Received: by 10.223.176.46 with SMTP id f43csp308811wra; Thu, 18 Jan 2018 17:56:57 -0800 (PST) X-Google-Smtp-Source: ACJfBov67Ml1T2gM1ecXdaoPYaitt3J19jqz02PS//CrILzx+C/ZlcNVKOanJ7+fZxbEsPgaNmku X-Received: by 2002:a17:902:14b:: with SMTP id 69-v6mr763430plb.209.1516327017486; Thu, 18 Jan 2018 17:56:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516327017; cv=none; d=google.com; s=arc-20160816; b=PUfim44O8GDMYhScbN26XSwNXS3zx+QpabzvEZfdh1DsWlC18oaYA/9F1lVPvzMsqC /PALBZmW7c6+j/R+7yxJEfP9hyx19mPgPnyNP1LhNOyfUvqDVId8i/moqzxcZr0EfO/u j8eo2tIkKyZyq5EfIoXcWt5RjTrNw6YrC+ui68yCwDBuZrnhZ6aM5bzTYHqVnajy4r5D D1Mh1QLgX3Kn81gsJ31mZfmKbIKgX8tg7iRUwb4xYaDgZ1BZ61NJo7NjaVaSVeFDQyBj vLqzmmmzoS9vl7hEdiYqyfvJBeFRvoOJOavmABkdmx8FHHRnsF4PTFysZrpvwfNREcWx Htyg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature:arc-authentication-results; bh=/dFELTDsKqbvCdrIgs6S0cspXkeOMp3kweqDBKoe/TM=; b=oxSV6+ei5babME5kkIoG3LHv5K3g568oD39W9+eq9hTYz/bWvuHtH43XjT2MkG/R3S XsPQ/Pc4fGCpn+3n/T3LRw3CBZ/6doDZOZoqHBuu6cBne6InBEprcl7X9mjC39c7nmCY 9SdlzhrinwyuZkzlL3SWFhLqoYh5WysA40980KeWrOoB4LpishbzNwFafkAEgrgr0FUZ Asl61zmUsbuUtIdr2IVsjNoMRZOIS93pbZFqoXd/zncrMIlNkd2FmdatRk3cbvhcZAAz oitLPEWCsnzwswpMyiseo9lWH3eSIWSs8Z72c+1A2CHMIWYa/Aaet2hNar8qojQrPT8L 1LSQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=BmceDySF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a80si8074309pfa.6.2018.01.18.17.56.43; Thu, 18 Jan 2018 17:56:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=BmceDySF; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932827AbeASBz6 (ORCPT + 99 others); Thu, 18 Jan 2018 20:55:58 -0500 Received: from mail-qt0-f196.google.com ([209.85.216.196]:41339 "EHLO mail-qt0-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755569AbeASBwo (ORCPT ); Thu, 18 Jan 2018 20:52:44 -0500 Received: by mail-qt0-f196.google.com with SMTP id i1so433439qtj.8; Thu, 18 Jan 2018 17:52:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:from:to:cc:subject:date:message-id:in-reply-to:references; bh=/dFELTDsKqbvCdrIgs6S0cspXkeOMp3kweqDBKoe/TM=; b=BmceDySF+XLFVI6tVwZTPRX0jG01EUQSrg5lhzqxLaisq1pKY9xF9sI50YM3Xp+aA1 oVaxpXg52H8sleRNvUt284NZBXAqWShBF57bI7m9IRZXbwO6rjZdz8LcU7h6oqQ8w/w+ ey+ZzH+mphFneBXSJGg3yMSXEySxE1jLIciXAqk9iBO3ACTaDg3IHI6mCWyKrIm2n4uI GXpZrOoyhVzPmE2fDdNNXzgCn0vJkxCLqeRCLhmLTZ8FUAiYA5lMu+NxMPvIopmdXfYO RAw6Wr00tcCqLXEdVvpimXxyr8nC3iXj8rc5G6yETCMea4rKnqPZTZwsf5Wb69c9UgsI DGcA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:cc:subject:date:message-id :in-reply-to:references; bh=/dFELTDsKqbvCdrIgs6S0cspXkeOMp3kweqDBKoe/TM=; b=Hh7sDVPD/JB4PRFqfTrA3z3v3brifODyy5Th1ehWpxNpFX0pSo73QM7AXt5XvYgRtk 1GvcMBYsPynvs2xVhIWRI6Q441c0ZTP3dUlpzBbELTSbxVb/Xm+knfF0Ome6VskcBLAM GMaSeq0OyFZtmk5+R43hJx9URnUWEx67rJixhXSLX6x6kkDxK935CJfGgtRM/XEqxNxq vvvg1vLYO/xlY9xJzraIb715mDk5g3uJcRLI3nXxa1LZfHfK73e5S7dRNn3odKgtqXhO x3HvnzKLQrvcLEJ/v5TBM6mcUoYV0eWqPf106zYD9Zn4gDvq+JJyrl/XuIdLpaxlL/4O +YeA== X-Gm-Message-State: AKwxytfASWttO5Sye7oznUyR7MJanSBpcsGub9rrb1OoQUk/bLCq0y3n t5j9uWWoGBiit2DHCadpB/4= X-Received: by 10.237.45.7 with SMTP id h7mr32839450qtd.44.1516326763142; Thu, 18 Jan 