Hi Christophe,

Unfortunately this would collide messily with "uaccess: remove
segment_eq" in linux-next, so I'll ask you to do a respin based on that,
some comments below.

Christophe Leroy <christophe.le...@c-s.fr> writes:
> On powerpc, we only have USER_DS and KERNEL_DS
>
> Today, this is managed as an 'unsigned long' data space limit
> which is used to compare the passed address with, plus a bit
> in the thread_info flags that is set whenever modifying the limit
> to enable the verification in addr_limit_user_check()
>
> The limit is either the last address of user space when USER_DS is
> set, and the last address of address space when KERNEL_DS is set.
> In both cases, the limit is a compiletime constant.
>
> get_fs() returns the limit, which is part of thread_info struct
> set_fs() updates the limit then set the TI_FSCHECK flag.
> addr_limit_user_check() check the flag, and if it is set it checks
> the limit is the user limit, then unsets the TI_FSCHECK flag.
>
> In addition, when the flag is set the syscall exit work is involved.
> This exit work is heavy compared to normal syscall exit as it goes
> through normal exception exit instead of the fast syscall exit.
>
> Rename this TI_FSCHECK flag to TIF_KERNEL_DS flag which tells whether
> KERNEL_DS or USER_DS is set. Get mm_segment_t be redifined as a bool
> struct that is either false (for USER_DS) or true (for KERNEL_DS).
> When TIF_KERNEL_DS is set, the limit is ~0UL. Otherwise it is
> TASK_SIZE_USER (resp TASK_SIZE_USER64 on PPC64). When KERNEL_DS is
> set, there is no range to check. Define TI_FSCHECK as an alias to
> TIF_KERNEL_DS.

I'd rather avoid the "DS" name any more than we have to. Maybe it means
"data space" but that's not a very common term.

The generic helper these days is called uaccess_kernel(), which returns
true when uaccess routines are allowed to access the kernel.

So calling it TIF_UACCESS_KERNEL would work I think?

The bool could be called uaccess_kernel.
And END_OF_USER_DS could be USER_ADDR_MAX.

> On exit, involve exit work when the bit is set, i.e. when KERNEL_DS
> is set. addr_limit_user_check() will clear the bit and kill the
> user process.

I guess this is safe. The check was added to make sure we never return
to userspace with KERNEL_DS set, but using the actual TIF flag to
determine the address limit should be equally safe, and avoid the
overhead of the check in the good case.

