From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-it0-f70.google.com (mail-it0-f70.google.com [209.85.214.70]) by kanga.kvack.org (Postfix) with ESMTP id B2C716B0007 for ; Fri, 3 Aug 2018 10:59:20 -0400 (EDT) Received: by mail-it0-f70.google.com with SMTP id d9-v6so104665itf.8 for ; Fri, 03 Aug 2018 07:59:20 -0700 (PDT) Received: from mail-sor-f41.google.com (mail-sor-f41.google.com. [209.85.220.41]) by mx.google.com with SMTPS id c1-v6sor1735611iog.62.2018.08.03.07.59.19 for (Google Transport Security); Fri, 03 Aug 2018 07:59:19 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: References: <20180626172900.ufclp2pfrhwkxjco@armageddon.cambridge.arm.com> <20180801174256.5mbyf33eszml4nmu@armageddon.cambridge.arm.com> From: Andrey Konovalov Date: Fri, 3 Aug 2018 16:59:18 +0200 Message-ID: Subject: Re: [PATCH v4 0/7] arm64: untag user pointers passed to the kernel Content-Type: text/plain; charset="UTF-8" Sender: owner-linux-mm@kvack.org List-ID: To: Catalin Marinas Cc: Mark Rutland , Kate Stewart , linux-doc@vger.kernel.org, Will Deacon , Kostya Serebryany , linux-kselftest@vger.kernel.org, Chintan Pandya , Shuah Khan , Ingo Molnar , linux-arch@vger.kernel.org, Jacob Bramley , Dmitry Vyukov , Evgeniy Stepanov , Kees Cook , Ruben Ayrapetyan , Ramana Radhakrishnan , Al Viro , Linux ARM , Linux Memory Management List , Greg Kroah-Hartman , LKML , Lee Smith , Andrew Morton , Robin Murphy , "Kirill A . Shutemov" On Thu, Aug 2, 2018 at 5:00 PM, Andrey Konovalov wrote: > On Wed, Aug 1, 2018 at 7:42 PM, Catalin Marinas wrote: >> On Mon, Jul 16, 2018 at 01:25:59PM +0200, Andrey Konovalov wrote: >>> On Thu, Jun 28, 2018 at 9:30 PM, Andrey Konovalov wrote: >>> So the checker reports ~100 different places where a __user pointer >>> being casted. I've looked through them and found 3 places where we >>> need to add untagging. Source code lines below come from 4.18-rc2+ >>> (6f0d349d). >> [...] >>> I'll add the 3 patches with fixes to v5 of this patchset. >> >> Thanks for investigating. You can fix those three places in your code > > OK, will do. > >> but I was rather looking for a way to check such casting in the future >> for newly added code. While for the khwasan we can assume it's a debug >> option, the tagged user pointers are ABI and we need to keep it stable. >> >> We could we actually add some macros for explicit conversion between >> __user ptr and long and silence the warning there (I guess this would >> work better for sparse). We can then detect new ptr to long casts as >> they appear. I just hope that's not too intrusive. >> >> (I haven't tried the sparse patch yet, hopefully sometime this week) > > Haven't look at that sparse patch yet myself, but sounds doable. > Should these macros go into this patchset or should they go > separately? Started looking at this. When I run sparse with default checks enabled (make C=1) I get countless warnings. Does anybody actually use it?