2018 17:52:43 -0800 (PST) Received: from localhost.localdomain (50-39-100-161.bvtn.or.frontiernet.net. [50.39.100.161]) by smtp.gmail.com with ESMTPSA id c127sm5483161qke.78.2018.01.18.17.52.40 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 18 Jan 2018 17:52:42 -0800 (PST) From: Ram Pai To: mpe@ellerman.id.au, mingo@redhat.com, akpm@linux-foundation.org, corbet@lwn.net, arnd@arndb.de Cc: linuxppc-dev@lists.ozlabs.org, linux-mm@kvack.org, x86@kernel.org, linux-arch@vger.kernel.org, linux-doc@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, dave.hansen@intel.com, benh@kernel.crashing.org, paulus@samba.org, khandual@linux.vnet.ibm.com, aneesh.kumar@linux.vnet.ibm.com, bsingharora@gmail.com, hbabu@us.ibm.com, mhocko@kernel.org, bauerman@linux.vnet.ibm.com, ebiederm@xmission.com, linuxram@us.ibm.com Subject: [PATCH v10 21/27] powerpc: Deliver SEGV signal on pkey violation Date: Thu, 18 Jan 2018 17:50:42 -0800 Message-Id: <1516326648-22775-22-git-send-email-linuxram@us.ibm.com> X-Mailer: git-send-email 1.7.1 In-Reply-To: <1516326648-22775-1-git-send-email-linuxram@us.ibm.com> References: <1516326648-22775-1-git-send-email-linuxram@us.ibm.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The value of the pkey, whose protection got violated, is made available in si_pkey field of the siginfo structure. Signed-off-by: Ram Pai Signed-off-by: Thiago Jung Bauermann --- arch/powerpc/include/asm/bug.h | 1 + arch/powerpc/kernel/traps.c | 12 +++++++++++- arch/powerpc/mm/fault.c | 39 +++++++++++++++++++++++++++------------ 3 files changed, 39 insertions(+), 13 deletions(-) diff --git a/arch/powerpc/include/asm/bug.h b/arch/powerpc/include/asm/bug.h index 3c04249..97c3847 100644 --- a/arch/powerpc/include/asm/bug.h +++ b/arch/powerpc/include/asm/bug.h @@ -133,6 +133,7 @@ extern int do_page_fault(struct pt_regs *, unsigned long, unsigned long); extern void bad_page_fault(struct pt_regs *, unsigned long, int); extern void _exception(int, struct pt_regs *, int, unsigned long); +extern void _exception_pkey(int, struct pt_regs *, int, unsigned long, int); extern void die(const char *, struct pt_regs *, long); extern bool die_will_crash(void); diff --git a/arch/powerpc/kernel/traps.c b/arch/powerpc/kernel/traps.c index f3eb61b..3753498 100644 --- a/arch/powerpc/kernel/traps.c +++ b/arch/powerpc/kernel/traps.c @@ -20,6 +20,7 @@ #include #include #include +#include #include #include #include @@ -266,7 +267,9 @@ void user_single_step_siginfo(struct task_struct *tsk, info->si_addr = (void __user *)regs->nip; } -void _exception(int signr, struct pt_regs *regs, int code, unsigned long addr) + +void _exception_pkey(int signr, struct pt_regs *regs, int code, + unsigned long addr, int key) { siginfo_t info; const char fmt32[] = KERN_INFO "%s[%d]: unhandled signal %d " \ @@ -293,9 +296,16 @@ void _exception(int signr, struct pt_regs *regs, int code, unsigned long addr) info.si_signo = signr; info.si_code = code; info.si_addr = (void __user *) addr; + info.si_pkey = key; + force_sig_info(signr, &info, current); } +void _exception(int signr, struct