[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <87ikk1jnwi.fsf@kernel.org>
Date: Wed, 09 Jul 2025 19:05:01 +0200
From: Andreas Hindborg <a.hindborg@...nel.org>
To: "Alice Ryhl" <aliceryhl@...gle.com>
Cc: "Greg Kroah-Hartman" <gregkh@...uxfoundation.org>, "Alexander Viro"
<viro@...iv.linux.org.uk>, "Arnd Bergmann" <arnd@...db.de>, "Miguel
Ojeda" <ojeda@...nel.org>, "Boqun Feng" <boqun.feng@...il.com>, "Gary
Guo" <gary@...yguo.net>, Björn Roy Baron
<bjorn3_gh@...tonmail.com>,
"Trevor Gross" <tmgross@...ch.edu>, "Danilo Krummrich"
<dakr@...nel.org>, "Matthew Maurer" <mmaurer@...gle.com>, "Lee Jones"
<lee@...nel.org>, <linux-kernel@...r.kernel.org>,
<rust-for-linux@...r.kernel.org>, "Benno Lossin" <lossin@...nel.org>
Subject: Re: [PATCH v2 1/4] rust: iov: add iov_iter abstractions for
ITER_SOURCE
"Alice Ryhl" <aliceryhl@...gle.com> writes:
> On Wed, Jul 09, 2025 at 01:56:37PM +0200, Andreas Hindborg wrote:
>> "Alice Ryhl" <aliceryhl@...gle.com> writes:
>>
>> > On Tue, Jul 08, 2025 at 04:45:14PM +0200, Andreas Hindborg wrote:
>> >> "Alice Ryhl" <aliceryhl@...gle.com> writes:
>> >> > +/// # Invariants
>> >> > +///
>> >> > +/// Must hold a valid `struct iov_iter` with `data_source` set to `ITER_SOURCE`. For the duration
>> >> > +/// of `'data`, it must be safe to read the data in this IO vector.
>> >>
>> >> In my opinion, the phrasing you had in v1 was better:
>> >>
>> >> The buffers referenced by the IO vector must be valid for reading for
>> >> the duration of `'data`.
>> >>
>> >> That is, I would prefer "must be valid for reading" over "it must be
>> >> safe to read ...".
>> >
>> > If it's backed by userspace data, then technically there aren't any
>> > buffers that are valid for reading in the usual sense. We need to call
>> > into special assembly to read it, and a normal pointer dereference would
>> > be illegal.
>>
>> If you go with "safe to read" for this reason, I think you should expand
>> the statement along the lines you used here.
>>
>> What is the special assembly that is used to read this data? From a
>> quick scan it looks like that if `CONFIG_UACCESS_MEMCPY` is enabled, a
>> regular `memcpy` call is used.
>
> When reading from userspace, you're given an arbitrary untrusted address
> that could point anywhere. The memory could be swapped out and need to
> be loaded back from disk. The memory could correspond to an mmap region
> for a file on a NFS mount and reading it could involve a network call.
> The address could be dangling, which must be properly handled and turned
> into an EFAULT error instead of UB. Every architecture has its own asm
> for handling all of this safely so that behavior is safe no matter what
> pointer we are given from userspace.
I don't think that is relevant. My point is, you can't reference
"special assemby" without detailing what that means.
You have a safety requirement in `from_raw`:
/// * For the duration of `'data`, the buffers backing this IO vector must be valid for
/// reading.
This should probably be promoted to invariant for the type, since
`from_raw` is the only way to construct the type?
But are you saying that the referenced buffers need not be mapped and
readable while this type exists? The mapping happens as part of
`bindings::_copy_to_iter`?
> As for CONFIG_UACCESS_MEMCPY, I don't think it is used on any real
> system today. It would require you to be on a NOMMU system where the
> userspace and the kernel are in the same address space.
Ah. I was just browsing for the "special assembly", and that was all I
could find.
>
>> >> > + /// Returns the number of bytes available in this IO vector.
>> >> > + ///
>> >> > + /// Note that this may overestimate the number of bytes. For example, reading from userspace
>> >> > + /// memory could fail with `EFAULT`, which will be treated as the end of the IO vector.
>> >> > + #[inline]
>> >> > + pub fn len(&self) -> usize {
>> >> > + // SAFETY: It is safe to access the `count` field.
>> >>
>> >> Reiterating my comment from v1: Why?
>> >
>> > It's the same reason as why this is safe:
>> >
>> > struct HasLength {
>> > length: usize,
>> > }
>> > impl HasLength {
>> > fn len(&self) -> usize {
>> > // why is this safe?
>> > self.length
>> > }
>> > }
>> >
>> > I'm not sure how to say it concisely. I guess it's because all access to
>> > the iov_iter goes through the &IovIterSource.
>>
>> So "By existence of a shared reference to `self`, `count` is valid for read."?
