[PATCH v2 04/12] powerpc/dexcr: Handle hashchk exception

Russell Currey ruscur at russell.cc
Mon May 8 14:00:46 AEST 2023


On Thu, 2023-03-30 at 16:50 +1100, Benjamin Gray wrote:
> Recognise and pass the appropriate signal to the user program when a
> hashchk instruction triggers. This is independent of allowing
> configuration of DEXCR[NPHIE], as a hypervisor can enforce this
> aspect
> regardless of the kernel.
> 
> The signal mirrors how ARM reports their similar check failure. For
> example, their FPAC handler in arch/arm64/kernel/traps.c
> do_el0_fpac()
> does this. When we fail to read the instruction that caused the fault
> we send a segfault, similar to how emulate_math() does it.
> 
> Signed-off-by: Benjamin Gray <bgray at linux.ibm.com>
> 
> ---
> 
> v1:     * Refactor the hashchk check to return 0 on success, an error
>           code on failure. Determine what to do based on specific
> error
>           code.

0 on success makes sense, but it's not exactly obvious what "success"
is in this case.

>         * Motivate signal and code
> ---
>  arch/powerpc/include/asm/ppc-opcode.h |  1 +
>  arch/powerpc/include/asm/processor.h  |  9 +++++++
>  arch/powerpc/kernel/Makefile          |  1 +
>  arch/powerpc/kernel/dexcr.c           | 36
> +++++++++++++++++++++++++++
>  arch/powerpc/kernel/traps.c           | 10 ++++++++
>  5 files changed, 57 insertions(+)
>  create mode 100644 arch/powerpc/kernel/dexcr.c
> 
> diff --git a/arch/powerpc/include/asm/ppc-opcode.h
> b/arch/powerpc/include/asm/ppc-opcode.h
> index 21e33e46f4b8..89b316466ed1 100644
> --- a/arch/powerpc/include/asm/ppc-opcode.h
> +++ b/arch/powerpc/include/asm/ppc-opcode.h
> @@ -215,6 +215,7 @@
>  #define OP_31_XOP_STFSX            663
>  #define OP_31_XOP_STFSUX    695
>  #define OP_31_XOP_STFDX     727
> +#define OP_31_XOP_HASHCHK   754
>  #define OP_31_XOP_STFDUX    759
>  #define OP_31_XOP_LHBRX     790
>  #define OP_31_XOP_LFIWAX    855
> diff --git a/arch/powerpc/include/asm/processor.h
> b/arch/powerpc/include/asm/processor.h
> index e96c9b8c2a60..bad64d6a5d36 100644
> --- a/arch/powerpc/include/asm/processor.h
> +++ b/arch/powerpc/include/asm/processor.h
> @@ -455,6 +455,15 @@ int exit_vmx_usercopy(void);
>  int enter_vmx_ops(void);
>  void *exit_vmx_ops(void *dest);
>  
> +#ifdef CONFIG_PPC_BOOK3S_64
> +int check_hashchk_trap(struct pt_regs const *regs);
> +#else
> +static inline int check_hashchk_trap(struct pt_regs const *regs)
> +{
> +       return -EINVAL;
> +}
> +#endif /* CONFIG_PPC_BOOK3S_64 */
> +
>  #endif /* __KERNEL__ */
>  #endif /* __ASSEMBLY__ */
>  #endif /* _ASM_POWERPC_PROCESSOR_H */
> diff --git a/arch/powerpc/kernel/Makefile
> b/arch/powerpc/kernel/Makefile
> index 9bf2be123093..07181e508754 100644
> --- a/arch/powerpc/kernel/Makefile
> +++ b/arch/powerpc/kernel/Makefile
> @@ -88,6 +88,7 @@ obj-$(CONFIG_HAVE_HW_BREAKPOINT)      +=
> hw_breakpoint.o
>  obj-$(CONFIG_PPC_DAWR)         += dawr.o
>  obj-$(CONFIG_PPC_BOOK3S_64)    += cpu_setup_ppc970.o
> cpu_setup_pa6t.o
>  obj-$(CONFIG_PPC_BOOK3S_64)    += cpu_setup_power.o
> +obj-$(CONFIG_PPC_BOOK3S_64)    += dexcr.o
>  obj-$(CONFIG_PPC_BOOK3S_64)    += mce.o mce_power.o
>  obj-$(CONFIG_PPC_BOOK3E_64)    += exceptions-64e.o idle_64e.o
>  obj-$(CONFIG_PPC_BARRIER_NOSPEC) += security.o
> diff --git a/arch/powerpc/kernel/dexcr.c
> b/arch/powerpc/kernel/dexcr.c
> new file mode 100644
> index 000000000000..f263e5439cc6
> --- /dev/null
> +++ b/arch/powerpc/kernel/dexcr.c
> @@ -0,0 +1,36 @@
> +// SPDX-License-Identifier: GPL-2.0+
> +/*
> + * DEXCR infrastructure

May as well spell out DEXCR here

> + *
> + * Copyright 2023, Benjamin Gray, IBM Corporation.
> + */
> +#include <linux/compiler_types.h>
> +
> +#include <asm/cpu_has_feature.h>
> +#include <asm/cputable.h>
> +#include <asm/disassemble.h>
> +#include <asm/errno.h>
> +#include <asm/inst.h>
> +#include <asm/ppc-opcode.h>
> +#include <asm/ptrace.h>
> +#include <asm/reg.h>
> +
> +int check_hashchk_trap(struct pt_regs const *regs)
> +{
> +       ppc_inst_t insn;
> +
> +       if (!cpu_has_feature(CPU_FTR_DEXCR_NPHIE))
> +               return -EINVAL;
> +
> +       if (!user_mode(regs))
> +               return -EINVAL;
> +
> +       if (get_user_instr(insn, (void __user *)regs->nip))
> +               return -EFAULT;
> +
> +       if (ppc_inst_primary_opcode(insn) != 31 ||
> +           get_xop(ppc_inst_val(insn)) != OP_31_XOP_HASHCHK)
> +               return -EINVAL;
> +
> +       return 0;
> +}

The return values here are quite confusing and only start to make sense
in the context of the calling function, which isn't great for something
living in a different file.  So if we return 0 we SIGILL because of
hashchk, return -EFAULT to SEGV_MAPERR and return -EINVAL to fall
through to SIGTRAP.  I would like a comment for that since it's not
very intuitive.

> diff --git a/arch/powerpc/kernel/traps.c
> b/arch/powerpc/kernel/traps.c
> index 9bdd79aa51cf..ade67e23b974 100644
> --- a/arch/powerpc/kernel/traps.c
> +++ b/arch/powerpc/kernel/traps.c
> @@ -1516,6 +1516,16 @@ static void do_program_check(struct pt_regs
> *regs)
>                                 return;
>                         }
>                 }
> +
> +               switch (check_hashchk_trap(regs)) {
> +               case 0:
> +                       _exception(SIGILL, regs, ILL_ILLOPN, regs-
> >nip);
> +                       return;
> +               case -EFAULT:
> +                       _exception(SIGSEGV, regs, SEGV_MAPERR, regs-
> >nip);
> +                       return;
> +               }
> +

I offer no constructive feedback on how to rearrange it, but this just
looks gross.

>                 _exception(SIGTRAP, regs, TRAP_BRKPT, regs->nip);
>                 return;
>         }



More information about the Linuxppc-dev mailing list