_read Date: Mon, 08 Jun 2020 21:34:50 -0700 [thread overview] Message-ID: <20200609043450.DnLndUZMB%akpm@linux-foundation.org> (raw) In-Reply-To: <20200608212922.5b7fa74ca3f4e2444441b7f9@linux-foundation.org> From: Christoph Hellwig <hch@lst.de> Subject: maccess: always use strict semantics for probe_kernel_read Except for historical confusion in the kprobes/uprobes and bpf tracers, which has been fixed now, there is no good reason to ever allow user memory accesses from probe_kernel_read. Switch probe_kernel_read to only read from kernel memory. [akpm@linux-foundation.org: update it for "mm, dump_page(): do not crash with invalid mapping pointer"] Link: http://lkml.kernel.org/r/20200521152301.2587579-17-hch@lst.de Signed-off-by: Christoph Hellwig <hch@lst.de> Cc: Alexei Starovoitov <ast@kernel.org> Cc: Daniel Borkmann <daniel@iogearbox.net> Cc: "H. Peter Anvin" <hpa@zytor.com> Cc: Ingo Molnar <mingo@elte.hu> Cc: Masami Hiramatsu <mhiramat@kernel.org> Cc: Thomas Gleixner <tglx@linutronix.de> Signed-off-by: Andrew Morton <akpm@linux-foundation.org> --- arch/parisc/lib/memcpy.c | 2 - arch/um/kernel/maccess.c | 2 - arch/x86/mm/maccess.c | 9 +------ include/linux/uaccess.h | 4 --- kernel/trace/bpf_trace.c | 2 - kernel/trace/trace_kprobe.c | 4 +-- mm/debug.c | 10 ++++---- mm/maccess.c | 40 +++++----------------------------- 8 files changed, 19 insertions(+), 54 deletions(-) --- a/arch/parisc/lib/memcpy.c~maccess-always-use-strict-semantics-for-probe_kernel_read +++ a/arch/parisc/lib/memcpy.c @@ -57,7 +57,7 @@ void * memcpy(void * dst,const void *src EXPORT_SYMBOL(raw_copy_in_user); EXPORT_SYMBOL(memcpy); -bool probe_kernel_read_allowed(const void *unsafe_src, size_t size, bool strict) +bool probe_kernel_read_allowed(const void *unsafe_src, size_t size) { if ((unsigned long)unsafe_src < PAGE_SIZE) return false; --- a/arch/um/kernel/maccess.c~maccess-always-use-strict-semantics-for-probe_kernel_read +++ a/arch/um/kernel/maccess.c @@ -7,7 +7,7 @@ #include <linux/kernel.h> #include <os.h> -bool probe_kernel_read_allowed(const void *src, size_t size, bool strict) +bool probe_kernel_read_allowed(const void *src, size_t size) { void *psrc = (void *)rounddown((unsigned long)src, PAGE_SIZE); --- a/arch/x86/mm/maccess.c~maccess-always-use-strict-semantics-for-probe_kernel_read +++ a/arch/x86/mm/maccess.c @@ -9,13 +9,10 @@ static __always_inline u64 canonical_add return ((s64)vaddr << (64 - vaddr_bits)) >> (64 - vaddr_bits); } -bool probe_kernel_read_allowed(const void *unsafe_src, size_t size, bool strict) +bool probe_kernel_read_allowed(const void *unsafe_src, size_t size) { unsigned long vaddr = (unsigned long)unsafe_src; - if (!strict) - return true; - /* * Range covering the highest possible canonical userspace address * as well as non-canonical address range. For the canonical range @@ -25,10 +22,8 @@ bool probe_kernel_read_allowed(const voi canonical_address(vaddr, boot_cpu_data.x86_virt_bits) == vaddr; } #else -bool probe_kernel_read_allowed(const void *unsafe_src, size_t size, bool strict) +bool probe_kernel_read_allowed(const void *unsafe_src, size_t size) { - if (!strict) - return true; return (unsigned long)unsafe_src >= TASK_SIZE_MAX; } #endif --- a/include/linux/uaccess.h~maccess-always-use-strict-semantics-for-probe_kernel_read +++ a/include/linux/uaccess.h @@ -301,11 +301,9 @@ copy_struct_from_user(void *dst, size_t return 0; } -bool probe_kernel_read_allowed(const void *unsafe_src, size_t size, - bool strict); +bool probe_kernel_read_allowed(const void *unsafe_src, size_t size); extern long