From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3BC76C27C53 for ; Wed, 19 Jun 2024 17:32:06 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 9EDCB6B03E6; Wed, 19 Jun 2024 13:32:05 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 99C8A6B03E7; Wed, 19 Jun 2024 13:32:05 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 864AE6B03E9; Wed, 19 Jun 2024 13:32:05 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0016.hostedemail.com [216.40.44.16]) by kanga.kvack.org (Postfix) with ESMTP id 6924D6B03E6 for ; Wed, 19 Jun 2024 13:32:05 -0400 (EDT) Received: from smtpin17.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay03.hostedemail.com (Postfix) with ESMTP id C4298A0779 for ; Wed, 19 Jun 2024 17:32:04 +0000 (UTC) X-FDA: 82248331368.17.06417D3 Received: from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com [148.163.156.1]) by imf14.hostedemail.com (Postfix) with ESMTP id C55BC100009 for ; Wed, 19 Jun 2024 17:32:00 +0000 (UTC) Authentication-Results: imf14.hostedemail.com; dkim=pass header.d=ibm.com header.s=pp1 header.b=LCohBSxo; spf=pass (imf14.hostedemail.com: domain of iii@linux.ibm.com designates 148.163.156.1 as permitted sender) smtp.mailfrom=iii@linux.ibm.com; dmarc=pass (policy=none) header.from=ibm.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1718818314; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=agNOfeGwaIxM1BpsZrTsKKrINqSU+ZKT6FzhLObZk18=; b=Pwli6+AgZK9o2Um/+AJKSRNTcOzY4gGNr6eqW2h/vol0yEY3qIYhlTo2KAhJnThqZGArQl 5djVrcznwv0DFgBeWE+1o00p5B1i9V/IPx00O1Wh1yG4763TH/rL4uJtDhR6yDWLk1IqVO IKleErIZCwx4poOnt1rFS1Nq+P8g/+o= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1718818314; a=rsa-sha256; cv=none; b=LIiYTImhLPmAkO2FANUrX+3emtoGBbgef7l9pdbLhLwaHU1fo7xT9Qs/k3pFrBeWGxTBdb xzvQfpmSrbnqAlhDLDWWMKfoad4TVRQJrLL1KDg4ti/+JgfkgnLIotxPqWNrnlX9ZROjtr mIyh9lArc/y9JRbthZrtmOvUFSGPbQw= ARC-Authentication-Results: i=1; imf14.hostedemail.com; dkim=pass header.d=ibm.com header.s=pp1 header.b=LCohBSxo; spf=pass (imf14.hostedemail.com: domain of iii@linux.ibm.com designates 148.163.156.1 as permitted sender) smtp.mailfrom=iii@linux.ibm.com; dmarc=pass (policy=none) header.from=ibm.com Received: from pps.filterd (m0353726.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 45JEwrZ1024141; Wed, 19 Jun 2024 15:45:53 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=from :to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; s=pp1; bh=agNOfeGwaIxM1 BpsZrTsKKrINqSU+ZKT6FzhLObZk18=; b=LCohBSxoI0Nb4Spoo83JgJXB9MX2l a4vnN7nU1Um+Yg/2KmXOsMsEpWASpJjeN4aXCG+BxXzGxtay2fwL/SPdhU9SlB8N GZUGSLwXna+C2cobQuI0pIgYylSpBqKjpdkBXgFvru1xDGbDbkaDC1QAddE0/FFz Lxhznm47gFDtB0ycN+00FM+Zf3DzvsyXCJjm2hrL8Z4c/2FF9sa3+uVbf09oVIJ+ 9DPPn6d5+ouQMIVnX4OToZ4TTcucYI8VVkNXzwf383mgz1yshDNI7i5EMP6yTnUe cUsayef8f5RmBg8gfvWLq4NVc1HCW6ZPIsnwAb9WXGyaL/exTS42Px8RA== Received: from pps.reinject (localhost [127.0.0.1]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 3yv1jfr5c5-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 19 Jun 2024 15:45:53 +0000 (GMT) Received: from m0353726.ppops.net (m0353726.ppops.net [127.0.0.1]) by pps.reinject (8.18.0.8/8.18.0.8) with ESMTP id 45JFjqUe006314; Wed, 19 Jun 2024 15:45:53 GMT Received: from ppma23.wdc07v.mail.ibm.com (5d.69.3da9.ip4.static.sl-reverse.com [169.61.105.93]) by mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 3yv1jfr5c0-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 19 Jun 2024 15:45:52 +0000 (GMT) Received: from pps.filterd (ppma23.wdc07v.mail.ibm.com [127.0.0.1]) by ppma23.wdc07v.mail.ibm.com (8.17.1.19/8.17.1.19) with ESMTP id 45JEKDs3011355; Wed, 19 Jun 2024 15:45:51 GMT Received: from smtprelay05.fra02v.mail.ibm.com ([9.218.2.225]) by ppma23.wdc07v.mail.ibm.com (PPS) with ESMTPS id 3yspsndtp2-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 19 Jun 2024 15:45:51 +0000 Received: from smtpav06.fra02v.mail.ibm.com (smtpav06.fra02v.mail.ibm.com [10.20.54.105]) by smtprelay05.fra02v.mail.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id 45JFjj4B47382964 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Wed, 19 Jun 2024 15:45:47 GMT Received: from smtpav06.fra02v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 5D8CB2006E; Wed, 19 Jun 2024 15:45:45 +0000 (GMT) Received: from smtpav06.fra02v.mail.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 04F352006A; Wed, 19 Jun 2024 15:45:45 +0000 (GMT) Received: from black.boeblingen.de.ibm.com (unknown [9.155.200.166]) by smtpav06.fra02v.mail.ibm.com (Postfix) with ESMTP; Wed, 19 Jun 2024 15:45:44 +0000 (GMT) From: Ilya Leoshkevich To: Alexander Gordeev , Alexander Potapenko , Andrew Morton , Christoph Lameter , David Rientjes , Heiko Carstens , Joonsoo Kim , Marco Elver , Masami Hiramatsu , Pekka Enberg , Steven Rostedt , Vasily Gorbik , Vlastimil Babka Cc: Christian Borntraeger , Dmitry Vyukov , Hyeonggon Yoo <42.hyeyoo@gmail.com>, kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-s390@vger.kernel.org, linux-trace-kernel@vger.kernel.org, Mark Rutland , Roman Gushchin , Sven Schnelle , Ilya Leoshkevich Subject: [PATCH v5 33/37] s390/uaccess: Add KMSAN support to put_user() and get_user() Date: Wed, 19 Jun 2024 17:44:08 +0200 Message-ID: <20240619154530.163232-34-iii@linux.ibm.com> X-Mailer: git-send-email 2.45.1 In-Reply-To: <20240619154530.163232-1-iii@linux.ibm.com> References: <20240619154530.163232-1-iii@linux.ibm.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 X-Proofpoint-GUID: o1S14x9snFEyIzy71_JihxIM4LerZ1J_ X-Proofpoint-ORIG-GUID: N4O8l3X5dHvqWA4Z8xqzRXfIZtZKvw2I X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1039,Hydra:6.0.680,FMLib:17.12.28.16 definitions=2024-06-19_02,2024-06-19_01,2024-05-17_01 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 adultscore=0 mlxscore=0 lowpriorityscore=0 phishscore=0 clxscore=1015 bulkscore=0 malwarescore=0 mlxlogscore=999 suspectscore=0 priorityscore=1501 spamscore=0 impostorscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.19.0-2405170001 definitions=main-2406190115 X-Rspam-User: X-Rspamd-Server: rspam04 X-Rspamd-Queue-Id: C55BC100009 X-Stat-Signature: ohtqfqima4fzpkkqaxj3hhqj7rrxc1rc X-HE-Tag: 1718818320-530766 X-HE-Meta: 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 hE4l9o9h 