Commit 57472306 authored by Christophe Leroy's avatar Christophe Leroy Committed by Michael Ellerman

powerpc/32: Remove ksp_limit

ksp_limit is there to help detect stack overflows.
That is specific to ppc32 as it was removed from ppc64 in
commit cbc9565e ("powerpc: Remove ksp_limit on ppc64").

There are other means for detecting stack overflows.

As ppc64 has proven to not need it, ppc32 should be able to do
without it too.

Lets remove it and simplify exception handling.
Signed-off-by: default avatarChristophe Leroy <christophe.leroy@csgroup.eu>
Signed-off-by: default avatarMichael Ellerman <mpe@ellerman.id.au>
Link: https://lore.kernel.org/r/d789c3385b22e07bedc997613c0d26074cb513e7.1615552866.git.christophe.leroy@csgroup.eu
parent e464d92b
...@@ -144,7 +144,6 @@ struct thread_struct { ...@@ -144,7 +144,6 @@ struct thread_struct {
#endif #endif
#ifdef CONFIG_PPC32 #ifdef CONFIG_PPC32
void *pgdir; /* root of page-table tree */ void *pgdir; /* root of page-table tree */
unsigned long ksp_limit; /* if ksp <= ksp_limit stack overflow */
#ifdef CONFIG_PPC_RTAS #ifdef CONFIG_PPC_RTAS
unsigned long rtas_sp; /* stack pointer for when in RTAS */ unsigned long rtas_sp; /* stack pointer for when in RTAS */
#endif #endif
...@@ -282,7 +281,6 @@ struct thread_struct { ...@@ -282,7 +281,6 @@ struct thread_struct {
#ifdef CONFIG_PPC32 #ifdef CONFIG_PPC32
#define INIT_THREAD { \ #define INIT_THREAD { \
.ksp = INIT_SP, \ .ksp = INIT_SP, \
.ksp_limit = INIT_SP_LIMIT, \
.pgdir = swapper_pg_dir, \ .pgdir = swapper_pg_dir, \
.fpexc_mode = MSR_FE0 | MSR_FE1, \ .fpexc_mode = MSR_FE0 | MSR_FE1, \
SPEFSCR_INIT \ SPEFSCR_INIT \
......
...@@ -91,7 +91,6 @@ int main(void) ...@@ -91,7 +91,6 @@ int main(void)
DEFINE(SIGSEGV, SIGSEGV); DEFINE(SIGSEGV, SIGSEGV);
DEFINE(NMI_MASK, NMI_MASK); DEFINE(NMI_MASK, NMI_MASK);
#else #else
OFFSET(KSP_LIMIT, thread_struct, ksp_limit);
#ifdef CONFIG_PPC_RTAS #ifdef CONFIG_PPC_RTAS
OFFSET(RTAS_SP, thread_struct, rtas_sp); OFFSET(RTAS_SP, thread_struct, rtas_sp);
#endif #endif
...@@ -381,7 +380,6 @@ int main(void) ...@@ -381,7 +380,6 @@ int main(void)
DEFINE(_CSRR1, STACK_INT_FRAME_SIZE+offsetof(struct exception_regs, csrr1)); DEFINE(_CSRR1, STACK_INT_FRAME_SIZE+offsetof(struct exception_regs, csrr1));
DEFINE(_DSRR0, STACK_INT_FRAME_SIZE+offsetof(struct exception_regs, dsrr0)); DEFINE(_DSRR0, STACK_INT_FRAME_SIZE+offsetof(struct exception_regs, dsrr0));
DEFINE(_DSRR1, STACK_INT_FRAME_SIZE+offsetof(struct exception_regs, dsrr1)); DEFINE(_DSRR1, STACK_INT_FRAME_SIZE+offsetof(struct exception_regs, dsrr1));
DEFINE(SAVED_KSP_LIMIT, STACK_INT_FRAME_SIZE+offsetof(struct exception_regs, saved_ksp_limit));
#endif #endif
#endif #endif
......