probe_kernel_read(void *dst, const void *src, size_t size); -extern long probe_kernel_read_strict(void *dst, const void *src, size_t size); extern long probe_user_read(void *dst, const void __user *src, size_t size); extern long notrace probe_kernel_write(void *dst, const void *src, size_t size); --- a/kernel/trace/bpf_trace.c~maccess-always-use-strict-semantics-for-probe_kernel_read +++ a/kernel/trace/bpf_trace.c @@ -196,7 +196,7 @@ bpf_probe_read_kernel_common(void *dst, if (unlikely(ret < 0)) goto fail; - ret = probe_kernel_read_strict(dst, unsafe_ptr, size); + ret = probe_kernel_read(dst, unsafe_ptr, size); if (unlikely(ret < 0)) goto fail; return ret; --- a/kernel/trace/trace_kprobe.c~maccess-always-use-strict-semantics-for-probe_kernel_read +++ a/kernel/trace/trace_kprobe.c @@ -1222,7 +1222,7 @@ fetch_store_strlen(unsigned long addr) #endif do { - ret = probe_kernel_read_strict(&c, (u8 *)addr + len, 1); + ret = probe_kernel_read(&c, (u8 *)addr + len, 1); len++; } while (c && ret == 0 && len < MAX_STRING_SIZE); @@ -1300,7 +1300,7 @@ probe_mem_read(void *dest, void *src, si if ((unsigned long)src < TASK_SIZE) return probe_mem_read_user(dest, src, size); #endif - return probe_kernel_read_strict(dest, src, size); + return probe_kernel_read(dest, src, size); } /* Note that we don't verify it, since the code does not come from user space */ --- a/mm/debug.c~maccess-always-use-strict-semantics-for-probe_kernel_read +++ a/mm/debug.c @@ -120,9 +120,9 @@ void __dump_page(struct page *page, cons * mapping can be invalid pointer and we don't want to crash * accessing it, so probe everything depending on it carefully */ - if (probe_kernel_read_strict(&host, &mapping->host, - sizeof(struct inode *)) || - probe_kernel_read_strict(&a_ops, &mapping->a_ops, + if (probe_kernel_read(&host, &mapping->host, + sizeof(struct inode *)) || + probe_kernel_read(&a_ops, &mapping->a_ops, sizeof(struct address_space_operations *))) { pr_warn("failed to read mapping->host or a_ops, mapping not a valid kernel address?\n"); goto out_mapping; @@ -133,7 +133,7 @@ void __dump_page(struct page *page, cons goto out_mapping; } - if (probe_kernel_read_strict(&dentry_first, + if (probe_kernel_read(&dentry_first, &host->i_dentry.first, sizeof(struct hlist_node *))) { pr_warn("mapping->a_ops:%ps with invalid mapping->host inode address %px\n", a_ops, host); @@ -146,7 +146,7 @@ void __dump_page(struct page *page, cons } dentry_ptr = container_of(dentry_first, struct dentry, d_u.d_alias); - if (probe_kernel_read_strict(&dentry, dentry_ptr, + if (probe_kernel_read(&dentry, dentry_ptr, sizeof(struct dentry))) { pr_warn("mapping->aops:%ps with invalid mapping->host->i_dentry.first %px\n", a_ops, dentry_ptr); --- a/mm/maccess.c~maccess-always-use-strict-semantics-for-probe_kernel_read +++ a/mm/maccess.c @@ -6,36 +6,13 @@ #include <linux/mm.h> #include <linux/uaccess.h> -static long __probe_kernel_read(void *dst, const void *src, size_t size, - bool strict); - -bool __weak probe_kernel_read_allowed(const void *unsafe_src, size_t size, - bool strict) +bool __weak probe_kernel_read_allowed(const void *unsafe_src, size_t size) { return true; } /** - * probe_kernel_read(): safely attempt to read from any location - * @dst: pointer to the buffer that shall take the data - * @src: address to read from - * @size: size of the data chunk - * - * Same as probe_kernel_read_strict() except that for architectures with - * not fully separated user and kernel address spaces this function also works - * for user address tanges. - * - * DO NOT USE THIS