Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp341243ybb; Fri, 3 Apr 2020 03:53:11 -0700 (PDT) X-Google-Smtp-Source: APiQypJ7Uer1o01neAAUSwfxk/j7piAo9relvX4wV4fi8Se9O4k/lf4UdgtBhtuVxvMEWHTggr1L X-Received: by 2002:a9d:171a:: with SMTP id i26mr6040567ota.170.1585911191484; Fri, 03 Apr 2020 03:53:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585911191; cv=none; d=google.com; s=arc-20160816; b=wwJ1Ao5wCWRQ3GfNbJJTD24K+OlykMasJarYqiDWbWJPpqIfgOcCFvmnKZpf8fBJNw 9KKV2Eqhazzd4i8xKN+nOzYBY6CtXVDPdgLIF3a7Hjs1USmPxWX2G8lvlvoa+JnSUy+s 6x8RYTcIvja4w+y6PYlBMzyan9FqKEqCw38SnzoGoD4M+rV2MzQKeO7q7KoRwmqal11+ AQxlsmbTdSyaSD3UlXENjMrm5KScYnwvO8gbdfhXqXaltksYi0UivZW4KLGZwqN6Lac+ ncDm226P9QzgagrMZtuD5lyueZUXhEaNV9nEFeJJplDtHvFRXBYP0arxww7NddQJpwXZ 0NMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date; bh=43s6oxUFLLsb2oY7IGol3T9T/R7xybBhBowOdMvU/UE=; b=jySK0eagnd8VhjOVrqOVbxbmau7Fnz3FXe1IJoHoxd5dQfmbD01iy/TDvXxdwISlC/ xgLX0ugyswuMRA06mmor2pdheyQBIz2XcEfi4fzPHmatIa+WY6PUfOeZWdbcwdrz9yna SFngs522MSgP77siNLk7UXjIvWOIYGvi9yqMspyxXhFFs81iMGZZW/kgnumJqDViNh22 hgrqkhsBu+M6hfR3gX88hSZh2VbYGqYxrFE7/rKbcHPOkPBzqz6P3B3y3baJtQpYGiCd b+KyDZKEi+Yq4ydjhAU38ATdPfemK9Fioq3btMfmzTDCMwT3RoSo/QeyFKWCpdkugfjL TThw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g203si3470911oif.38.2020.04.03.03.52.57; Fri, 03 Apr 2020 03:53:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727968AbgDCKwl (ORCPT + 99 others); Fri, 3 Apr 2020 06:52:41 -0400 Received: from mx2.suse.de ([195.135.220.15]:40390 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727792AbgDCKwl (ORCPT ); Fri, 3 Apr 2020 06:52:41 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 69219AC92; Fri, 3 Apr 2020 10:52:37 +0000 (UTC) Date: Fri, 3 Apr 2020 12:52:34 +0200 From: Michal =?iso-8859-1?Q?Such=E1nek?= To: Nicholas Piggin Cc: Arnaldo Carvalho de Melo , Alexander Shishkin , Allison Randal , Andy Shevchenko , Arnd Bergmann , Thiago Jung Bauermann , Benjamin Herrenschmidt , Sebastian Andrzej Siewior , Claudio Carvalho , Christophe Leroy , "David S. Miller" , "Eric W. Biederman" , Eric Richter , Greg Kroah-Hartman , Gustavo Luiz Duarte , Hari Bathini , Jordan Niethe , Jiri Olsa , Jonathan Cameron , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, Mark Rutland , Masahiro Yamada , Mauro Carvalho Chehab , Michael Neuling , Ingo Molnar , Michael Ellerman , Namhyung Kim , Nayna Jain , Paul Mackerras , Peter Zijlstra , Rob Herring , Thomas Gleixner , Valentin Schneider , Alexander Viro Subject: Re: [PATCH v11 3/8] powerpc/perf: consolidate read_user_stack_32 Message-ID: <20200403105234.GX25468@kitsune.suse.cz> References: <20200225173541.1549955-1-npiggin@gmail.com> <184347595442b4ca664613008a09e8cea7188c36.1584620202.git.msuchanek@suse.de> <1585039473.da4762n2s0.astroid@bobo.none> <20200324193833.GH25468@kitsune.suse.cz> <1585896170.ohti800w9v.astroid@bobo.none> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1585896170.ohti800w9v.astroid@bobo.none> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, there are 3 variants of the function read_user_stack_64 32bit read_user_stack_32 64bit read_user_Stack_32 On Fri, Apr 03, 2020 at 05:13:25PM +1000, Nicholas Piggin wrote: > Michal Such?nek's on March 25, 2020 5:38 am: > > On Tue, Mar 24, 2020 at 06:48:20PM +1000, Nicholas Piggin wrote: > >> Michal Suchanek's on March 19, 2020 10:19 pm: > >> > There are two almost identical copies for 32bit and 64bit. > >> > > >> > The function is used only in 32bit code which will be split out in next > >> > patch so consolidate to one function. > >> > > >> > Signed-off-by: Michal Suchanek > >> > Reviewed-by: Christophe Leroy > >> > --- > >> > v6: new patch > >> > v8: move the consolidated function out of the ifdef block. > >> > v11: rebase on top of def0bfdbd603 > >> > --- > >> > arch/powerpc/perf/callchain.c | 48 +++++++++++++++++------------------ > >> > 1 file changed, 24 insertions(+), 24 deletions(-) > >> > > >> > diff --git a/arch/powerpc/perf/callchain.c b/arch/powerpc/perf/callchain.c > >> > index cbc251981209..c9a78c6e4361 100644 > >> > --- a/arch/powerpc/perf/callchain.c > >> > +++ b/arch/powerpc/perf/callchain.c > >> > @@ -161,18 +161,6 @@ static int read_user_stack_64(unsigned long __user *ptr, unsigned long *ret) > >> > return read_user_stack_slow(ptr, ret, 8); > >> > } > >> > > >> > -static int read_user_stack_32(unsigned int __user *ptr, unsigned int *ret) > >> > -{ > >> > - if ((unsigned long)ptr > TASK_SIZE - sizeof(unsigned int) || > >> > - ((unsigned long)ptr & 3)) > >> > - return -EFAULT; > >> > - > >> > - if (!probe_user_read(ret, ptr, sizeof(*ret))) > >> > - return 0; > >> > - > >> > - return read_user_stack_slow(ptr, ret, 4); > >> > -} > >> > - > >> > static inline int valid_user_sp(unsigned long sp, int is_64) > >> > { > >> > if (!sp || (sp & 7) || sp > (is_64 ? TASK_SIZE : 0x100000000UL) - 32) > >> > @@ -277,19 +265,9 @@ static void perf_callchain_user_64(struct perf_callchain_entry_ctx *entry, > >> > } > >> > > >> > #else /* CONFIG_PPC64 */ > >> > -/* > >> > - * On 32-bit we just access the address and let hash_page create a > >> > - * HPTE if necessary, so there is no need to fall back to reading > >> > - * the page tables. Since this is called at interrupt level, > >> > - * do_page_fault() won't treat a DSI as a page fault. > >> > - */ > >> > -static int read_user_stack_32(unsigned int __user *ptr, unsigned int *ret) > >> > +static int read_user_stack_slow(void __user *ptr, void *buf, int nb) > >> > { > >> > - if ((unsigned long)ptr > TASK_SIZE - sizeof(unsigned int) || > >> > - ((unsigned long)ptr & 3)) > >> > - return -EFAULT; > >> > - > >> > - return probe_user_read(ret, ptr, sizeof(*ret)); > >> > + return 0; > >> > } > >> > > >> > static inline void perf_callchain_user_64(struct perf_callchain_entry_ctx *entry, > >> > @@ -312,6 +290,28 @@ static inline int valid_user_sp(unsigned long sp, int is_64) > >> > > >> > #endif /* CONFIG_PPC64 */ > >> > > >> > +/* > >> > + * On 32-bit we just access the address and let hash_page create a > >> > + * HPTE if necessary, so there is no need to fall back to reading > >> > + * the page tables. Since this is called at interrupt level, > >> > + * do_page_fault() won't treat a DSI as a page fault. > >> > + */ > >> > >> The comment is actually probably better to stay in the 32-bit > >> read_user_stack_slow implementation. Is that function defined > >> on 32-bit purely so that you can use IS_ENABLED()? In that case > > It documents the IS_ENABLED() and that's where it is. The 32bit > > definition is only a technical detail. > > Sorry for the late reply, busy trying to fix bugs in the C rewrite > series. I don't think it is the right place, it should be in the > ppc32 implementation detail. ppc64 has an equivalent comment at the > top of its read_user_stack functions. > > >> I would prefer to put a BUG() there which makes