Hi Catalin, On 3/17/20 5:48 PM, Catalin Marinas wrote: > On Tue, Mar 17, 2020 at 04:40:48PM +0000, Vincenzo Frascino wrote: >> On 3/17/20 3:50 PM, Catalin Marinas wrote: >>> On Tue, Mar 17, 2020 at 03:04:01PM +0000, Vincenzo Frascino wrote: >>>> On 3/17/20 2:38 PM, Catalin Marinas wrote: >>>>> On Tue, Mar 17, 2020 at 12:22:12PM +0000, Vincenzo Frascino wrote: >>>> >>>> Can TASK_SIZE > UINTPTR_MAX on an arm64 system? >>> >>> TASK_SIZE yes on arm64 but not TASK_SIZE_32. I was asking about the >>> arm32 check where TASK_SIZE < UINTPTR_MAX. How does the vdsotest return >>> -EFAULT on arm32? Which code path causes this in the user vdso code? >> >> Sorry I got confused because you referred to arch/arm/vdso/vgettimeofday.c which >> is the arm64 implementation, not the compat one :) > > You figured out (in your subsequent reply) that I was indeed talking > about arm32 ;). > >From when I do not drink coffee, afternoon gets more difficult ;) >> In the case of arm32 everything is handled via syscall fallback. > > So clock_gettime() on arm32 always falls back to the syscall? > This seems not what you asked, and I think I answered accordingly. Anyway, in the case of arm32 the error code path is handled via syscall fallback. Look at the code below as an example (I am using getres because I know this email will be already too long, and I do not want to add pointless code, but the concept is the same for gettime and the others): static __maybe_unused int __cvdso_clock_getres(clockid_t clock, struct __kernel_timespec *res) { int ret = __cvdso_clock_getres_common(clock, res); if (unlikely(ret)) return clock_getres_fallback(clock, res); return 0; } When the return code of the "vdso" internal function returns an error the system call is triggered. In general arm32 has been ported to the unified vDSO library hence it has a proper implementation on par with all the other architectures supported by the unified library. >>> My guess is that on arm32 it only fails with -EFAULT in the syscall >>> fallback path since a copy_to_user() would fail the access_ok() check. >>> Does it always take the fallback path if ts > TASK_SIZE? >> >> Correct, it goes via fallback. The return codes for these syscalls are specified >> by the ABI [1]. Then I agree with you the way on which arm32 achieves it should >> be via access_ok() check. > > "it should be" or "it is" on arm32? > What I meant is that I did not check how copy_from_user() implementation on arm32 before answering but I did imagine at that point that it would use access_ok(), as it does. For better clarification look at the code below (kernel/time/posix-timers.c if you want to have a look at the rest of the code): SYSCALL_DEFINE2(clock_gettime, const clockid_t, which_clock, struct __kernel_timespec __user *, tp) { const struct k_clock *kc = clockid_to_kclock(which_clock); struct timespec64 kernel_tp; int error; if (!kc) return -EINVAL; error = kc->clock_get_timespec(which_clock, &kernel_tp); if (!error && put_timespec64(&kernel_tp, tp)) error = -EFAULT; return error; } This is the syscall on which we fallback when the "vdso" internal function returns an error. The behavior of the vdso has to be exactly the same of the syscall otherwise we end up in an ABI breakage. The path followed by put_timespec64() is: put_timespec64() -> copy_to_user() -> _copy_to_user() -> access_ok() and this path is true for every architecture being this common code. Hope this provides better insight on my previous answer. > If, on arm32, clock_gettime() is (would be?) handled in the vdso > entirely, who checks for the pointer outside the accessible address > space (as per the clock_gettime man page)? > > I'm fine with such check as long as it is consistent across arm32 and > arm64 compat. Or even on arm64 native between syscall fallback and vdso > execution. I haven't figured out yet whether this is the case. > Just to contextualize again we are discussing here the check: if ((u32)ts > UINTPTR_MAX - sizeof(*ts) + 1) return -EFAULT; On all the architectures we return -EFAULT if copy_to_user() fails due to access_ok() failing (kernel/time/time.c): int put_timespec64(const struct