Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp1153268pxj; Fri, 11 Jun 2021 23:31:47 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzhwCOpRoCihMJTKZYI4BvRLE4jNMiLUQW2mdQ1oFPlncMLcQdgSyG3SSf+fED9vpGgF5Kw X-Received: by 2002:a17:907:33d0:: with SMTP id zk16mr6829756ejb.144.1623479507491; Fri, 11 Jun 2021 23:31:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1623479507; cv=none; d=google.com; s=arc-20160816; b=m6xVl9l6mzzBx64HhNFHT41TKP9XqPIId58d3NgTcvcusUq2EI0KmojxrKLptnjMkQ XL80tHAxx8mXIGrhkFZihBb0EZrKIIpCRjyvS+nEgXa4nEkaz+bBltvgjfHYntidgjqQ n3WG6tpUPUjXivVPIZjXYwe7PJcqcqXKFIObHl5xxy0Cvfg/N30vfDs4w3impZyAxVaA wRHG8nmr1Z67fefqRPbNC7fSitp7IVAaRmJjVM+rqiSUAAomJBZloiv3I1t4qd1jzEuZ ZNBMhqsk+5x/3L+gTlvKTrDKfEKkObam4BeK4zgRGZz6bZstYWsx2EBRxqyyCYzgDNSH 9UGQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:references:cc :to:from:subject; bh=LOOXzw+5C6djHbS7WNYKZd1biPspExxRSNtq7+GxPME=; b=GCUE5aRhpQ+o1cJKlYpZNDImv3H8hkp4kOggbeHIMNaORfaUmJZyOvWmeo/sVF7+1h J9CNSxKlBtki66Rqtw1TIAx0+OvwMIgiXEsTs5Aaw1RVPi/NhTVTSoK1lnhHwOErgSe7 TJKWZf10smspUeBCTTDnVbbOGrzJChU64wdCtsOSbJI4Ec2PuIh5xtmChhnoMJiRA6PJ oJem+MMi5Stx24YXSgRniV2NSs7DJfgTUqC9ZrxTmRPGIRKT16VIUEOTqxBg8G9VrtwK 5huzzDocLthVAJGKhEHXFfULqJfNSKkOexZeXIaJv8EazoYTe8q+RIZXTVAIQLc+tTyA +V3A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id de12si6765670ejc.296.2021.06.11.23.30.55; Fri, 11 Jun 2021 23:31:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230012AbhFLGUt (ORCPT + 99 others); Sat, 12 Jun 2021 02:20:49 -0400 Received: from pegase1.c-s.fr ([93.17.236.30]:8895 "EHLO pegase1.c-s.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229446AbhFLGUt (ORCPT ); Sat, 12 Jun 2021 02:20:49 -0400 Received: from localhost (mailhub3.si.c-s.fr [192.168.12.233]) by localhost (Postfix) with ESMTP id 4G26wm2nXvzBD9b; Sat, 12 Jun 2021 08:18:48 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from pegase1.c-s.fr ([192.168.12.234]) by localhost (pegase1.c-s.fr [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QlCphcttEh5f; Sat, 12 Jun 2021 08:18:48 +0200 (CEST) Received: from messagerie.si.c-s.fr (messagerie.si.c-s.fr [192.168.25.192]) by pegase1.c-s.fr (Postfix) with ESMTP id 4G26wk5B2tzBD9Y; Sat, 12 Jun 2021 08:18:46 +0200 (CEST) Received: from localhost (localhost [127.0.0.1]) by messagerie.si.c-s.fr (Postfix) with ESMTP id A81AB8B772; Sat, 12 Jun 2021 08:18:46 +0200 (CEST) X-Virus-Scanned: amavisd-new at c-s.fr Received: from messagerie.si.c-s.fr ([127.0.0.1]) by localhost (messagerie.si.c-s.fr [127.0.0.1]) (amavisd-new, port 10023) with ESMTP id lY-zE4bzAve2; Sat, 12 Jun 2021 08:18:46 +0200 (CEST) Received: from [192.168.4.90] (unknown [192.168.4.90]) by messagerie.si.c-s.fr (Postfix) with ESMTP id 220D58B763; Sat, 12 Jun 2021 08:18:46 +0200 (CEST) Subject: Re: [PATCH v2 08/12] powerpc/32s: Allow disabling KUAP at boot time From: Christophe Leroy To: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman Cc: linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org References: Message-ID: Date: Sat, 12 Jun 2021 08:18:44 +0200 User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: fr Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Le 03/06/2021 à 10:41, Christophe Leroy a écrit : > PPC64 uses MMU features to enable/disable KUAP at boot time. > But feature fixups are applied way too early on PPC32. > > Now that all KUAP related actions are in C following the > conversion of KUAP initial setup and context switch in C, > static branches can be used to enable/disable KUAP. > > Signed-off-by: Christophe Leroy > --- > arch/powerpc/include/asm/book3s/32/kup.h | 27 +++++++++++++++++++++++- > arch/powerpc/mm/book3s32/kuap.c | 11 ++++++---- > 2 files changed, 33 insertions(+), 5 deletions(-) > > diff --git a/arch/powerpc/include/asm/book3s/32/kup.h b/arch/powerpc/include/asm/book3s/32/kup.h > index 2854d970dabe..68fbe28c6d7e 100644 > --- a/arch/powerpc/include/asm/book3s/32/kup.h > +++ b/arch/powerpc/include/asm/book3s/32/kup.h > @@ -9,11 +9,12 @@ > > #include > > +extern struct static_key_false disable_kuap_key; Same as 8xx, this needs to be exported for modules. > extern struct static_key_false disable_kuep_key; > > static __always_inline bool kuap_is_disabled(void) > { > - return !IS_ENABLED(CONFIG_PPC_KUAP); > + return !IS_ENABLED(CONFIG_PPC_KUAP) || static_branch_unlikely(&disable_kuap_key); > } > > static __always_inline bool kuep_is_disabled(void) > @@ -62,6 +63,9 @@ static inline void kuap_save_and_lock(struct pt_regs *regs) > u32 addr = kuap & 0xf0000000; > u32 end = kuap << 28; > > + if (kuap_is_disabled()) > + return; > + > regs->kuap = kuap; > if (unlikely(!kuap)) > return; > @@ -79,6 +83,9 @@ static inline void kuap_kernel_restore(struct pt_regs *regs, unsigned long kuap) > u32 addr = regs->kuap & 0xf0000000; > u32 end = regs->kuap << 28; > > + if (kuap_is_disabled()) > + return; > + > current->thread.kuap = regs->kuap; > > if (unlikely(regs->kuap == kuap)) > @@ -91,6 +98,9 @@ static inline unsigned long kuap_get_and_assert_locked(void) > { > unsigned long kuap = current->thread.kuap; > > + if (kuap_is_disabled()) > + return 0; > + > WARN_ON_ONCE(IS_ENABLED(CONFIG_PPC_KUAP_DEBUG) && kuap != 0); > > return kuap; > @@ -106,6 +116,9 @@ static __always_inline void allow_user_access(void __user *to, const void __user > { > u32 addr, end; > > + if (kuap_is_disabled()) > + return; > + > BUILD_BUG_ON(!__builtin_constant_p(dir)); > BUILD_BUG_ON(dir & ~KUAP_READ_WRITE); > > @@ -128,6 +141,9 @@ static __always_inline void prevent_user_access(void __user *to, const void __us > { > u32 addr, end; > > + if (kuap_is_disabled()) > + return; > + > BUILD_BUG_ON(!__builtin_constant_p(dir)); > > if (dir & KUAP_CURRENT_WRITE) { > @@ -159,6 +175,9 @@ static inline unsigned long prevent_user_access_return(void) > unsigned long end = flags << 28; > void __user *to = (__force void __user *)addr; > > + if (kuap_is_disabled()) > + return 0; > + > if (flags) > prevent_user_access(to, to, end - addr, KUAP_READ_WRITE); > > @@ -171,6 +190,9 @@ static inline void restore_user_access(unsigned long flags) > unsigned long end = flags << 28; > void __user *to = (__force void __user *)addr; > > + if (kuap_is_disabled()) > + return; > + > if (flags) > allow_user_access(to, to, end - addr, KUAP_READ_WRITE); > } > @@ -181,6 +203,9 @@ bad_kuap_fault(struct pt_regs *regs, unsigned long address, bool is_write) > unsigned long begin = regs->kuap & 0xf0000000; > unsigned long end = regs->kuap << 28; > > + if (kuap_is_disabled()) > + return false; > + > return is_write && (address < begin || address >= end); > } > > diff --git a/arch/powerpc/mm/book3s32/kuap.c b/arch/powerpc/mm/book3s32/kuap.c > index 5533ed92ab3d..a4ce6cdc28e5 100644 > --- a/arch/powerpc/mm/book3s32/kuap.c > +++ b/arch/powerpc/mm/book3s32/kuap.c > @@ -3,15 +3,18 @@ > #include > #include > > +struct static_key_false disable_kuap_key; > + > void __init setup_kuap(bool disabled) > { > - kuap_update_sr(mfsr(0) | SR_KS, 0, TASK_SIZE); > + if (!disabled) > + kuap_update_sr(mfsr(0) | SR_KS, 0, TASK_SIZE); > > if (smp_processor_id() != boot_cpuid) > return; > > - pr_info("Activating Kernel Userspace Access Protection\n"); > - > if (disabled) > - pr_warn("KUAP cannot be disabled yet on 6xx when compiled in\n"); > + static_branch_enable(&disable_kuap_key); > + else > + pr_info("Activating Kernel Userspace Access Protection\n"); > } >