4gQgxXxceh+xBtU0RzCMhB3yOgZsskuf2WZZSbZUBsrjNyqGE6u0be8Z9Gcp7lKxMa/Pbo6wbW4uETp7fG/w/iSYg1AHGkAEIJeVZcQwKyMiypnk9/uGitNeTyZAi1dknInBP+Ww5Z2NmVaAD7Xr/nV8RjJ6ZLwb8oSz1jr2GjoISPtaqdYXjKhYukijiEhJdvC5GrEAwV6wZwAhPVPeTGtET/QHiM5E8hkVaA0xpSJF98BopQWOs9f8yXdeRFDhYsWlhylNdtHxBKck= X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: put_user() uses inline assembly with precise constraints, so Clang is in principle capable of instrumenting it automatically. Unfortunately, one of the constraints contains a dereferenced user pointer, and Clang does not currently distinguish user and kernel pointers. Therefore KMSAN attempts to access shadow for user pointers, which is not a right thing to do. An obvious fix to add __no_sanitize_memory to __put_user_fn() does not work, since it's __always_inline. And __always_inline cannot be removed due to the __put_user_bad() trick. A different obvious fix of using the "a" instead of the "+Q" constraint degrades the code quality, which is very important here, since it's a hot path. Instead, repurpose the __put_user_asm() macro to define __put_user_{char,short,int,long}_noinstr() functions and mark them with __no_sanitize_memory. For the non-KMSAN builds make them __always_inline in order to keep the generated code quality. Also define __put_user_{char,short,int,long}() functions, which call the aforementioned ones and which *are* instrumented, because they call KMSAN hooks, which may be implemented as macros. The same applies to get_user() as well. Acked-by: Heiko Carstens Signed-off-by: Ilya Leoshkevich --- arch/s390/include/asm/uaccess.h | 111 +++++++++++++++++++++++--------- 1 file changed, 79 insertions(+), 32 deletions(-) diff --git a/arch/s390/include/asm/uaccess.h b/arch/s390/include/asm/uaccess.h index 81ae8a98e7ec..70f0edc00c2a 100644 --- a/arch/s390/include/asm/uaccess.h +++ b/arch/s390/include/asm/uaccess.h @@ -78,13 +78,24 @@ union oac { int __noreturn __put_user_bad(void); -#define __put_user_asm(to, from, size) \ -({ \ +#ifdef CONFIG_KMSAN +#define get_put_user_noinstr_attributes \ + noinline __maybe_unused __no_sanitize_memory +#else +#define get_put_user_noinstr_attributes __always_inline +#endif + +#define DEFINE_PUT_USER(type) \ +static get_put_user_noinstr_attributes int \ +__put_user_##type##_noinstr(unsigned type __user *to, \ + unsigned type *from, \ + unsigned long size) \ +{ \ union oac __oac_spec = { \ .oac1.as = PSW_BITS_AS_SECONDARY, \ .oac1.a = 1, \ }; \ - int __rc; \ + int rc; \ \ asm volatile( \ " lr 0,%[spec]\n" \ @@ -93,12 +104,28 @@ int __noreturn __put_user_bad(void); "2:\n" \ EX_TABLE_UA_STORE(0b, 2b, %[rc]) \ EX_TABLE_UA_STORE(1b, 2b, %[rc]) \ - : [rc] "=&d" (__rc), [_to] "+Q" (*(to)) \ + : [rc] "=&d" (rc), [_to] "+Q" (*(to)) \ : [_size] "d" (size), [_from] "Q" (*(from)), \ [spec] "d" (__oac_spec.val) \ : "cc", "0"); \ - __rc; \ -}) + return rc; \ +} \ + \ +static __always_inline int \ +__put_user_##type(unsigned type __user *to, unsigned type *from, \ + unsigned long size) \ +{ \ + int rc; \ + \ + rc = __put_user_##type##_noinstr(to, from, size); \ + instrument_put_user(*from, to, size); \ + return rc; \ +} + +DEFINE_PUT_USER(char); +DEFINE_PUT_USER(short); +DEFINE_PUT_USER(int); +DEFINE_PUT_USER(long); static __always_inline int __put_user_fn(void *x, void __user *ptr, unsigned long size) { @@ -106,24 +133,24 @@ static __always_inline int __put_user_fn(void *x, void __user *ptr, unsigned lon switch (size) { case 1: - rc = __put_user_asm((unsigned char __user *)ptr, - (unsigned char *)x, - size); + rc = __put_user_char((unsigned char __user *)ptr, + (unsigned char *)x, + size); break; case 2: - rc = __put_user_asm((unsigned short __user *)ptr, - (unsigned short *)x, - size); + rc = __put_user_short((unsigned short __user *)ptr, + (unsigned short *)x, + size); break; case 4: - rc = __put_user_asm((unsigned int __user *)ptr, + rc = __put_user_int((unsigned int __user *)ptr, (unsigned int *)x, size); break; case 8: - rc = __put_user_asm((unsigned long __user *)ptr, - (unsigned long *)x, - size); + rc = __put_user_long((unsigned long __user *)ptr, + (unsigned long *)x, + size); break; default: __put_user_bad(); @@ -134,13 +161,17 @@ static __always_inline int __put_user_fn(void *x, void __user *ptr, unsigned lon int __noreturn __get_user_bad(void); -#define __get_user_asm(to, from, size) \ -({ \ +#define DEFINE_GET_USER(type) \ +static get_put_user_noinstr_attributes int \ +__get_user_##type##_noinstr(unsigned type *to, \ + unsigned type __user *from, \ + unsigned long size) \ +{ \ union oac __oac_spec = { \ .oac2.as = PSW_BITS_AS_SECONDARY, \ .oac2.a = 1, \ }; \ - int __rc; \ + int rc; \ \ asm volatile( \ " lr 0,%[spec]\n" \ @@ -149,13 +180,29 @@ int __noreturn __get_user_bad(void); "2:\n" \ EX_TABLE_UA_LOAD_MEM(0b, 2b, %[rc], %[_to], %[_ksize]) \ EX_TABLE_UA_LOAD_MEM(1b, 2b, %[rc], %[_to], %[_ksize]) \ - : [rc] "=&d" (__rc), "=Q" (*(to)) \ + : [rc] "=&d" (rc), "=Q" (*(to)) \ : [_size] "d" (size), [_from] "Q" (*(from)), \ [spec] "d" (__oac_spec.val), [_to] "a" (to), \ [_ksize] "K" (size) \ : "cc", "0"); \ - __rc; \ -}) + return rc; \ +} \ + \ +static __always_inline int \ +__get_user_##type(unsigned type *to, unsigned type __user *from, \ + unsigned long size) \ +{ \ + int rc; \ + \ + rc = __get_user_##type##_noinstr(to, from, size); \ + instrument_get_user(*to); \ + return rc; \ +} + +DEFINE_GET_USER(char); +DEFINE_GET_USER(short); +DEFINE_GET_USER(int); +DEFINE_GET_USER(long); static __always_inline int __get_user_fn(void *x, const void __user *ptr, unsigned long size) { @@ -163,24 +210,24 @@ static __always_inline int __get_user_fn(void *x, const void __user *ptr, unsign switch (size) { case 1: - rc = __get_user_asm((unsigned char *)x, - (unsigned char __user *)ptr, - size); + rc = __get_user_char((unsigned char *)x, + (unsigned char __user *)ptr, + size); break; case 2: - rc = __get_user_asm((unsigned short *)x, - (unsigned short __user *)ptr, - size); + rc = __get_user_short((unsigned short *)x, + (unsigned short __user *)ptr, + size); break; case 4: - rc = __get_user_asm((unsigned int *)x, + rc = __get_user_int((unsigned int *)x, (unsigned int __user *)ptr, size); break; case 8: - rc = __get_user_asm((unsigned long *)x, - (unsigned long __user *)ptr, - size); + rc = __get_user_long((unsigned long *)x, + (unsigned long __user *)ptr, + size); break; default: __get_user_bad(); -- 2.45.1