...@@ -94,12 +94,6 @@ crit_transfer_to_handler: ...@@ -94,12 +94,6 @@ crit_transfer_to_handler:
mfspr r0,SPRN_SRR1 mfspr r0,SPRN_SRR1
stw r0,_SRR1(r11) stw r0,_SRR1(r11)
/* set the stack limit to the current stack */
mfspr r8,SPRN_SPRG_THREAD
lwz r0,KSP_LIMIT(r8)
stw r0,SAVED_KSP_LIMIT(r11)
rlwinm r0,r1,0,0,(31 - THREAD_SHIFT)
stw r0,KSP_LIMIT(r8)
/* fall through */ /* fall through */
_ASM_NOKPROBE_SYMBOL(crit_transfer_to_handler) _ASM_NOKPROBE_SYMBOL(crit_transfer_to_handler)
#endif #endif
...@@ -107,12 +101,6 @@ _ASM_NOKPROBE_SYMBOL(crit_transfer_to_handler) ...@@ -107,12 +101,6 @@ _ASM_NOKPROBE_SYMBOL(crit_transfer_to_handler)
#ifdef CONFIG_40x #ifdef CONFIG_40x
.globl crit_transfer_to_handler .globl crit_transfer_to_handler
crit_transfer_to_handler: crit_transfer_to_handler:
/* set the stack limit to the current stack */
mfspr r8,SPRN_SPRG_THREAD
lwz r0,KSP_LIMIT(r8)
stw r0,saved_ksp_limit@l(0)
rlwinm r0,r1,0,0,(31 - THREAD_SHIFT)
stw r0,KSP_LIMIT(r8)
/* fall through */ /* fall through */
_ASM_NOKPROBE_SYMBOL(crit_transfer_to_handler) _ASM_NOKPROBE_SYMBOL(crit_transfer_to_handler)
#endif #endif
...@@ -151,17 +139,10 @@ transfer_to_handler: ...@@ -151,17 +139,10 @@ transfer_to_handler:
#endif #endif
b 3f b 3f
2: /* if from kernel, check interrupted DOZE/NAP mode and /* if from kernel, check interrupted DOZE/NAP mode */
* check for stack overflow 2:
*/
kuap_save_and_lock r11, r12, r9, r2, r6 kuap_save_and_lock r11, r12, r9, r2, r6
addi r2, r12, -THREAD addi r2, r12, -THREAD
#ifndef CONFIG_VMAP_STACK
lwz r9,KSP_LIMIT(r12)
cmplw r1,r9 /* if r1 <= ksp_limit */
ble- stack_ovf /* then the kernel stack overflowed */
#endif
5:
#if defined(CONFIG_PPC_BOOK3S_32) || defined(CONFIG_E500) #if defined(CONFIG_PPC_BOOK3S_32) || defined(CONFIG_E500)
lwz r12,TI_LOCAL_FLAGS(r2) lwz r12,TI_LOCAL_FLAGS(r2)
mtcrf 0x01,r12 mtcrf 0x01,r12
...@@ -204,37 +185,6 @@ transfer_to_handler_cont: ...@@ -204,37 +185,6 @@ transfer_to_handler_cont:
_ASM_NOKPROBE_SYMBOL(transfer_to_handler) _ASM_NOKPROBE_SYMBOL(transfer_to_handler)
_ASM_NOKPROBE_SYMBOL(transfer_to_handler_cont) _ASM_NOKPROBE_SYMBOL(transfer_to_handler_cont)
#ifndef CONFIG_VMAP_STACK
/*
* On kernel stack overflow, load up an initial stack pointer
* and call StackOverflow(regs), which should not return.
*/
stack_ovf:
/* sometimes we use a statically-allocated stack, which is OK. */
lis r12,_end@h
ori r12,r12,_end@l
cmplw r1,r12
ble 5b /* r1 <= &_end is OK */
SAVE_NVGPRS(r11)
addi r3,r1,STACK_FRAME_OVERHEAD
lis r1,init_thread_union@ha
addi r1,r1,init_thread_union@l
addi r1,r1,THREAD_SIZE-STACK_FRAME_OVERHEAD
lis r9,StackOverflow@ha
addi r9,r9,StackOverflow@l
LOAD_REG_IMMEDIATE(r10,MSR_KERNEL)
#if defined(CONFIG_PPC_8xx) && defined(CONFIG_PERF_EVENTS)
mtspr SPRN_NRI, r0
#endif
mtspr SPRN_SRR0,r9
mtspr SPRN_SRR1,r10
rfi
#ifdef CONFIG_40x
b . /* Prevent prefetch past rfi */
#endif