timespec64 *ts, struct __kernel_timespec __user *uts) { [...] return copy_to_user(uts, &kts, sizeof(kts)) ? -EFAULT : 0; } On arm64 compat it gets tricky, because arm64 uses USER_DS (addr_limit set happens in arch/arm64/kernel/entry.S), which is defined as (1 << VA_BITS), as access_ok() validation even on compat tasks and since arm64 supports up to 52bit VA, this does not detect the end of the user address space for a 32 bit task. So to be logically consistent with the ABI on arm32 and arm64 (and all the other architectures) we need to make an explicit check in the case of arm64 compat. >>>>> This last check needs an explanation. If the clock_id is invalid but res >>>>> is not NULL, we allow it. I don't see where the compatibility issue is, >>>>> arm32 doesn't have such check. >>>> >>>> The case that you are describing has to return -EPERM per ABI spec. This case >>>> has to return -EINVAL. >>>> >>>> The first case is taken care from the generic code. But if we don't do this >>>> check before on arm64 compat we end up returning the wrong error code. >>> >>> I guess I have the same question as above. Where does the arm32 code >>> return -EINVAL for that case? Did it work correctly before you removed >>> the TASK_SIZE_32 check? >> >> I repeated the test and seems that it was failing even before I removed >> TASK_SIZE_32. For reasons I can't explain I did not catch it before. >> >> The getres syscall should return -EINVAL in the cases specified in [1]. > > It states 'clk_id specified is not supported on this system'. Fair > enough but it doesn't say that it returns -EINVAL only if res == NULL. Actually it does, the description of getres() starts with: 'The function clock_getres() finds the resolution (precision) of the specified clock clk_id, and, if res is *non-NULL*, stores it in the struct timespec pointed to by res.' Please refer to the system call below of which we mimic the behavior in the vdso (kernel/time/posix-timers.c): SYSCALL_DEFINE2(clock_getres_time32, clockid_t, which_clock, struct old_timespec32 __user *, tp) { const struct k_clock *kc = clockid_to_kclock(which_clock); struct timespec64 ts; int err; if (!kc) return -EINVAL; err = kc->clock_getres(which_clock, &ts); if (!err && tp && put_old_timespec32(&ts, tp)) return -EFAULT; return err; } If the clock is bogus and res == NULL we are supposed to return -EINVAL and not -EFAULT or something else. This is what the test is trying to verify. If the check below is not in place on arm64 compat, I get error report from the test suite. if (!VALID_CLOCK_ID(clock_id) && res == NULL) return -EINVAL; error message from vdsotest: passing bogus clock id and NULL to clock_getres (VDSO): unexpected errno 14 (Bad address), expected 22 (Invalid argument) passing bogus clock id and NULL to clock_getres (VDSO): exited with status 1, expected 0 clock-getres-monotonic-coarse/abi: 1 failures/inconsistencies encountered > You also don't explain why __cvdso_clock_getres_time32() doesn't already > detect an invalid clk_id on arm64 compat (but does it on arm32). > Thanks for asking to me this question, if I would not have spent the day trying to explain it, I would not have found a bug in the getres() fallback: diff --git a/arch/arm64/include/asm/unistd.h b/arch/arm64/include/asm/unistd.h index 1dd22da1c3a9..803039d504de 100644 --- a/arch/arm64/include/asm/unistd.h +++ b/arch/arm64/include/asm/unistd.h @@ -25,8 +25,8 @@ #define __NR_compat_gettimeofday 78 #define __NR_compat_sigreturn 119 #define __NR_compat_rt_sigreturn 173 -#define __NR_compat_clock_getres 247 #define __NR_compat_clock_gettime 263 +#define __NR_compat_clock_getres 264 #define __NR_compat_clock_gettime64 403 #define __NR_compat_clock_getres_time64 406 In particular compat getres is mis-numbered and that is what causes the issue. I am going to add a patch to my v5 that addresses the issue (or probably a separate one and cc stable since it fixes a bug) and in this patch I will remove the check on VALID_CLOCK_ID. I hope that this long email helps you to have a clearer picture of what is going on. Please let me know if there is still something missing. -- Regards, Vincenzo