FUNCTION - it is broken on architectures with entirely - * separate kernel and user address spaces, and also a bad idea otherwise. - */ -long probe_kernel_read(void *dst, const void *src, size_t size) -{ - return __probe_kernel_read(dst, src, size, false); -} -EXPORT_SYMBOL_GPL(probe_kernel_read); - -/** - * probe_kernel_read_strict(): safely attempt to read from kernel-space + * probe_kernel_read(): safely attempt to read from kernel-space * @dst: pointer to the buffer that shall take the data * @src: address to read from * @size: size of the data chunk @@ -48,18 +25,12 @@ EXPORT_SYMBOL_GPL(probe_kernel_read); * probe_kernel_read() suitable for use within regions where the caller * already holds mmap_lock, or other locks which nest inside mmap_lock. */ -long probe_kernel_read_strict(void *dst, const void *src, size_t size) -{ - return __probe_kernel_read(dst, src, size, true); -} - -static long __probe_kernel_read(void *dst, const void *src, size_t size, - bool strict) +long probe_kernel_read(void *dst, const void *src, size_t size) { long ret; mm_segment_t old_fs = get_fs(); - if (!probe_kernel_read_allowed(src, size, strict)) + if (!probe_kernel_read_allowed(src, size)) return -EFAULT; set_fs(KERNEL_DS); @@ -73,6 +44,7 @@ static long __probe_kernel_read(void *ds return -EFAULT; return 0; } +EXPORT_SYMBOL_GPL(probe_kernel_read); /** * probe_user_read(): safely attempt to read from a user-space location @@ -181,7 +153,7 @@ long strncpy_from_kernel_nofault(char *d if (unlikely(count <= 0)) return 0; - if (!probe_kernel_read_allowed(unsafe_addr, count, true)) + if (!probe_kernel_read_allowed(unsafe_addr, count)) return -EFAULT; set_fs(KERNEL_DS); _
next prev parent reply other threads:[~2020-06-09 4:34 UTC|newest] Thread overview: 101+ messages / expand[flat|nested] mbox.gz Atom feed top 2020-06-09 4:29 incoming Andrew Morton 2020-06-09 4:29 ` [patch 01/93] kallsyms/printk: add loglvl to print_ip_sym() Andrew Morton 2020-06-09 4:30 ` [patch 02/93] alpha: add show_stack_loglvl() Andrew Morton 2020-06-09 4:30 ` [patch 03/93] arc: " Andrew Morton 2020-06-09 4:30 ` [patch 04/93] arm/asm: add loglvl to c_backtrace() Andrew Morton 2020-06-09 4:30 ` [patch 05/93] arm: add loglvl to unwind_backtrace() Andrew Morton 2020-06-09 4:30 ` [patch 06/93] arm: add loglvl to dump_backtrace() Andrew Morton 2020-06-09 4:30 ` [patch 07/93] arm: wire up dump_backtrace_{entry,stm} Andrew Morton 2020-06-09 4:30 ` [patch 08/93] arm: add show_stack_loglvl() Andrew Morton 2020-06-09 4:30 ` [patch 09/93] arm64: add loglvl to dump_backtrace() Andrew Morton 2020-06-09 4:30 ` [patch 10/93] arm64: add show_stack_loglvl() Andrew Morton 2020-06-09 4:30 ` [patch 11/93] c6x: " Andrew Morton 2020-06-09 4:30 ` [patch 12/93] csky: " Andrew Morton 2020-06-09 4:30 ` [patch 13/93] h8300: " Andrew Morton 2020-06-09 4:30 ` [patch 14/93] hexagon: " Andrew Morton 2020-06-09 4:30 ` [patch 15/93] ia64: pass log level as arg into ia64_do_show_stack() Andrew Morton 2020-06-09 4:30 ` [patch 16/93] ia64: add show_stack_loglvl() Andrew Morton 2020-06-09 4:30 ` [patch 17/93] m68k: " Andrew Morton 2020-06-09 4:30 ` [patch 18/93] microblaze: add loglvl to microblaze_unwind_inner() Andrew Morton 2020-06-09 4:30 ` [patch 19/93] microblaze: add loglvl to microblaze_unwind() Andrew Morton 2020-06-09 4:30 ` [patch 20/93] microblaze: add show_stack_loglvl() Andrew Morton 2020-06-09 4:30 ` [patch 21/93] mips: " Andrew Morton 2020-06-09 4:31 ` [patch 22/93] nds32: " Andrew Morton 2020-06-09 4:31 ` [patch 23/93] nios2: " Andrew Morton 2020-06-09 4:31 ` [patch 