_ASM_NOKPROBE_SYMBOL(stack_ovf)
#endif
.globl transfer_to_syscall .globl transfer_to_syscall
transfer_to_syscall: transfer_to_syscall:
SAVE_NVGPRS(r1) SAVE_NVGPRS(r1)
...@@ -815,11 +765,6 @@ _ASM_NOKPROBE_SYMBOL(exc_exit_restart) ...@@ -815,11 +765,6 @@ _ASM_NOKPROBE_SYMBOL(exc_exit_restart)
#ifdef CONFIG_40x #ifdef CONFIG_40x
.globl ret_from_crit_exc .globl ret_from_crit_exc
ret_from_crit_exc: ret_from_crit_exc:
mfspr r9,SPRN_SPRG_THREAD
lis r10,saved_ksp_limit@ha;
lwz r10,saved_ksp_limit@l(r10);
tovirt(r9,r9);
stw r10,KSP_LIMIT(r9)
lis r9,crit_srr0@ha; lis r9,crit_srr0@ha;
lwz r9,crit_srr0@l(r9); lwz r9,crit_srr0@l(r9);
lis r10,crit_srr1@ha; lis r10,crit_srr1@ha;
...@@ -833,9 +778,6 @@ _ASM_NOKPROBE_SYMBOL(ret_from_crit_exc) ...@@ -833,9 +778,6 @@ _ASM_NOKPROBE_SYMBOL(ret_from_crit_exc)
#ifdef CONFIG_BOOKE #ifdef CONFIG_BOOKE
.globl ret_from_crit_exc .globl ret_from_crit_exc
ret_from_crit_exc: ret_from_crit_exc:
mfspr r9,SPRN_SPRG_THREAD
lwz r10,SAVED_KSP_LIMIT(r1)
stw r10,KSP_LIMIT(r9)
RESTORE_xSRR(SRR0,SRR1); RESTORE_xSRR(SRR0,SRR1);
RESTORE_MMU_REGS; RESTORE_MMU_REGS;
RET_FROM_EXC_LEVEL(SPRN_CSRR0, SPRN_CSRR1, PPC_RFCI) RET_FROM_EXC_LEVEL(SPRN_CSRR0, SPRN_CSRR1, PPC_RFCI)
...@@ -843,9 +785,6 @@ _ASM_NOKPROBE_SYMBOL(ret_from_crit_exc) ...@@ -843,9 +785,6 @@ _ASM_NOKPROBE_SYMBOL(ret_from_crit_exc)
.globl ret_from_debug_exc .globl ret_from_debug_exc
ret_from_debug_exc: ret_from_debug_exc:
mfspr r9,SPRN_SPRG_THREAD
lwz r10,SAVED_KSP_LIMIT(r1)
stw r10,KSP_LIMIT(r9)
RESTORE_xSRR(SRR0,SRR1); RESTORE_xSRR(SRR0,SRR1);
RESTORE_xSRR(CSRR0,CSRR1); RESTORE_xSRR(CSRR0,CSRR1);
RESTORE_MMU_REGS; RESTORE_MMU_REGS;
...@@ -854,9 +793,6 @@ _ASM_NOKPROBE_SYMBOL(ret_from_debug_exc) ...@@ -854,9 +793,6 @@ _ASM_NOKPROBE_SYMBOL(ret_from_debug_exc)
.globl ret_from_mcheck_exc .globl ret_from_mcheck_exc
ret_from_mcheck_exc: ret_from_mcheck_exc:
mfspr r9,SPRN_SPRG_THREAD
lwz r10,SAVED_KSP_LIMIT(r1)
stw r10,KSP_LIMIT(r9)
RESTORE_xSRR(SRR0,SRR1); RESTORE_xSRR(SRR0,SRR1);
RESTORE_xSRR(CSRR0,CSRR1); RESTORE_xSRR(CSRR0,CSRR1);
RESTORE_xSRR(DSRR0,DSRR1); RESTORE_xSRR(DSRR0,DSRR1);
......
...@@ -95,8 +95,6 @@ _ENTRY(crit_dear) ...@@ -95,8 +95,6 @@ _ENTRY(crit_dear)
.space 4 .space 4
_ENTRY(crit_esr) _ENTRY(crit_esr)
.space 4 .space 4
_ENTRY(saved_ksp_limit)
.space 4
/* /*
* Exception prolog for critical exceptions. This is a little different * Exception prolog for critical exceptions. This is a little different
......
...@@ -481,7 +481,6 @@ struct exception_regs { ...@@ -481,7 +481,6 @@ struct exception_regs {
unsigned long csrr1; unsigned long csrr1;
unsigned long dsrr0; unsigned long dsrr0;
unsigned long dsrr1; unsigned long dsrr1;
unsigned long saved_ksp_limit;
}; };
/* ensure this structure is always sized to a multiple of the stack alignment */ /* ensure this structure is always sized to a multiple of the stack alignment */
......