it self documenting. > > Which will cause checkpatch complaints about introducing new BUG() which > > is frowned on. > > It's fine in this case, that warning is about not introducing > runtime bugs, but this wouldn't be. > > But... I actually don't like adding read_user_stack_slow on 32-bit > and especially not just to make IS_ENABLED work. > > IMO this would be better if you really want to consolidate it > > --- > > diff --git a/arch/powerpc/perf/callchain.c b/arch/powerpc/perf/callchain.c > index cbc251981209..ca3a599b3f54 100644 > --- a/arch/powerpc/perf/callchain.c > +++ b/arch/powerpc/perf/callchain.c > @@ -108,7 +108,7 @@ perf_callchain_kernel(struct perf_callchain_entry_ctx *entry, struct pt_regs *re > * interrupt context, so if the access faults, we read the page tables > * to find which page (if any) is mapped and access it directly. > */ > -static int read_user_stack_slow(void __user *ptr, void *buf, int nb) > +static int read_user_stack_slow(const void __user *ptr, void *buf, int nb) > { > int ret = -EFAULT; > pgd_t *pgdir; > @@ -149,28 +149,21 @@ static int read_user_stack_slow(void __user *ptr, void *buf, int nb) > return ret; > } > > -static int read_user_stack_64(unsigned long __user *ptr, unsigned long *ret) > +static int __read_user_stack(const void __user *ptr, void *ret, size_t size) > { > - if ((unsigned long)ptr > TASK_SIZE - sizeof(unsigned long) || > - ((unsigned long)ptr & 7)) > + if ((unsigned long)ptr > TASK_SIZE - size || > + ((unsigned long)ptr & (size - 1))) > return -EFAULT; > > - if (!probe_user_read(ret, ptr, sizeof(*ret))) > + if (!probe_user_read(ret, ptr, size)) > return 0; > > - return read_user_stack_slow(ptr, ret, 8); > + return read_user_stack_slow(ptr, ret, size); > } > > -static int read_user_stack_32(unsigned int __user *ptr, unsigned int *ret) > +static int read_user_stack_64(unsigned long __user *ptr, unsigned long *ret) > { > - if ((unsigned long)ptr > TASK_SIZE - sizeof(unsigned int) || > - ((unsigned long)ptr & 3)) > - return -EFAULT; > - > - if (!probe_user_read(ret, ptr, sizeof(*ret))) > - return 0; > - > - return read_user_stack_slow(ptr, ret, 4); > + return __read_user_stack(ptr, ret, sizeof(*ret)); > } > > static inline int valid_user_sp(unsigned long sp, int is_64) > @@ -283,13 +276,13 @@ static void perf_callchain_user_64(struct perf_callchain_entry_ctx *entry, > * the page tables. Since this is called at interrupt level, > * do_page_fault() won't treat a DSI as a page fault. > */ > -static int read_user_stack_32(unsigned int __user *ptr, unsigned int *ret) > +static int __read_user_stack(const void __user *ptr, void *ret, size_t size) > { > - if ((unsigned long)ptr > TASK_SIZE - sizeof(unsigned int) || > - ((unsigned long)ptr & 3)) > + if ((unsigned long)ptr > TASK_SIZE - size || > + ((unsigned long)ptr & (size - 1))) > return -EFAULT; > > - return probe_user_read(ret, ptr, sizeof(*ret)); > + return probe_user_read(ret, ptr, size); > } > > static inline void perf_callchain_user_64(struct perf_callchain_entry_ctx *entry, > @@ -312,6 +305,11 @@ static inline int valid_user_sp(unsigned long sp, int is_64) > > #endif /* CONFIG_PPC64 */ > > +static int read_user_stack_32(unsigned int __user *ptr, unsigned int *ret) > +{ > + return __read_user_stack(ptr, ret, sizeof(*ret)); Does not work for 64bit read_user_stack_32 ^ this should be 4. Other than that it should preserve the existing logic just fine. Thanks Michal