24/93] openrisc: " Andrew Morton 2020-06-09 4:31 ` [patch 25/93] parisc: " Andrew Morton 2020-06-09 4:31 ` [patch 26/93] powerpc: " Andrew Morton 2020-06-09 4:31 ` [patch 27/93] riscv: " Andrew Morton 2020-06-09 4:31 ` [patch 28/93] s390: " Andrew Morton 2020-06-09 4:31 ` [patch 29/93] sh: add loglvl to dump_mem() Andrew Morton 2020-06-09 4:31 ` [patch 30/93] sh: remove needless printk() Andrew Morton 2020-06-09 4:31 ` [patch 31/93] sh: add loglvl to printk_address() Andrew Morton 2020-06-09 4:31 ` [patch 32/93] sh: add loglvl to show_trace() Andrew Morton 2020-06-09 4:31 ` [patch 33/93] sh: add show_stack_loglvl() Andrew Morton 2020-06-09 4:31 ` [patch 34/93] sparc: " Andrew Morton 2020-06-09 4:31 ` [patch 35/93] um/sysrq: remove needless variable sp Andrew Morton 2020-06-09 4:31 ` [patch 36/93] um: add show_stack_loglvl() Andrew Morton 2020-06-09 4:31 ` [patch 37/93] unicore32: remove unused pmode argument in c_backtrace() Andrew Morton 2020-06-09 4:31 ` [patch 38/93] unicore32: add loglvl to c_backtrace() Andrew Morton 2020-06-09 4:31 ` [patch 39/93] unicore32: add show_stack_loglvl() Andrew Morton 2020-06-09 4:31 ` [patch 40/93] x86: add missing const qualifiers for log_lvl Andrew Morton 2020-06-09 4:32 ` [patch 41/93] x86: add show_stack_loglvl() Andrew Morton 2020-06-09 4:32 ` [patch 42/93] xtensa: add loglvl to show_trace() Andrew Morton 2020-06-09 4:32 ` [patch 43/93] xtensa: add show_stack_loglvl() Andrew Morton 2020-06-09 4:32 ` [patch 44/93] sysrq: use show_stack_loglvl() Andrew Morton 2020-06-09 4:32 ` [patch 45/93] x86/amd_gart: print stacktrace for a leak with KERN_ERR Andrew Morton 2020-06-09 4:32 ` [patch 46/93] power: use show_stack_loglvl() Andrew Morton 2020-06-09 4:32 ` [patch 47/93] kdb: don't play with console_loglevel Andrew Morton 2020-06-09 4:32 ` [patch 48/93] sched: print stack trace with KERN_INFO Andrew Morton 2020-06-09 4:32 ` [patch 49/93] kernel: use show_stack_loglvl() Andrew Morton 2020-06-09 4:32 ` [patch 50/93] kernel: rename show_stack_loglvl() => show_stack() Andrew Morton 2020-06-09 4:32 ` [patch 51/93] mm: don't include asm/pgtable.h if linux/mm.h is already included Andrew Morton 2020-06-09 4:32 ` [patch 52/93] mm: introduce include/linux/pgtable.h Andrew Morton 2020-06-09 4:32 ` [patch 53/93] mm: reorder includes after introduction of linux/pgtable.h Andrew Morton 2020-06-09 4:32 ` [patch 54/93] csky: replace definitions of __pXd_offset() with pXd_index() Andrew Morton 2020-06-09 4:32 ` [patch 55/93] m68k/mm/motorola: move comment about page table allocation funcitons Andrew Morton 2020-06-09 4:32 ` [patch 56/93] m68k/mm: move {cache,nocahe}_page() definitions close to their user Andrew Morton 2020-06-09 4:33 ` [patch 57/93] x86/mm: simplify init_trampoline() and surrounding logic Andrew Morton 2020-06-09 4:33 ` [patch 58/93] mm: pgtable: add shortcuts for accessing kernel PMD and PTE Andrew Morton 2020-06-09 4:33 ` [patch 59/93] mm: consolidate pte_index() and pte_offset_*() definitions Andrew Morton 2020-06-09 4:33 ` [patch 60/93] mmap locking API: initial implementation as rwsem wrappers Andrew Morton 2020-06-09 4:33 ` [patch 61/93] MMU notifier: use the new mmap locking API Andrew Morton 2020-06-09 4:33 ` [patch 62/93] DMA reservations: " Andrew Morton 2020-06-09 4:33 ` [patch 63/93] mmap locking API: use coccinelle to convert mmap_sem rwsem call sites Andrew Morton 2020-06-09 4:33 ` [patch 64/93] mmap locking API: convert mmap_sem call sites missed by coccinelle Andrew Morton 2020-06-09 4:33 ` [patch 65/93] mmap locking API: convert nested write lock