pt_regs *regs, int code, unsigned long addr) +{ + _exception_pkey(signr, regs, code, addr, 0); +} + void system_reset_exception(struct pt_regs *regs) { /* diff --git a/arch/powerpc/mm/fault.c b/arch/powerpc/mm/fault.c index 943a91e..65f8b04 100644 --- a/arch/powerpc/mm/fault.c +++ b/arch/powerpc/mm/fault.c @@ -107,7 +107,8 @@ static bool store_updates_sp(struct pt_regs *regs) */ static int -__bad_area_nosemaphore(struct pt_regs *regs, unsigned long address, int si_code) +__bad_area_nosemaphore(struct pt_regs *regs, unsigned long address, int si_code, + int pkey) { /* * If we are in kernel mode, bail out with a SEGV, this will @@ -117,17 +118,18 @@ static bool store_updates_sp(struct pt_regs *regs) if (!user_mode(regs)) return SIGSEGV; - _exception(SIGSEGV, regs, si_code, address); + _exception_pkey(SIGSEGV, regs, si_code, address, pkey); return 0; } static noinline int bad_area_nosemaphore(struct pt_regs *regs, unsigned long address) { - return __bad_area_nosemaphore(regs, address, SEGV_MAPERR); + return __bad_area_nosemaphore(regs, address, SEGV_MAPERR, 0); } -static int __bad_area(struct pt_regs *regs, unsigned long address, int si_code) +static int __bad_area(struct pt_regs *regs, unsigned long address, int si_code, + int pkey) { struct mm_struct *mm = current->mm; @@ -137,12 +139,18 @@ static int __bad_area(struct pt_regs *regs, unsigned long address, int si_code) */ up_read(&mm->mmap_sem); - return __bad_area_nosemaphore(regs, address, si_code); + return __bad_area_nosemaphore(regs, address, si_code, pkey); } static noinline int bad_area(struct pt_regs *regs, unsigned long address) { - return __bad_area(regs, address, SEGV_MAPERR); + return __bad_area(regs, address, SEGV_MAPERR, 0); +} + +static int bad_key_fault_exception(struct pt_regs *regs, unsigned long address, + int pkey) +{ + return __bad_area_nosemaphore(regs, address, SEGV_PKUERR, pkey); } static int do_sigbus(struct pt_regs *regs, unsigned long address, @@ -427,10 +435,9 @@ static int __do_page_fault(struct pt_regs *regs, unsigned long address, perf_sw_event(PERF_COUNT_SW_PAGE_FAULTS, 1, regs, address); - if (error_code & DSISR_KEYFAULT) { - _exception(SIGSEGV, regs, SEGV_PKUERR, address); - return 0; - } + if (error_code & DSISR_KEYFAULT) + return bad_key_fault_exception(regs, address, + get_mm_addr_key(mm, address)); /* * We want to do this outside mmap_sem, because reading code around nip @@ -513,10 +520,18 @@ static int __do_page_fault(struct pt_regs *regs, unsigned long address, if (unlikely(fault & VM_FAULT_SIGSEGV) && !arch_vma_access_permitted(vma, flags & FAULT_FLAG_WRITE, is_exec, 0)) { + /* + * The PGD-PDT...PMD-PTE tree may not have been fully setup. + * Hence we cannot walk the tree to locate the PTE, to locate + * the key. Hence let's use vma_pkey() to get the key; instead + * of get_mm_addr_key(). + */ int pkey = vma_pkey(vma); - if (likely(pkey)) - return __bad_area(regs, address, SEGV_PKUERR); + if (likely(pkey)) { + up_read(&mm->mmap_sem); + return bad_key_fault_exception(regs, address, pkey); + } } #endif /* CONFIG_PPC_MEM_KEYS */ -- 1.7.1