]> www.infradead.org Git - linux-platform-drivers-x86.git/commitdiff
powerpc/32: Remove ksp_limit
authorChristophe Leroy <christophe.leroy@csgroup.eu>
Fri, 12 Mar 2021 12:50:21 +0000 (12:50 +0000)
committerMichael Ellerman <mpe@ellerman.id.au>
Mon, 29 Mar 2021 02:22:05 +0000 (13:22 +1100)
ksp_limit is there to help detect stack overflows.
That is specific to ppc32 as it was removed from ppc64 in
commit cbc9565ee826 ("powerpc: Remove ksp_limit on ppc64").

There are other means for detecting stack overflows.

As ppc64 has proven to not need it, ppc32 should be able to do
without it too.

Lets remove it and simplify exception handling.

Signed-off-by: Christophe Leroy <christophe.leroy@csgroup.eu>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/d789c3385b22e07bedc997613c0d26074cb513e7.1615552866.git.christophe.leroy@csgroup.eu
arch/powerpc/include/asm/processor.h
arch/powerpc/kernel/asm-offsets.c
arch/powerpc/kernel/entry_32.S
arch/powerpc/kernel/head_40x.S
arch/powerpc/kernel/head_booke.h
arch/powerpc/kernel/misc_32.S
arch/powerpc/kernel/process.c
arch/powerpc/kernel/traps.c
arch/powerpc/lib/sstep.c

index 8acc3590c9712b6f636d9d0c1d6ef68db962d2a3..43cbd9281055a372086c8b0a90d85529df4bf6cf 100644 (file)
@@ -144,7 +144,6 @@ struct thread_struct {
 #endif
 #ifdef CONFIG_PPC32
        void            *pgdir;         /* root of page-table tree */
-       unsigned long   ksp_limit;      /* if ksp <= ksp_limit stack overflow */
 #ifdef CONFIG_PPC_RTAS
        unsigned long   rtas_sp;        /* stack pointer for when in RTAS */
 #endif
@@ -282,7 +281,6 @@ struct thread_struct {
 #ifdef CONFIG_PPC32
 #define INIT_THREAD { \
        .ksp = INIT_SP, \
-       .ksp_limit = INIT_SP_LIMIT, \
        .pgdir = swapper_pg_dir, \
        .fpexc_mode = MSR_FE0 | MSR_FE1, \
        SPEFSCR_INIT \
index f3a662201a9fbdaa36aa615c7d58215f21d1fe64..73620536c801011df3a9be6a27ef799f11349488 100644 (file)
@@ -91,7 +91,6 @@ int main(void)
        DEFINE(SIGSEGV, SIGSEGV);
        DEFINE(NMI_MASK, NMI_MASK);
 #else
-       OFFSET(KSP_LIMIT, thread_struct, ksp_limit);
 #ifdef CONFIG_PPC_RTAS
        OFFSET(RTAS_SP, thread_struct, rtas_sp);
 #endif
@@ -381,7 +380,6 @@ int main(void)
        DEFINE(_CSRR1, STACK_INT_FRAME_SIZE+offsetof(struct exception_regs, csrr1));
        DEFINE(_DSRR0, STACK_INT_FRAME_SIZE+offsetof(struct exception_regs, dsrr0));
        DEFINE(_DSRR1, STACK_INT_FRAME_SIZE+offsetof(struct exception_regs, dsrr1));
-       DEFINE(SAVED_KSP_LIMIT, STACK_INT_FRAME_SIZE+offsetof(struct exception_regs, saved_ksp_limit));
 #endif
 #endif
 
index 4ffbcf3df72e9da29f5ede68fe207cdb4a83b899..66198e6e25e7a0eedc7c088b61c00166a3dc6597 100644 (file)
@@ -94,12 +94,6 @@ crit_transfer_to_handler:
        mfspr   r0,SPRN_SRR1
        stw     r0,_SRR1(r11)
 
-       /* set the stack limit to the current stack */
-       mfspr   r8,SPRN_SPRG_THREAD
-       lwz     r0,KSP_LIMIT(r8)
-       stw     r0,SAVED_KSP_LIMIT(r11)
-       rlwinm  r0,r1,0,0,(31 - THREAD_SHIFT)
-       stw     r0,KSP_LIMIT(r8)
        /* fall through */
 _ASM_NOKPROBE_SYMBOL(crit_transfer_to_handler)
 #endif
@@ -107,12 +101,6 @@ _ASM_NOKPROBE_SYMBOL(crit_transfer_to_handler)
 #ifdef CONFIG_40x
        .globl  crit_transfer_to_handler
 crit_transfer_to_handler:
-       /* set the stack limit to the current stack */
-       mfspr   r8,SPRN_SPRG_THREAD
-       lwz     r0,KSP_LIMIT(r8)
-       stw     r0,saved_ksp_limit@l(0)
-       rlwinm  r0,r1,0,0,(31 - THREAD_SHIFT)
-       stw     r0,KSP_LIMIT(r8)
        /* fall through */
 _ASM_NOKPROBE_SYMBOL(crit_transfer_to_handler)
 #endif
@@ -151,17 +139,10 @@ transfer_to_handler:
 #endif
        b       3f
 
-2:     /* if from kernel, check interrupted DOZE/NAP mode and
-         * check for stack overflow
-         */
+       /* if from kernel, check interrupted DOZE/NAP mode */
+2:
        kuap_save_and_lock r11, r12, r9, r2, r6
        addi    r2, r12, -THREAD
-#ifndef CONFIG_VMAP_STACK
-       lwz     r9,KSP_LIMIT(r12)
-       cmplw   r1,r9                   /* if r1 <= ksp_limit */
-       ble-    stack_ovf               /* then the kernel stack overflowed */
-#endif
-5:
 #if defined(CONFIG_PPC_BOOK3S_32) || defined(CONFIG_E500)
        lwz     r12,TI_LOCAL_FLAGS(r2)
        mtcrf   0x01,r12
@@ -204,37 +185,6 @@ transfer_to_handler_cont:
 _ASM_NOKPROBE_SYMBOL(transfer_to_handler)
 _ASM_NOKPROBE_SYMBOL(transfer_to_handler_cont)
 
-#ifndef CONFIG_VMAP_STACK
-/*
- * On kernel stack overflow, load up an initial stack pointer
- * and call StackOverflow(regs), which should not return.
- */
-stack_ovf:
-       /* sometimes we use a statically-allocated stack, which is OK. */
-       lis     r12,_end@h
-       ori     r12,r12,_end@l
-       cmplw   r1,r12
-       ble     5b                      /* r1 <= &_end is OK */
-       SAVE_NVGPRS(r11)
-       addi    r3,r1,STACK_FRAME_OVERHEAD
-       lis     r1,init_thread_union@ha
-       addi    r1,r1,init_thread_union@l
-       addi    r1,r1,THREAD_SIZE-STACK_FRAME_OVERHEAD
-       lis     r9,StackOverflow@ha
-       addi    r9,r9,StackOverflow@l
-       LOAD_REG_IMMEDIATE(r10,MSR_KERNEL)
-#if defined(CONFIG_PPC_8xx) && defined(CONFIG_PERF_EVENTS)
-       mtspr   SPRN_NRI, r0
-#endif
-       mtspr   SPRN_SRR0,r9
-       mtspr   SPRN_SRR1,r10
-       rfi
-#ifdef CONFIG_40x
-       b .     /* Prevent prefetch past rfi */
-#endif
-_ASM_NOKPROBE_SYMBOL(stack_ovf)
-#endif
-
        .globl  transfer_to_syscall
 transfer_to_syscall:
        SAVE_NVGPRS(r1)
@@ -815,11 +765,6 @@ _ASM_NOKPROBE_SYMBOL(exc_exit_restart)
 #ifdef CONFIG_40x
        .globl  ret_from_crit_exc
 ret_from_crit_exc:
-       mfspr   r9,SPRN_SPRG_THREAD
-       lis     r10,saved_ksp_limit@ha;
-       lwz     r10,saved_ksp_limit@l(r10);
-       tovirt(r9,r9);
-       stw     r10,KSP_LIMIT(r9)
        lis     r9,crit_srr0@ha;
        lwz     r9,crit_srr0@l(r9);
        lis     r10,crit_srr1@ha;
@@ -833,9 +778,6 @@ _ASM_NOKPROBE_SYMBOL(ret_from_crit_exc)
 #ifdef CONFIG_BOOKE
        .globl  ret_from_crit_exc
 ret_from_crit_exc:
-       mfspr   r9,SPRN_SPRG_THREAD
-       lwz     r10,SAVED_KSP_LIMIT(r1)
-       stw     r10,KSP_LIMIT(r9)
        RESTORE_xSRR(SRR0,SRR1);
        RESTORE_MMU_REGS;
        RET_FROM_EXC_LEVEL(SPRN_CSRR0, SPRN_CSRR1, PPC_RFCI)
@@ -843,9 +785,6 @@ _ASM_NOKPROBE_SYMBOL(ret_from_crit_exc)
 
        .globl  ret_from_debug_exc
 ret_from_debug_exc:
-       mfspr   r9,SPRN_SPRG_THREAD
-       lwz     r10,SAVED_KSP_LIMIT(r1)
-       stw     r10,KSP_LIMIT(r9)
        RESTORE_xSRR(SRR0,SRR1);
        RESTORE_xSRR(CSRR0,CSRR1);
        RESTORE_MMU_REGS;
@@ -854,9 +793,6 @@ _ASM_NOKPROBE_SYMBOL(ret_from_debug_exc)
 
        .globl  ret_from_mcheck_exc
 ret_from_mcheck_exc:
-       mfspr   r9,SPRN_SPRG_THREAD
-       lwz     r10,SAVED_KSP_LIMIT(r1)
-       stw     r10,KSP_LIMIT(r9)
        RESTORE_xSRR(SRR0,SRR1);
        RESTORE_xSRR(CSRR0,CSRR1);
        RESTORE_xSRR(DSRR0,DSRR1);
index 4bf0aee858eb4ac002b2385557e9999e7cc07bdd..72e4962902deadc0436228b327dbdf20e441aae6 100644 (file)
@@ -95,8 +95,6 @@ _ENTRY(crit_dear)
        .space  4
 _ENTRY(crit_esr)
        .space  4
-_ENTRY(saved_ksp_limit)
-       .space  4
 
 /*
  * Exception prolog for critical exceptions.  This is a little different
index 47857795f50a64c4501406cb344cfb96bacba6dc..4a5f0c9b652b16679d0b13767a7628a8efabd13a 100644 (file)
@@ -481,7 +481,6 @@ struct exception_regs {
        unsigned long csrr1;
        unsigned long dsrr0;
        unsigned long dsrr1;
-       unsigned long saved_ksp_limit;
 };
 
 /* ensure this structure is always sized to a multiple of the stack alignment */
index 717e658b90fd845af254e60f3fec065b003dda51..acc410043b965667f498180494e18e5e92c05fb9 100644 (file)
 
        .text
 
-/*
- * We store the saved ksp_limit in the unused part
- * of the STACK_FRAME_OVERHEAD
- */
 _GLOBAL(call_do_softirq)
        mflr    r0
        stw     r0,4(r1)
-       lwz     r10,THREAD+KSP_LIMIT(r2)
-       stw     r3, THREAD+KSP_LIMIT(r2)
        stwu    r1,THREAD_SIZE-STACK_FRAME_OVERHEAD(r3)
        mr      r1,r3
-       stw     r10,8(r1)
        bl      __do_softirq
-       lwz     r10,8(r1)
        lwz     r1,0(r1)
        lwz     r0,4(r1)
-       stw     r10,THREAD+KSP_LIMIT(r2)
        mtlr    r0
        blr
 
@@ -53,16 +44,11 @@ _GLOBAL(call_do_softirq)
 _GLOBAL(call_do_irq)
        mflr    r0
        stw     r0,4(r1)
-       lwz     r10,THREAD+KSP_LIMIT(r2)
-       stw     r4, THREAD+KSP_LIMIT(r2)
        stwu    r1,THREAD_SIZE-STACK_FRAME_OVERHEAD(r4)
        mr      r1,r4
-       stw     r10,8(r1)
        bl      __do_irq
-       lwz     r10,8(r1)
        lwz     r1,0(r1)
        lwz     r0,4(r1)
-       stw     r10,THREAD+KSP_LIMIT(r2)
        mtlr    r0
        blr
 
index afb334dfb6a89fe6df4b8ecf962cda975b155e48..5b30df7b1b79bdf07efe4a338a4705be086e23b5 100644 (file)
@@ -1725,9 +1725,6 @@ int copy_thread(unsigned long clone_flags, unsigned long usp,
        kregs = (struct pt_regs *) sp;
        sp -= STACK_FRAME_OVERHEAD;
        p->thread.ksp = sp;
-#ifdef CONFIG_PPC32
-       p->thread.ksp_limit = (unsigned long)end_of_stack(p);
-#endif
 #ifdef CONFIG_HAVE_HW_BREAKPOINT
        for (i = 0; i < nr_wp_slots(); i++)
                p->thread.ptrace_bps[i] = NULL;
index bb1387351b8f769b4b3365a1ae27e492429b51e3..286b3a6b5c5e242d46d087e4dca406f00ba5f129 100644 (file)
@@ -1605,15 +1605,6 @@ bad:
                bad_page_fault(regs, sig);
 }
 
-DEFINE_INTERRUPT_HANDLER(StackOverflow)
-{
-       pr_crit("Kernel stack overflow in process %s[%d], r1=%lx\n",
-               current->comm, task_pid_nr(current), regs->gpr[1]);
-       debugger(regs);
-       show_regs(regs);
-       panic("kernel stack overflow");
-}
-
 DEFINE_INTERRUPT_HANDLER(stack_overflow_exception)
 {
        die("Kernel stack overflow", regs, SIGSEGV);
index c6aebc149d14129ca17a23a1d289bb8cde827131..739ea6dc461c3a27056ceb3a69cfdc8e63d504a7 100644 (file)
@@ -3086,15 +3086,6 @@ NOKPROBE_SYMBOL(analyse_instr);
  */
 static nokprobe_inline int handle_stack_update(unsigned long ea, struct pt_regs *regs)
 {
-#ifdef CONFIG_PPC32
-       /*
-        * Check if we will touch kernel stack overflow
-        */
-       if (ea - STACK_INT_FRAME_SIZE <= current->thread.ksp_limit) {
-               printk(KERN_CRIT "Can't kprobe this since kernel stack would overflow.\n");
-               return -EINVAL;
-       }
-#endif /* CONFIG_PPC32 */
        /*
         * Check if we already set since that means we'll
         * lose the previous value.