cheers


> diff --git a/arch/powerpc/include/asm/processor.h 
> b/arch/powerpc/include/asm/processor.h
> index 8387698bd5b6..e9e3c3b0f05e 100644
> --- a/arch/powerpc/include/asm/processor.h
> +++ b/arch/powerpc/include/asm/processor.h
> @@ -84,7 +84,7 @@ void start_thread(struct pt_regs *regs, unsigned long 
> fdptr, unsigned long sp);
>  void release_thread(struct task_struct *);
>  
>  typedef struct {
> -     unsigned long seg;
> +     bool is_kernel_ds;
>  } mm_segment_t;
>  
>  #define TS_FPR(i) fp_state.fpr[i][TS_FPROFFSET]
> @@ -148,7 +148,6 @@ struct thread_struct {
>       unsigned long   ksp_vsid;
>  #endif
>       struct pt_regs  *regs;          /* Pointer to saved register state */
> -     mm_segment_t    addr_limit;     /* for get_fs() validation */
>  #ifdef CONFIG_BOOKE
>       /* BookE base exception scratch space; align on cacheline */
>       unsigned long   normsave[8] ____cacheline_aligned;
> @@ -289,7 +288,6 @@ struct thread_struct {
>  #define INIT_THREAD { \
>       .ksp = INIT_SP, \
>       .ksp_limit = INIT_SP_LIMIT, \
> -     .addr_limit = KERNEL_DS, \
>       .pgdir = swapper_pg_dir, \
>       .fpexc_mode = MSR_FE0 | MSR_FE1, \
>       SPEFSCR_INIT \
> @@ -298,7 +296,6 @@ struct thread_struct {
>  #define INIT_THREAD  { \
>       .ksp = INIT_SP, \
>       .regs = (struct pt_regs *)INIT_SP - 1, /* XXX bogus, I think */ \
> -     .addr_limit = KERNEL_DS, \
>       .fpexc_mode = 0, \
>       .fscr = FSCR_TAR | FSCR_EBB \
>  }
> diff --git a/arch/powerpc/include/asm/thread_info.h 
> b/arch/powerpc/include/asm/thread_info.h
> index a2270749b282..a681ce624ab7 100644
> --- a/arch/powerpc/include/asm/thread_info.h
> +++ b/arch/powerpc/include/asm/thread_info.h
> @@ -69,7 +69,7 @@ struct thread_info {
>  #define INIT_THREAD_INFO(tsk)                        \
>  {                                            \
>       .preempt_count = INIT_PREEMPT_COUNT,    \
> -     .flags =        0,                      \
> +     .flags =        _TIF_KERNEL_DS,         \
>  }
>  
>  #define THREAD_SIZE_ORDER    (THREAD_SHIFT - PAGE_SHIFT)
> @@ -90,7 +90,8 @@ void arch_setup_new_exec(void);
>  #define TIF_SYSCALL_TRACE    0       /* syscall trace active */
>  #define TIF_SIGPENDING               1       /* signal pending */
>  #define TIF_NEED_RESCHED     2       /* rescheduling necessary */
> -#define TIF_FSCHECK          3       /* Check FS is USER_DS on return */
> +#define TIF_KERNEL_DS                3       /* KERNEL_DS is set */
> +#define TIF_FSCHECK  TIF_KERNEL_DS
>  #define TIF_SYSCALL_EMU              4       /* syscall emulation active */
>  #define TIF_RESTORE_TM               5       /* need to restore TM 
> FP/VEC/VSX */
>  #define TIF_PATCH_PENDING    6       /* pending live patching update */
> @@ -130,7 +131,7 @@ void arch_setup_new_exec(void);
>  #define _TIF_SYSCALL_TRACEPOINT      (1<<TIF_SYSCALL_TRACEPOINT)
>  #define _TIF_EMULATE_STACK_STORE     (1<<TIF_EMULATE_STACK_STORE)
>  #define _TIF_NOHZ            (1<<TIF_NOHZ)
> -#define _TIF_FSCHECK         (1<<TIF_FSCHECK)
> +#define _TIF_KERNEL_DS               (1 << TIF_KERNEL_DS)
>  #define _TIF_SYSCALL_EMU     (1<<TIF_SYSCALL_EMU)
>  #define _TIF_SYSCALL_DOTRACE (_TIF_SYSCALL_TRACE | _TIF_SYSCALL_AUDIT | \
>                                _TIF_SECCOMP | _TIF_SYSCALL_TRACEPOINT | \
> @@ -139,7 +140,7 @@ void arch_setup_new_exec(void);
>  #define _TIF_USER_WORK_MASK  (_TIF_SIGPENDING | _TIF_NEED_RESCHED | \
>                                _TIF_NOTIFY_RESUME | _TIF_UPROBE | \
>                                _TIF_RESTORE_TM | _TIF_PATCH_PENDING | \
> -                              _TIF_FSCHECK)
> +                              _TIF_KERNEL_DS)
>  #define _TIF_PERSYSCALL_MASK (_TIF_RESTOREALL|_TIF_NOERROR)
>  
>  /* Bits in local_flags */
> diff --git a/arch/powerpc/include/asm/uaccess.h 
> b/arch/powerpc/include/asm/uaccess.h
> index c92fe7fe9692..391c3a26f980 100644
> --- a/arch/powerpc/include/asm/uaccess.h
> +++ b/arch/powerpc/include/asm/uaccess.h
> @@ -21,43 +21,44 @@
>  
>  #define MAKE_MM_SEG(s)  ((mm_segment_t) { (s) })
>  
> -#define KERNEL_DS    MAKE_MM_SEG(~0UL)
> -#ifdef __powerpc64__
> -/* We use TASK_SIZE_USER64 as TASK_SIZE is not constant */
> -#define USER_DS              MAKE_MM_SEG(TASK_SIZE_USER64 - 1)
> -#else
> -#define USER_DS              MAKE_MM_SEG(TASK_SIZE - 1)
> -#endif
> +#define KERNEL_DS    MAKE_MM_SEG(true)
> +#define USER_DS              MAKE_MM_SEG(false)
> +
> +#define get_fs()     (MAKE_MM_SEG(test_thread_flag(TIF_KERNEL_DS)))
>  
> -#define get_fs()     (current->thread.addr_limit)
> +#define segment_eq(a, b)     ((a).is_kernel_ds == (b).is_kernel_ds)
>  
>  static inline void set_fs(mm_segment_t fs)
>  {
> -     current->thread.addr_limit = fs;
> -     /* On user-mode return check addr_limit (fs) is correct */
> -     set_thread_flag(TIF_FSCHECK);
> +     update_thread_flag(TIF_KERNEL_DS, segment_eq(fs, KERNEL_DS));
>  }
>  
> -#define segment_eq(a, b)     ((a).seg == (b).seg)
> -
> -#define user_addr_max()      (get_fs().seg)
> +#define user_addr_max()      (segment_eq(get_fs(), KERNEL_DS) ? ~0UL : 
> END_OF_USER_DS - 1)
>  
>  #ifdef __powerpc64__
> +
> +#define END_OF_USER_DS               TASK_SIZE_USER64
> +
>  /*
>   * This check is sufficient because there is a large enough
>   * gap between user addresses and the kernel addresses
>   */
>  #define __access_ok(addr, size, segment)     \
> -     (((addr) <= (segment).seg) && ((size) <= (segment).seg))
> +     segment_eq(segment, KERNEL_DS) ?        \
> +     1 : (addr) < END_OF_USER_DS && ((size) < END_OF_USER_DS)
>  
>  #else
>  
> +#define END_OF_USER_DS               TASK_SIZE
> +
>  static inline int __access_ok(unsigned long addr, unsigned long size,
>                       mm_segment_t seg)
>  {
> -     if (addr > seg.seg)
> +     if (segment_eq(seg, KERNEL_DS))
> +             return 1;
> +     if (addr >= END_OF_USER_DS)
>               return 0;
> -     return (size == 0 || size - 1 <= seg.seg - addr);
> +     return addr + size <= END_OF_USER_DS;
>  }
>  
>  #endif
> diff --git a/arch/powerpc/lib/sstep.c b/arch/powerpc/lib/sstep.c
> index c077acb983a1..bf005dd9407e 100644
> --- a/arch/powerpc/lib/sstep.c
> +++ b/arch/powerpc/lib/sstep.c
> @@ -110,7 +110,7 @@ static nokprobe_inline long address_ok(struct pt_regs 
> *regs,
>               return 1;
>       if (__access_ok(ea, 1, USER_DS))
>               /* Access overlaps the end of the user region */
> -             regs->dar = USER_DS.seg;
> +             regs->dar = END_OF_USER_DS;
>       else
>               regs->dar = ea;
>       return 0;
> -- 
> 2.25.0

Reply via email to