sites Andrew Morton 2020-06-09 4:33 ` [patch 66/93] mmap locking API: add mmap_read_trylock_non_owner() Andrew Morton 2020-06-09 4:33 ` [patch 67/93] mmap locking API: add MMAP_LOCK_INITIALIZER Andrew Morton 2020-06-09 4:33 ` [patch 68/93] mmap locking API: add mmap_assert_locked() and mmap_assert_write_locked() Andrew Morton 2020-06-09 4:33 ` [patch 69/93] mmap locking API: rename mmap_sem to mmap_lock Andrew Morton 2020-06-09 4:33 ` [patch 70/93] mmap locking API: convert mmap_sem API comments Andrew Morton 2020-06-09 4:33 ` [patch 71/93] mmap locking API: convert mmap_sem comments Andrew Morton 2020-06-09 4:33 ` [patch 72/93] maccess: unexport probe_kernel_write() Andrew Morton 2020-06-09 4:34 ` [patch 73/93] maccess: remove various unused weak aliases Andrew Morton 2020-06-09 4:34 ` [patch 74/93] maccess: remove duplicate kerneldoc comments Andrew Morton 2020-06-09 4:34 ` [patch 75/93] maccess: clarify " Andrew Morton 2020-06-09 4:34 ` [patch 76/93] maccess: update the top of file comment Andrew Morton 2020-06-09 4:34 ` [patch 77/93] maccess: rename strncpy_from_unsafe_user to strncpy_from_user_nofault Andrew Morton 2020-06-09 4:34 ` [patch 78/93] maccess: rename strncpy_from_unsafe_strict to strncpy_from_kernel_nofault Andrew Morton 2020-06-09 4:34 ` [patch 79/93] maccess: rename strnlen_unsafe_user to strnlen_user_nofault Andrew Morton 2020-06-09 4:34 ` [patch 80/93] maccess: remove probe_read_common and probe_write_common Andrew Morton 2020-06-09 4:34 ` [patch 81/93] maccess: unify the probe kernel arch hooks Andrew Morton 2020-06-09 4:34 ` [patch 82/93] bpf: factor out a bpf_trace_copy_string helper Andrew Morton 2020-06-09 4:34 ` [patch 83/93] bpf: handle the compat string in bpf_trace_copy_string better Andrew Morton 2020-06-09 4:34 ` [patch 84/93] bpf:bpf_seq_printf(): handle potentially unsafe format string better Andrew Morton 2020-06-09 4:34 ` [patch 85/93] bpf: rework the compat kernel probe handling Andrew Morton 2020-06-09 4:34 ` [patch 86/93] tracing/kprobes: handle mixed kernel/userspace probes better Andrew Morton 2020-06-09 4:34 ` [patch 87/93] maccess: remove strncpy_from_unsafe Andrew Morton 2020-06-09 4:34 ` Andrew Morton [this message] 2020-06-09 4:34 ` [patch 89/93] maccess: move user access routines together Andrew Morton 2020-06-09 4:34 ` [patch 90/93] maccess: allow architectures to provide kernel probing directly Andrew Morton 2020-06-09 4:35 ` [patch 91/93] x86: use non-set_fs based maccess routines Andrew Morton 2020-06-09 18:01 ` Linus Torvalds 2020-06-09 18:06 ` Linus Torvalds 2020-06-10 6:57 ` Christoph Hellwig 2020-06-09 4:35 ` [patch 92/93] maccess: return -ERANGE when probe_kernel_read() fails Andrew Morton 2020-06-09 4:35 ` [patch 93/93] include/linux/cache.h: expand documentation over __read_mostly Andrew Morton 2020-06-17 15:51 ` Christopher Lameter 2020-06-09 5:34 ` mmotm 2020-06-08-22-33 uploaded Andrew Morton 2020-06-09 5:36 ` mmotm 2020-06-08-22-35 uploaded Andrew Morton 2020-06-09 16:58 ` incoming Linus Torvalds
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20200609043450.DnLndUZMB%akpm@linux-foundation.org \ --to=akpm@linux-foundation.org \ --cc=ast@kernel.org \ --cc=daniel@iogearbox.net \ --cc=hch@lst.de \ --cc=hpa@zytor.com \ --cc=linux-mm@kvack.org \ --cc=mhiramat@kernel.org \ --cc=mingo@elte.hu \ --cc=mm-commits@vger.kernel.org \ --cc=tglx@linutronix.de \ --cc=torvalds@linux-foundation.org \ --subject='Re: [patch 88/93] maccess: always use strict semantics for probe_kernel_read' \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).