Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp6669262imu; Wed, 30 Jan 2019 20:21:00 -0800 (PST) X-Google-Smtp-Source: ALg8bN5FukBJgfBYOQ/9V0ZbHgK97bk3ARpK2EdmQFfHrBG99TPJ3UmZlLO29t6lL+iXLYdEqyim X-Received: by 2002:a17:902:6bc7:: with SMTP id m7mr33837813plt.106.1548908460839; Wed, 30 Jan 2019 20:21:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548908460; cv=none; d=google.com; s=arc-20160816; b=q2Y6fQtW/8oBi5AlLg4BOOVmGBZPgj+2YF1/87eyZKB/GV/T52tvy0g+yhh9ASt+x2 Wh9QSqu8EYvvhC7HVLU9KB9jR1Uo+rMvQ9+rLUQ/yxyF/NfqVhM+PVWDGG7yT0JPnMGY yUUprX8SYgJkzBm4IS3tKEm8LerrI6s37ynQeU8RJKt0xXhrNdysPuzlr0cOs5YCoL5k pLNXMRLXx6BspU4p0BnWPPBRIgqHMEVZ44Fo1wmBS9bNtiwxnjRvTaEDB149X6vhlKvJ ebsR/cfYeqEcLcmRgKBNSI7kjLNFJTW+iW9UtaG1Dt+iVgIGegIzsk5RlrPRhrUeG2V4 d7GA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from; bh=JJ2Z3gWqBnZA7p6m3crqgxo41wTTJmgblkbOTQD7DW0=; b=DuKjNTq14A2FBw3jidbEoDubM7zg4p1TzePJo9j1GwHzpnk5NgCelQBLo6Lj2mLX5z bkU1P3xtZwC2TK18K5Eqv/Z5a8OFJXzxrtPrODiOHcECGxgmOubD0+T54jyJVLZPba0p PlhhYRzrEwKwo3Ucj/5cPbvwUItlZ7YcO69KgAk5hfdrczeIdZ3f/YjM0YklPclYx7ot GAFZe0bm9HQ6/WVl5EUOZZNcOmfQhcVxY/eTHQW+nIZ4yapn/znbCYSCbNtHLLW73MDQ advaEiMs1GOw0BhUp1BM07zPLdJjWJoQ4zHXxddgXhsDBEdyTdws/0ZdTFjSSl1kmcpy Wu6Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r18si3656210pfc.199.2019.01.30.20.20.45; Wed, 30 Jan 2019 20:21:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730010AbfAaETU (ORCPT + 99 others); Wed, 30 Jan 2019 23:19:20 -0500 Received: from ozlabs.org ([203.11.71.1]:38217 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726692AbfAaETU (ORCPT ); Wed, 30 Jan 2019 23:19:20 -0500 Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPSA id 43qn7810Tdz9sBb; Thu, 31 Jan 2019 15:19:16 +1100 (AEDT) From: Michael Ellerman To: Christophe Leroy , Kees Cook , Andrew Morton , Benjamin Herrenschmidt , Paul Mackerras , Mike Rapoport Cc: linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-mm@kvack.org Subject: Re: [PATCH v3 2/2] powerpc: use probe_user_read() In-Reply-To: References: <39fb6c5a191025378676492e140dc012915ecaeb.1547652372.git.christophe.leroy@c-s.fr> Date: Thu, 31 Jan 2019 15:19:13 +1100 Message-ID: <878sz1pigu.fsf@concordia.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Christophe Leroy writes: > Instead of opencoding, use probe_user_read() to failessly > read a user location. > > Signed-off-by: Christophe Leroy > --- > v3: No change > > v2: Using probe_user_read() instead of probe_user_address() > > arch/powerpc/kernel/process.c | 12 +----------- > arch/powerpc/mm/fault.c | 6 +----- > arch/powerpc/perf/callchain.c | 20 +++----------------- > arch/powerpc/perf/core-book3s.c | 8 +------- > arch/powerpc/sysdev/fsl_pci.c | 10 ++++------ > 5 files changed, 10 insertions(+), 46 deletions(-) Looks good. Acked-by: Michael Ellerman cheers > diff --git a/arch/powerpc/kernel/process.c b/arch/powerpc/kernel/process.c > index ce393df243aa..6a4b59d574c2 100644 > --- a/arch/powerpc/kernel/process.c > +++ b/arch/powerpc/kernel/process.c > @@ -1298,16 +1298,6 @@ void show_user_instructions(struct pt_regs *regs) > > pc = regs->nip - (NR_INSN_TO_PRINT * 3 / 4 * sizeof(int)); > > - /* > - * Make sure the NIP points at userspace, not kernel text/data or > - * elsewhere. > - */ > - if (!__access_ok(pc, NR_INSN_TO_PRINT * sizeof(int), USER_DS)) { > - pr_info("%s[%d]: Bad NIP, not dumping instructions.\n", > - current->comm, current->pid); > - return; > - } > - > seq_buf_init(&s, buf, sizeof(buf)); > > while (n) { > @@ -1318,7 +1308,7 @@ void show_user_instructions(struct pt_regs *regs) > for (i = 0; i < 8 && n; i++, n--, pc += sizeof(int)) { > int instr; > > - if (probe_kernel_address((const void *)pc, instr)) { > + if (probe_user_read(&instr, (void __user *)pc, sizeof(instr))) { > seq_buf_printf(&s, "XXXXXXXX "); > continue; > } > diff --git a/arch/powerpc/mm/fault.c b/arch/powerpc/mm/fault.c > index 887f11bcf330..ec74305fa330 100644 > --- a/arch/powerpc/mm/fault.c > +++ b/arch/powerpc/mm/fault.c > @@ -276,12 +276,8 @@ static bool bad_stack_expansion(struct pt_regs *regs, unsigned long address, > if ((flags & FAULT_FLAG_WRITE) && (flags & FAULT_FLAG_USER) && > access_ok(nip, sizeof(*nip))) { > unsigned int inst; > - int res; > > - pagefault_disable(); > - res = __get_user_inatomic(inst, nip); > - pagefault_enable(); > - if (!res) > + if (!probe_user_read(&inst, nip, sizeof(inst))) > return !store_updates_sp(inst); > *must_retry = true; > } > diff --git a/arch/powerpc/perf/callchain.c b/arch/powerpc/perf/callchain.c > index 0af051a1974e..0680efb2237b 100644 > --- a/arch/powerpc/perf/callchain.c > +++ b/arch/powerpc/perf/callchain.c > @@ -159,12 +159,8 @@ static int read_user_stack_64(unsigned long __user *ptr, unsigned long *ret) > ((unsigned long)ptr & 7)) > return -EFAULT; > > - pagefault_disable(); > - if (!__get_user_inatomic(*ret, ptr)) { > - pagefault_enable(); > + if (!probe_user_read(ret, ptr, sizeof(*ret))) > return 0; > - } > - pagefault_enable(); > > return read_user_stack_slow(ptr, ret, 8); > } > @@ -175,12 +171,8 @@ static int read_user_stack_32(unsigned int __user *ptr, unsigned int *ret) > ((unsigned long)ptr & 3)) > return -EFAULT; > > - pagefault_disable(); > - if (!__get_user_inatomic(*ret, ptr)) { > - pagefault_enable(); > + if (!probe_user_read(ret, ptr, sizeof(*ret))) > return 0; > - } > - pagefault_enable(); > > return read_user_stack_slow(ptr, ret, 4); > } > @@ -307,17 +299,11 @@ static inline int current_is_64bit(void) > */ > static int read_user_stack_32(unsigned int __user *ptr, unsigned int *ret) > { > - int rc; > - > if ((unsigned long)ptr > TASK_SIZE - sizeof(unsigned int) || > ((unsigned long)ptr & 3)) > return -EFAULT; > > - pagefault_disable(); > - rc = __get_user_inatomic(*ret, ptr); > - pagefault_enable(); > - > - return rc; > + return probe_user_read(ret, ptr, sizeof(*ret)); > } > > static inline void perf_callchain_user_64(struct perf_callchain_entry_ctx *entry, > diff --git a/arch/powerpc/perf/core-book3s.c b/arch/powerpc/perf/core-book3s.c > index b0723002a396..4b64ddf0db68 100644 > --- a/arch/powerpc/perf/core-book3s.c > +++ b/arch/powerpc/perf/core-book3s.c > @@ -416,7 +416,6 @@ static void power_pmu_sched_task(struct perf_event_context *ctx, bool sched_in) > static __u64 power_pmu_bhrb_to(u64 addr) > { > unsigned int instr; > - int ret; > __u64 target; > > if (is_kernel_addr(addr)) { > @@ -427,13 +426,8 @@ static __u64 power_pmu_bhrb_to(u64 addr) > } > > /* Userspace: need copy instruction here then translate it */ > - pagefault_disable(); > - ret = __get_user_inatomic(instr, (unsigned int __user *)addr); > - if (ret) { > - pagefault_enable(); > + if (probe_user_read(&instr, (unsigned int __user *)addr, sizeof(instr))) > return 0; > - } > - pagefault_enable(); > > target = branch_target(&instr); > if ((!target) || (instr & BRANCH_ABSOLUTE)) > diff --git a/arch/powerpc/sysdev/fsl_pci.c b/arch/powerpc/sysdev/fsl_pci.c > index 918be816b097..c8a1b26489f5 100644 > --- a/arch/powerpc/sysdev/fsl_pci.c > +++ b/arch/powerpc/sysdev/fsl_pci.c > @@ -1068,13 +1068,11 @@ int fsl_pci_mcheck_exception(struct pt_regs *regs) > addr += mfspr(SPRN_MCAR); > > if (is_in_pci_mem_space(addr)) { > - if (user_mode(regs)) { > - pagefault_disable(); > - ret = get_user(inst, (__u32 __user *)regs->nip); > - pagefault_enable(); > - } else { > + if (user_mode(regs)) > + ret = probe_user_read(&inst, (void __user *)regs->nip, > + sizeof(inst)); > + else > ret = probe_kernel_address((void *)regs->nip, inst); > - } > > if (!ret && mcheck_handle_load(regs, inst)) { > regs->nip += 4; > -- > 2.13.3