>>
>> >
>> >> > + unsafe {
>> >> > + (*self.iov.get())
>> >> > + .__bindgen_anon_1
>> >> > + .__bindgen_anon_1
>> >> > + .as_ref()
>> >> > + .count
>> >> > + }
>> >> > + }
>> >> > +
>> >> > + /// Returns whether there are any bytes left in this IO vector.
>> >> > + ///
>> >> > + /// This may return `true` even if there are no more bytes available. For example, reading from
>> >> > + /// userspace memory could fail with `EFAULT`, which will be treated as the end of the IO vector.
>> >> > + #[inline]
>> >> > + pub fn is_empty(&self) -> bool {
>> >> > + self.len() == 0
>> >> > + }
>> >> > +
>> >> > + /// Advance this IO vector by `bytes` bytes.
>> >> > + ///
>> >> > + /// If `bytes` is larger than the size of this IO vector, it is advanced to the end.
>> >> > + #[inline]
>> >> > + pub fn advance(&mut self, bytes: usize) {
>> >> > + // SAFETY: `self.iov` is a valid IO vector.
>> >> > + unsafe { bindings::iov_iter_advance(self.as_raw(), bytes) };
>> >> > + }
>> >> > +
>> >> > + /// Advance this IO vector backwards by `bytes` bytes.
>> >> > + ///
>> >> > + /// # Safety
>> >> > + ///
>> >> > + /// The IO vector must not be reverted to before its beginning.
>> >> > + #[inline]
>> >> > + pub unsafe fn revert(&mut self, bytes: usize) {
>> >> > + // SAFETY: `self.iov` is a valid IO vector, and `bytes` is in bounds.
>> >> > + unsafe { bindings::iov_iter_revert(self.as_raw(), bytes) };
>> >> > + }
>> >> > +
>> >> > + /// Read data from this IO vector.
>> >> > + ///
>> >> > + /// Returns the number of bytes that have been copied.
>> >> > + #[inline]
>> >> > + pub fn copy_from_iter(&mut self, out: &mut [u8]) -> usize {
>> >> > + // SAFETY: We will not write uninitialized bytes to `out`.
>> >>
>> >> Can you provide something to back this claim?
>> >
>> > I guess the logic could go along these lines:
>> >
>> > * If the iov_iter reads from userspace, then it's because we always
>> > consider such reads to produce initialized data.
>>
>> I don't think it is enough to just state that we consider the reads to
>> produce initialized data.
>
> See above re userspace.
You actually have the safety requirement I was looking for in
`from_raw`:
/// * For the duration of `'data`, the buffers backing this IO vector must be valid for
/// reading.
But I am wondering whether this needs to align with the invariant, and
not the other way around?
>
>> > * If the iov_iter reads from a kernel buffer, then the creator of the
>> > iov_iter must provide an initialized buffer.
>> >
>> > Ultimately, if we don't know that the bytes are initialized, then it's
>> > impossible to use the API correctly because you can never inspect the
>> > bytes in any way. I.e., any implementation of copy_from_iter that
>> > produces uninit data is necessarily buggy.
>>
>> I would agree. How do we fix that? You are more knowledgeable than me in
>> this field, so you probably have a better shot than me, at finding a
>> solution.
>
> I think there is nothing to fix. If there exists a callsite on the C
> side that creates an iov_iter that reads from an uninitialized kernel
> buffer, then we can fix that specific call-site. I don't think anything
> else needs to be done.
If soundness of this code hinges on specific call site behavior, this
should be a safety requirement.
>
>> As far as I can tell, we need to read from a place unknown to the rust
>> abstract machine, and we need to be able to have the abstract machine
>> consider the data initialized after the read.
>>
>> Is this volatile memcpy [1], or would that only solve the data race
>> problem, not uninitialized data problem?
>>
>> [1] https://lore.kernel.org/all/25e7e425-ae72-4370-ae95-958882a07df9@ralfj.de
>
> Volatile memcpy deals with data races.
>
> In general, we can argue all we want about wording of these safety
> comments, but calling copy_from_iter is the right way to read from an
> iov_iter. If there is a problem, the problem is specific call-sites that
> construct an iov_iter with an uninit buffer. I don't know whether such
> call-sites exist.
I am not saying it is the wrong way. I am asking that we detail in the
safety requirements _why_ it is the right way.
You have a type invariant
For the duration of `'data`, it must be safe to read the data in this IO vector.
that says "safe to read" instead of "valid for read" because "special
assembly" is used to read the data, and that somehow makes it OK. We
should be more specific.
How about making the invariant:
For the duration of `'data`, it must be safe to read the data in this
IO vector with the C API `_copy_from_iter`.
And then your safety comment regarding uninit bytes can be:
We write `out` with `copy_from_iter_raw`, which transitively writes
`out` using `_copy_from_iter`. By C API contract, `_copy_from_iter`
does not write uninitialized bytes to `out`.
In this way we can defer to the implementation of `_copy_from_user`,
which is what I think you want?
Best regards,
Andreas Hindborg
Powered by blists - more mailing lists