Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp240155yba; Wed, 17 Apr 2019 23:56:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqxMWL9i8hj7XBeMypOHVS0BGlG0Q/ZI0rzwx0Yulh/QpAnylzuaem5L06lKe1O1GKQ4oDgz X-Received: by 2002:a65:62d2:: with SMTP id m18mr87319515pgv.122.1555570566442; Wed, 17 Apr 2019 23:56:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555570566; cv=none; d=google.com; s=arc-20160816; b=jTdaqXS0KTVgTN1uiZyOBSM6RRg97cBJX5OhZrl6iArk5/t4KDzfAjfhq2JqUv+HUi K/FQUlrUWvdiZ29nyS8zABVveEh8iV+DuES7zzbiWkkBkIxxzu+1i1vuKp5E6VMsnyD/ 7oKUh8D01MVb4SPcwtrwHZYbu5e/NJVjMnYvfGpS98SdkV6d2IIXRq8HBj6/ydBmNp47 w3cMF8gKWalOVFH3sATKk8HmJRusV6jI7GKrobi/5xB/syOxtiiJMCeiuWXclYS7lYWT Rnkyeby3r7ItKpLzoigQ8pSw0Wof4PULWcLllIowBCB8LAn7yk6aC26ZMgPLNctmVwSe VLJA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:references :in-reply-to:subject:cc:to:from; bh=dWYo0aRxp1CsPR+tOTPcVLgGEwUVAcUkihAM1UO7n74=; b=sz5SK9uR7TChTtFCI29qTqDXibEbfT6e0m7hTm3rQklTAeAYvwkuxIRSghTsDFJ4Ux wULei6aoUw7Wv80JssBD8MelKEyuQbwyGDJU4uxK59dt8aLcwXpaATIbY9o3CqOFla8Y rr7RW8MDKxfoQnPyMnd3huTGswjzhrCQF3z99i9D401SZqhu+/EubaAFI3Vyt/jB42bR YbnRnqEt9IcLfsUE7fVx40wVAIaVTev7dbAIm5+ikLI/nDRYCO/Wc/neU0giwQJaOUzC d+N7sE94ahdvNQWpNLqaB0Rn4kxIVdd2rPI8rY23yrMVsyqUqLvLspasXrBQReD50p64 VCWg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f20si1439135pfd.51.2019.04.17.23.55.50; Wed, 17 Apr 2019 23:56:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388066AbfDRGxn (ORCPT + 99 others); Thu, 18 Apr 2019 02:53:43 -0400 Received: from ozlabs.org ([203.11.71.1]:55555 "EHLO ozlabs.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725886AbfDRGxn (ORCPT ); Thu, 18 Apr 2019 02:53:43 -0400 Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 44l8vm6N9Gz9s4V; Thu, 18 Apr 2019 16:53:40 +1000 (AEST) From: Michael Ellerman To: Christophe Leroy , Benjamin Herrenschmidt , Paul Mackerras , ruscur@russell.cc Cc: linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Subject: Re: [PATCH v2 07/10] powerpc/8xx: Add Kernel Userspace Access Protection In-Reply-To: References: Date: Thu, 18 Apr 2019 16:53:40 +1000 Message-ID: <87k1fru7m3.fsf@concordia.ellerman.id.au> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Christophe Leroy writes: > diff --git a/arch/powerpc/include/asm/nohash/32/kup-8xx.h b/arch/powerpc/include/asm/nohash/32/kup-8xx.h > new file mode 100644 > index 000000000000..a44cc6c1b901 > --- /dev/null > +++ b/arch/powerpc/include/asm/nohash/32/kup-8xx.h > @@ -0,0 +1,68 @@ > +/* SPDX-License-Identifier: GPL-2.0 */ > +#ifndef _ASM_POWERPC_KUP_8XX_H_ > +#define _ASM_POWERPC_KUP_8XX_H_ > + > +#include > + > +#ifdef CONFIG_PPC_KUAP > + > +#ifdef __ASSEMBLY__ > + > +.macro kuap_save_and_lock sp, thread, gpr1, gpr2, gpr3 > + lis \gpr2, MD_APG_KUAP@h /* only APG0 and APG1 are used */ > + mfspr \gpr1, SPRN_MD_AP > + mtspr SPRN_MD_AP, \gpr2 > + stw \gpr1, STACK_REGS_KUAP(\sp) > +.endm > + > +.macro kuap_restore sp, current, gpr1, gpr2, gpr3 > + lwz \gpr1, STACK_REGS_KUAP(\sp) > + mtspr SPRN_MD_AP, \gpr1 > +.endm > + > +.macro kuap_check current, gpr > +#ifdef CONFIG_PPC_KUAP_DEBUG > + mfspr \gpr, SPRN_MD_AP > + rlwinm \gpr, \gpr, 16, 0xffff > +999: twnei \gpr, MD_APG_KUAP@h > + EMIT_BUG_ENTRY 999b, __FILE__, __LINE__, (BUGFLAG_WARNING | BUGFLAG_ONCE) > +#endif > +.endm > + > +#else /* !__ASSEMBLY__ */ > + > +#include > + > +static inline void allow_user_access(void __user *to, const void __user *from, > + unsigned long size) > +{ > + mtspr(SPRN_MD_AP, MD_APG_INIT); > +} > + > +static inline void prevent_user_access(void __user *to, const void __user *from, > + unsigned long size) > +{ > + mtspr(SPRN_MD_AP, MD_APG_KUAP); > +} > + > +static inline void allow_read_from_user(const void __user *from, unsigned long size) > +{ > + allow_user_access(NULL, from, size); > +} > + > +static inline void allow_write_to_user(void __user *to, unsigned long size) > +{ > + allow_user_access(to, NULL, size); > +} I dropped the two above functions when rebasing on my v6. cheers