From: "Christophe Leroy (CS GROUP)" <chleroy@kernel.org>
To: David Laight <david.laight.linux@gmail.com>
Cc: Michael Ellerman <mpe@ellerman.id.au>,
Nicholas Piggin <npiggin@gmail.com>,
Madhavan Srinivasan <maddy@linux.ibm.com>,
linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org
Subject: Re: [PATCH] powerpc: Simplify access_ok()
Date: Sun, 22 Mar 2026 20:02:56 +0100 [thread overview]
Message-ID: <833d9535-d241-4738-b5f6-28f9ec48329a@kernel.org> (raw)
In-Reply-To: <20260322110336.66cd54af@pumpkin>
Le 22/03/2026 à 12:03, David Laight a écrit :
> On Tue, 17 Mar 2026 19:07:04 +0100
> "Christophe Leroy (CS GROUP)" <chleroy@kernel.org> wrote:
>
>> With the implementation of masked user access, we always have a memory
>> gap between user memory space and kernel memory space, so use it to
>> simplify access_ok() by relying on access fault in case of an access
>> in the gap.
>>
>> Most of the time the size is known at build time.
>>
>> On powerpc64, the kernel space starts at 0x8000000000000000 which is
>> always more than two times TASK_USER_MAX so when the size is known at
>> build time and lower than TASK_USER_MAX, only the address needs to be
>> verified. If not, a binary or of address and size must be lower than
>> TASK_USER_MAX. As TASK_USER_MAX is a power of 2, just check that
>> there is no bit set outside of TASK_USER_MAX - 1 mask.
>>
>> On powerpc32, there is a garanteed gap of 128KB so when the size is
>> known at build time and not greater than 128KB, just check that the
>> address is below TASK_SIZE. Otherwise use the original formula.
>
> Given that the whole thing relies on the kernel code 'obeying the rules'
> is it enough to require that the accesses will be 'moderately sequential'?
> Provided there are no jumps greater than 128k the length can be ignored.
>
> I think Linus thought about doing that for x86-64.
You mean ignoring length completely ?
Yes we can probably do that on 64 bits. I don't know about x86_64 but
powerpc64 has TASK_USER < 0x0010000000000000 and kernel space is above
0x8000000000000000, so oring size with address and comparing it to
0x0010000000000000 doesn't add much cost compared to just comparing the
address.
>
> I can't imagine that happening unless there is code that probes the end of
> the user buffer before starting a transfer - and that is pretty pointless.
> > There are places that skip a few bytes (or just access in the wrong
order)
> but it is likely to be alignment padding, and code should be doing the
> access_ok() check for each fragment - not on the entire buffer.
I don't follow you. Why not for the entire buffer ? We try to minimise
amount of stac/clac (or equivalent) and access_ok() is associated with
stac. When we use access_begin/access_end we tend to try and regroup
everything in a single bloc.
>
>>
>> Signed-off-by: Christophe Leroy (CS GROUP) <chleroy@kernel.org>
>> ---
>> arch/powerpc/include/asm/uaccess.h | 26 ++++++++++++++++++++++++++
>> 1 file changed, 26 insertions(+)
>>
>> diff --git a/arch/powerpc/include/asm/uaccess.h b/arch/powerpc/include/asm/uaccess.h
>> index 570b3d91e2e4..ec210ae62be7 100644
>> --- a/arch/powerpc/include/asm/uaccess.h
>> +++ b/arch/powerpc/include/asm/uaccess.h
>> @@ -15,8 +15,34 @@
>> #define TASK_SIZE_MAX TASK_SIZE_USER64
>> #endif
>>
>> +#define __access_ok __access_ok
>> +
>> #include <asm-generic/access_ok.h>
>>
>> +/*
>> + * On powerpc64, TASK_SIZE_MAX is 0x0010000000000000 then even if both ptr and size
>> + * are TASK_SIZE_MAX we are still inside the memory gap. So make it simple.
>> + */
>> +static __always_inline int __access_ok(const void __user *ptr, unsigned long size)
>> +{
>> + unsigned long addr = (unsigned long)ptr;
>> +
>> + if (IS_ENABLED(CONFIG_PPC64)) {
>> + BUILD_BUG_ON(!is_power_of_2(TASK_SIZE_MAX));
>> + BUILD_BUG_ON(TASK_SIZE_MAX > 0x0010000000000000);
>> +
>> + if (__builtin_constant_p(size))
>> + return size <= TASK_SIZE_MAX && !(addr & ~(TASK_SIZE_MAX - 1));
>> + else
>> + return !((size | addr) & ~(TASK_SIZE_MAX - 1));
>
> The compiler may know an upper bound for 'size' even when it isn't a constant.
> It might be 32bit or from 'size = is_compat_foo ? 16 : 24', so:
> if (statically_true(size < TASK_SIZE_MAX)
> return !(addr & ~(TASK_SIZE_MAX - 1);
> return !((size | addr) & ~(TASK_SIZE_MAX - 1));
I think you are missing the case where size is constant and > TASK_SIZE_MAX.
Or maybe that case should be catched with a BUILD_BUG ?
Christophe
>
>> + } else {
>> + if (__builtin_constant_p(size) && size < SZ_128K)
>
> Again the compiler may know an upper bound even if the value isn't constant:
> if (statically_true(size < SZ_128K)
>
> David
>
>> + return addr < TASK_SIZE;
>> + else
>> + return size <= TASK_SIZE && addr <= TASK_SIZE - size);
>> + }
>> +}
>> +
>> /*
>> * These are the main single-value transfer routines. They automatically
>> * use the right size if we just have the right pointer type.
>
next prev parent reply other threads:[~2026-03-22 19:03 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-03-17 18:07 [PATCH] powerpc: Simplify access_ok() Christophe Leroy (CS GROUP)
2026-03-21 22:33 ` kernel test robot
2026-03-22 11:03 ` David Laight
2026-03-22 19:02 ` Christophe Leroy (CS GROUP) [this message]
2026-03-22 23:04 ` David Laight
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=833d9535-d241-4738-b5f6-28f9ec48329a@kernel.org \
--to=chleroy@kernel.org \
--cc=david.laight.linux@gmail.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linuxppc-dev@lists.ozlabs.org \
--cc=maddy@linux.ibm.com \
--cc=mpe@ellerman.id.au \
--cc=npiggin@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox