Hi once more,

Le 03/03/2026 à 16:10, Christophe Leroy (CS GROUP) a écrit :
Hi Again,

Le 03/03/2026 à 15:57, Christophe Leroy (CS GROUP) a écrit :
Hi,

Le 03/03/2026 à 10:19, Sayali Patil a écrit :

On 02/03/26 16:42, Christophe Leroy (CS GROUP) wrote:

Hi Christophe,
Thanks for the review.
With the suggested change, we are hitting a compilation error.

The issue is related to how KUAP enforces the access direction.
allow_user_access() contains:

BUILD_BUG_ON(!__builtin_constant_p(dir));

which requires that the access direction is a compile-time constant.
If we pass a runtime value (for example, an unsigned long), the
__builtin_constant_p() check fails and triggers the following build error.

Error:
In function 'allow_user_access', inlined from '__copy_tofrom_user_vmx' at arch/powerpc/lib/vmx-helper.c:19:3:
BUILD_BUG_ON failed: !__builtin_constant_p(dir) 706


The previous implementation worked because allow_user_access() was invoked with enum constants (READ, WRITE, READ_WRITE), which satisfied the __builtin_constant_p() requirement. So in this case, the function must be called with a compile-time constant to satisfy KUAP.

Please let me know if you would prefer a different approach.


Ah, right, I missed that. The problem should only be in vmx-helper.c


Thinking about it once more, I realised that powerpc does not define INLINE_COPY_FROM_USER nor INLINE_COPY_TO_USER.

This means that raw_copy_from_user() and raw_copy_to_user() will in really not be called much. Therefore __copy_tofrom_user_vmx() could remain in uaccess.h as static __always_inline allthough it requires exporting enter_vmx_usercopy() and exit_vmx_usercopy().

That would result in something like:

static __always_inline bool will_use_vmx(unsigned long n)
{
        return IS_ENABLED(CONFIG_ALTIVEC) && cpu_has_feature(CPU_FTR_VMX_COPY) 
&&
               n > VMX_COPY_THRESHOLD;
}

static __always_inline unsigned long
raw_copy_tofrom_user(void __user *to, const void __user *from, unsigned long n, unsigned long dir)
{
        unsigned long ret;

        if (will_use_vmx(n) && enter_vmx_usercopy()) {
                allow_user_access(to, dir);
                ret = __copy_tofrom_user_power7_vmx(to, from, size);
                prevent_user_access(dir);
                exit_vmx_usercopy();

                if (unlikely(ret)) {
                        allow_user_access(to, dir);
                        ret = __copy_tofrom_user_base(to, from, size);
                        prevent_user_access(dir);
                }
                return ret;
        }
        allow_user_access(to, dir);
        ret = __copy_tofrom_user(to, from, n);
        prevent_user_access(dir);
        return ret;
}


Christophe

Reply via email to