...@@ -27,23 +27,14 @@ ...@@ -27,23 +27,14 @@
.text .text
/*
* We store the saved ksp_limit in the unused part
* of the STACK_FRAME_OVERHEAD
*/
_GLOBAL(call_do_softirq) _GLOBAL(call_do_softirq)
mflr r0 mflr r0
stw r0,4(r1) stw r0,4(r1)
lwz r10,THREAD+KSP_LIMIT(r2)
stw r3, THREAD+KSP_LIMIT(r2)
stwu r1,THREAD_SIZE-STACK_FRAME_OVERHEAD(r3) stwu r1,THREAD_SIZE-STACK_FRAME_OVERHEAD(r3)
mr r1,r3 mr r1,r3
stw r10,8(r1)
bl __do_softirq bl __do_softirq
lwz r10,8(r1)
lwz r1,0(r1) lwz r1,0(r1)
lwz r0,4(r1) lwz r0,4(r1)
stw r10,THREAD+KSP_LIMIT(r2)
mtlr r0 mtlr r0
blr blr
...@@ -53,16 +44,11 @@ _GLOBAL(call_do_softirq) ...@@ -53,16 +44,11 @@ _GLOBAL(call_do_softirq)
_GLOBAL(call_do_irq) _GLOBAL(call_do_irq)
mflr r0 mflr r0
stw r0,4(r1) stw r0,4(r1)
lwz r10,THREAD+KSP_LIMIT(r2)
stw r4, THREAD+KSP_LIMIT(r2)
stwu r1,THREAD_SIZE-STACK_FRAME_OVERHEAD(r4) stwu r1,THREAD_SIZE-STACK_FRAME_OVERHEAD(r4)
mr r1,r4 mr r1,r4
stw r10,8(r1)
bl __do_irq bl __do_irq
lwz r10,8(r1)
lwz r1,0(r1) lwz r1,0(r1)
lwz r0,4(r1) lwz r0,4(r1)
stw r10,THREAD+KSP_LIMIT(r2)
mtlr r0 mtlr r0
blr blr
......
...@@ -1725,9 +1725,6 @@ int copy_thread(unsigned long clone_flags, unsigned long usp, ...@@ -1725,9 +1725,6 @@ int copy_thread(unsigned long clone_flags, unsigned long usp,
kregs = (struct pt_regs *) sp; kregs = (struct pt_regs *) sp;
sp -= STACK_FRAME_OVERHEAD; sp -= STACK_FRAME_OVERHEAD;
p->thread.ksp = sp; p->thread.ksp = sp;
#ifdef CONFIG_PPC32
p->thread.ksp_limit = (unsigned long)end_of_stack(p);
#endif
#ifdef CONFIG_HAVE_HW_BREAKPOINT #ifdef CONFIG_HAVE_HW_BREAKPOINT
for (i = 0; i < nr_wp_slots(); i++) for (i = 0; i < nr_wp_slots(); i++)
p->thread.ptrace_bps[i] = NULL; p->thread.ptrace_bps[i] = NULL;
......
...@@ -1605,15 +1605,6 @@ DEFINE_INTERRUPT_HANDLER(alignment_exception) ...@@ -1605,15 +1605,6 @@ DEFINE_INTERRUPT_HANDLER(alignment_exception)
bad_page_fault(regs, sig); bad_page_fault(regs, sig);
} }
DEFINE_INTERRUPT_HANDLER(StackOverflow)
{
pr_crit("Kernel stack overflow in process %s[%d], r1=%lx\n",
current->comm, task_pid_nr(current), regs->gpr[1]);
debugger(regs);
show_regs(regs);
panic("kernel stack overflow");
}
DEFINE_INTERRUPT_HANDLER(stack_overflow_exception) DEFINE_INTERRUPT_HANDLER(stack_overflow_exception)
{ {
die("Kernel stack overflow", regs, SIGSEGV); die("Kernel stack overflow", regs, SIGSEGV);
......
...@@ -3086,15 +3086,6 @@ NOKPROBE_SYMBOL(analyse_instr); ...@@ -3086,15 +3086,6 @@ NOKPROBE_SYMBOL(analyse_instr);
*/ */
static nokprobe_inline int handle_stack_update(unsigned long ea, struct pt_regs *regs) static nokprobe_inline int handle_stack_update(unsigned long ea, struct pt_regs *regs)
{ {
#ifdef CONFIG_PPC32
/*
* Check if we will touch kernel stack overflow
*/
if (ea - STACK_INT_FRAME_SIZE <= current->thread.ksp_limit) {
printk(KERN_CRIT "Can't kprobe this since kernel stack would overflow.\n");
return -EINVAL;
}
#endif /* CONFIG_PPC32 */
/* /*
* Check if we already set since that means we'll * Check if we already set since that means we'll
* lose the previous value. * lose the previous value.
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment