lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <e0075d0c-45ae-437a-b873-e892e4e51dc3@tenstorrent.com>
Date: Tue, 18 Mar 2025 10:54:59 +1100
From: Cyril Bur <cyrilbur@...storrent.com>
To: Alexandre Ghiti <alex@...ti.fr>, palmer@...belt.com,
 aou@...s.berkeley.edu, paul.walmsley@...ive.com, charlie@...osinc.com,
 jrtc27@...c27.com, ben.dooks@...ethink.co.uk
Cc: linux-riscv@...ts.infradead.org, linux-kernel@...r.kernel.org,
 jszhang@...nel.org
Subject: Re: [EXT] Re: [PATCH v3 1/4] riscv: implement user_access_begin() and
 families



On 15/3/2025 12:28 am, Alexandre Ghiti wrote:
> Hi Cyril,
> 
> On 21/02/2025 01:09, Cyril Bur wrote:
>> From: Jisheng Zhang<jszhang@...nel.org>
>>
>> Currently, when a function like strncpy_from_user() is called,
>> the userspace access protection is disabled and enabled
>> for every word read.
>>
>> By implementing user_access_begin() and families, the protection
>> is disabled at the beginning of the copy and enabled at the end.
>>
>> The __inttype macro is borrowed from x86 implementation.
>>
>> Signed-off-by: Jisheng Zhang<jszhang@...nel.org>
>> Signed-off-by: Cyril Bur<cyrilbur@...storrent.com>
>> ---
>>   arch/riscv/include/asm/uaccess.h | 63 ++++++++++++++++++++++++++++++++
>>   1 file changed, 63 insertions(+)
>>
>> diff --git a/arch/riscv/include/asm/uaccess.h b/arch/riscv/include/ 
>> asm/uaccess.h
>> index fee56b0c8058..43db1d9c2f99 100644
>> --- a/arch/riscv/include/asm/uaccess.h
>> +++ b/arch/riscv/include/asm/uaccess.h
>> @@ -61,6 +61,19 @@ static inline unsigned long 
>> __untagged_addr_remote(struct mm_struct *mm, unsigne
>>   #define __disable_user_access()                            \
>>       __asm__ __volatile__ ("csrc sstatus, %0" : : "r" (SR_SUM) : 
>> "memory")
>> +/*
>> + * This is the smallest unsigned integer type that can fit a value
>> + * (up to 'long long')
>> + */
>> +#define __inttype(x) __typeof__(        \
>> +    __typefits(x,char,            \
>> +      __typefits(x,short,            \
>> +        __typefits(x,int,            \
>> +          __typefits(x,long,0ULL)))))
>> +
>> +#define __typefits(x,type,not) \
>> +    __builtin_choose_expr(sizeof(x)<=sizeof(type),(unsigned type)0,not)
>> +
>>   /*
>>    * The exception table consists of pairs of addresses: the first is the
>>    * address of an instruction that is allowed to fault, and the 
>> second is
>> @@ -368,6 +381,56 @@ do {                                    \
>>           goto err_label;                        \
>>   } while (0)
>> +static __must_check __always_inline bool user_access_begin(const void 
>> __user *ptr, size_t len)
>> +{
>> +    if (unlikely(!access_ok(ptr,len)))
>> +        return 0;
>> +    __enable_user_access();
>> +    return 1;
>> +}
>> +#define user_access_begin(a,b)    user_access_begin(a,b)
> 
> 
> Nit: no need for (a,b) here
> 
> 
>> +#define user_access_end()    __disable_user_access()
>> +
>> +static inline unsigned long user_access_save(void) { return 0UL; }
>> +static inline void user_access_restore(unsigned long enabled) { }
>> +
>> +/*
>> + * We want the unsafe accessors to always be inlined and use
>> + * the error labels - thus the macro games.
>> + */
>> +#define unsafe_put_user(x, ptr, label)    do {                \
>> +    long __err = 0;                            \
>> +    __put_user_nocheck(x, (ptr), __err);                \
>> +    if (__err) goto label;                        \
>> +} while (0)
>> +
>> +#define unsafe_get_user(x, ptr, label)    do {                \
>> +    long __err = 0;                            \
>> +    __inttype(*(ptr)) __gu_val;                    \
>> +    __get_user_nocheck(__gu_val, (ptr), __err);            \
>> +    (x) = (__force __typeof__(*(ptr)))__gu_val;            \
>> +    if (__err) goto label;                        \
>> +} while (0)
>> +
>> +#define unsafe_copy_loop(dst, src, len, type, label)                \
>> +    while (len >= sizeof(type)) {                        \
>> +        unsafe_put_user(*(type *)(src),(type __user *)(dst),label);    \
>> +        dst += sizeof(type);                        \
>> +        src += sizeof(type);                        \
>> +        len -= sizeof(type);                        \
>> +    }
>> +
>> +#define unsafe_copy_to_user(_dst,_src,_len,label)            \
>> +do {                                    \
>> +    char __user *__ucu_dst = (_dst);                \
>> +    const char *__ucu_src = (_src);                    \
>> +    size_t __ucu_len = (_len);                    \
>> +    unsafe_copy_loop(__ucu_dst, __ucu_src, __ucu_len, u64, label);    \
>> +    unsafe_copy_loop(__ucu_dst, __ucu_src, __ucu_len, u32, label);    \
>> +    unsafe_copy_loop(__ucu_dst, __ucu_src, __ucu_len, u16, label);    \
>> +    unsafe_copy_loop(__ucu_dst, __ucu_src, __ucu_len, u8, label);    \
>> +} while (0)
>> +
>>   #else /* CONFIG_MMU */
>>   #include <asm-generic/uaccess.h>
>>   #endif /* CONFIG_MMU */
> 
> There is a bunch of checkpatch errors to fix, see https:// 
> gist.github.com/linux-riscv-bot/98f23fd1b04d6da7c23c6cb18245a158
> 

Oops, yeah will fix.

> Why isn't there an implementation for unsafe_copy_from_user()? Let's 
> take the following example:
> 
> user_access_begin()
> unsafe_copy_from_user()
> unsafe_get_user() <==== This one will fail since unsafe_copy_from_user() 
> -> raw_copy_from_user() -> __asm_vector_usercopy() which enables and 
> disables the SUM bit.
> user_access_end()

I'll have to look into that - thanks for the feedback.

> 
> Another thing is that with this patch, we lose the vectorized user 
> access functions, can you fix that too?

I'll have a look at this also.

> 
> Thanks,
> 
> Alex
> 
> 
> 


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