Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp250519pxf; Wed, 31 Mar 2021 23:32:45 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyj2GOQvNjIkzEc+yNIQezrP1AGaxNcQsOcYrU7KlYjJ+/13u/yTMa3q3f8G3ierHz9jWdz X-Received: by 2002:aa7:cb90:: with SMTP id r16mr8241986edt.139.1617258765450; Wed, 31 Mar 2021 23:32:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617258765; cv=none; d=google.com; s=arc-20160816; b=qGRzui2x5gCy4azYHeMgE5rUTr3ccSB7Mh64ymo6hn0o1S902Gc5dCZP4gHt9eax8X XkzlS2yfxYsiMNbTvyjKjzUkrXL5oAOXr3tBZOz4A3zsiC18GxQVy10R7/qBJc+lfAjk MMGaIXcOGonUjS3Klp95uxZ0fpOYfi6ZnW2fOvCmCjA6qFw6pdXTsrsqjf3dE15SvFce pgpAZn/0Hi18hDfoTe9CT/z0gJujq9rCpcClnDtHK9UGhosxjbkt0OlILIEaDLVWg9ln 25d09lLJI5bL7oE3A5TrAH1fWFAlHJGNRbEmae+0s0loVoqML2eT5WlaE1hARlpn/sxL D3OQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=HPzewnjDs80v5PUk9eoH8OiXA4V8NFC8kF3bYl4//yI=; b=TG2E3VUl7ZCJhWE6BjVGhGp1RzoNY2VM2XYeGL+93x2VwVPD9LFoAd5g9qd3tctdla 8kqvyc0uz1M/SfQNd+ibV+GNSymZPZhD3Ad+fQYrUwsKLDdUjCE0A1uA1p0WuHr22ST3 48HnSyd1ne4LcbLcE5atjP44p3pHi1VlIDT1RGWudl8AI4kQIfuYp7JcYKagnu2lu1/l 46urq1nDRv7kPdfst09EeXA29gEnghc02WSHydOAQO5723Wg7cYmdh66Cgyv30Dw/agQ NvCc3VYdUod6OJPeEJTH0KSZQLONTcs9QBqeNyRQ6eLsGXjVsJt2JKJxQXBt5uUGkqWw vflw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id qt26si3471799ejb.216.2021.03.31.23.32.21; Wed, 31 Mar 2021 23:32:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232585AbhDAGbB (ORCPT + 99 others); Thu, 1 Apr 2021 02:31:01 -0400 Received: from verein.lst.de ([213.95.11.211]:38315 "EHLO verein.lst.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232596AbhDAGa5 (ORCPT ); Thu, 1 Apr 2021 02:30:57 -0400 Received: by verein.lst.de (Postfix, from userid 2407) id 9097268BEB; Thu, 1 Apr 2021 08:30:55 +0200 (CEST) Date: Thu, 1 Apr 2021 08:30:55 +0200 From: Christoph Hellwig To: Thomas Bogendoerfer Cc: linux-mips@vger.kernel.org, linux-kernel@vger.kernel.org, hch@lst.de Subject: Re: [PATCH v2 3/4] MIPS: uaccess: Remove get_fs/set_fs call sites Message-ID: <20210401063055.GB25514@lst.de> References: <20210331115603.146159-1-tsbogend@alpha.franken.de> <20210331115603.146159-4-tsbogend@alpha.franken.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210331115603.146159-4-tsbogend@alpha.franken.de> User-Agent: Mutt/1.5.17 (2007-11-01) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Mar 31, 2021 at 01:56:00PM +0200, Thomas Bogendoerfer wrote: > +#define __get_user_nofault(dst, src, type, err_label) \ > +do { \ > + int __gu_err; \ > + \ > + __get_user_common(*((type *)(dst)), sizeof(type), \ > + (__force type *)(src)); \ > + if (unlikely(__gu_err)) \ > + goto err_label; \ > +} while (0) > + > + > +static inline int __get_addr(unsigned long *a, unsigned long *p, bool user) > +{ > + if (user) > + __get_user_nofault(a, p, unsigned long, fault); > + else > + __get_kernel_nofault(a, p, unsigned long, fault); > + > + return 0; > + > +fault: > + return -EFAULT; > +} Why can't these use plain old get_user and get_kernel_nofault? You "optimize" away the access_ok / get_kernel_nofaul_allowed checks here, but now use totally non-standard and possibly dangerous APIs.