[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20200302161929.GA48767@C02TF0J2HF1T.cambridge.arm.com>
Date: Mon, 2 Mar 2020 16:19:29 +0000
From: Catalin Marinas <catalin.marinas@....com>
To: Macpaul Lin <macpaul.lin@...iatek.com>
Cc: Sasha Levin <sashal@...nel.org>, Shen Jing <jingx.shen@...el.com>,
CC Hwang <cc.hwang@...iatek.com>,
Peter Chen <peter.chen@....com>,
Mediatek WSD Upstream <wsd_upstream@...iatek.com>,
Jerry Zhang <zhangjerry@...gle.com>, andreyknvl@...gle.com,
linux-usb@...r.kernel.org, Loda Chou <loda.chou@...iatek.com>,
linux-kernel@...r.kernel.org, stable@...r.kernel.org,
Andrzej Pietrasiewicz <andrzej.p@...labora.com>,
Miles Chen <miles.chen@...iatek.com>, eugenis@...gle.com,
John Stultz <john.stultz@...aro.org>,
Al Viro <viro@...iv.linux.org.uk>,
Vincent Pelletier <plr.vincent@...il.com>,
Matthias Brugger <matthias.bgg@...il.com>,
linux-mediatek@...ts.infradead.org,
linux-arm-kernel@...ts.infradead.org
Subject: Re: [PATCH v4] usb: gadget: f_fs: try to fix AIO issue under ARM 64
bit TAGGED mode
On Sun, Mar 01, 2020 at 11:20:43AM +0800, Macpaul Lin wrote:
> On Fri, 2020-02-28 at 16:48 +0000, Catalin Marinas wrote:
> > On Wed, Feb 26, 2020 at 08:01:52PM +0800, Macpaul Lin wrote:
> > > diff --git a/drivers/usb/gadget/function/f_fs.c b/drivers/usb/gadget/function/f_fs.c
> > > index ce1d023..192935f 100644
> > > --- a/drivers/usb/gadget/function/f_fs.c
> > > +++ b/drivers/usb/gadget/function/f_fs.c
> > > @@ -715,7 +715,20 @@ static void ffs_epfile_io_complete(struct usb_ep *_ep, struct usb_request *req)
> > >
> > > static ssize_t ffs_copy_to_iter(void *data, int data_len, struct iov_iter *iter)
> > > {
> > > - ssize_t ret = copy_to_iter(data, data_len, iter);
> > > + ssize_t ret;
> > > +
> > > +#if defined(CONFIG_ARM64)
> > > + /*
> > > + * Replace tagged address passed by user space application before
> > > + * copying.
> > > + */
> > > + if (IS_ENABLED(CONFIG_ARM64_TAGGED_ADDR_ABI) &&
> > > + (iter->type == ITER_IOVEC)) {
> > > + *(unsigned long *)&iter->iov->iov_base =
> > > + (unsigned long)untagged_addr(iter->iov->iov_base);
> > > + }
> > > +#endif
> > > + ret = copy_to_iter(data, data_len, iter);
> > > if (likely(ret == data_len))
> > > return ret;
> >
> > I had forgotten that we discussed a similar case already a few months
> > ago (thanks to Evgenii for pointing out). Do you have this commit
> > applied to your tree: df325e05a682 ("arm64: Validate tagged addresses in
> > access_ok() called from kernel threads")?
> >
>
> Yes! We have that patch. I've also got Google's reply about referencing
> this patch in android kernel tree.
> https://android-review.googlesource.com/c/kernel/common/+/1186615
>
> However, during my debugging process, I've dumped specific length (e.g.,
> 24 bytes for the first request) AIO request buffer address both in adbd
> and in __range_ok(). Then I've found __range_ok() still always return
> false on address begin with "0x3c". Since untagged_addr() already called
> in __range_ok(), to set "TIF_TAGGED_ADDR" with adbd's user space buffer
> should be the possible solution. Hence I've send the v3 patch.
ffs_copy_to_iter() is called from a workqueue (ffs_user_copy_worker()).
That's still in a kernel thread context but it doesn't have PF_KTHREAD
set, hence __range_ok() rejects the tagged address. Can you try the diff
below:
diff --git a/arch/arm64/include/asm/uaccess.h b/arch/arm64/include/asm/uaccess.h
index 32fc8061aa76..2803143cad1f 100644
--- a/arch/arm64/include/asm/uaccess.h
+++ b/arch/arm64/include/asm/uaccess.h
@@ -68,7 +68,8 @@ static inline unsigned long __range_ok(const void __user *addr, unsigned long si
* the user address before checking.
*/
if (IS_ENABLED(CONFIG_ARM64_TAGGED_ADDR_ABI) &&
- (current->flags & PF_KTHREAD || test_thread_flag(TIF_TAGGED_ADDR)))
+ (current->flags & (PF_KTHREAD | PF_WQ_WORKER) ||
+ test_thread_flag(TIF_TAGGED_ADDR)))
addr = untagged_addr(addr);
__chk_user_ptr(addr);
-
Powered by blists - more mailing lists