Re: [PATCH kernel] powerpc/kuap: Restore AMR after replaying soft interrupts

2021-02-11 Thread Michael Ellerman
On Tue, 2 Feb 2021 20:15:41 +1100, Alexey Kardashevskiy wrote: > Since de78a9c "powerpc: Add a framework for Kernel Userspace Access > Protection", user access helpers call user_{read|write}_access_{begin|end} > when user space access is allowed. > > 890274c "powerpc/64s: Implement KUAP for Radix

Re: [PATCH kernel] powerpc/kuap: Restore AMR after replaying soft interrupts

2021-02-03 Thread Michal Suchánek
Hello, On Tue, Feb 02, 2021 at 08:15:41PM +1100, Alexey Kardashevskiy wrote: > Since de78a9c "powerpc: Add a framework for Kernel Userspace Access > Protection", user access helpers call user_{read|write}_access_{begin|end} > when user space access is allowed. > > 890274c "powerpc/64s: Implement

[PATCH kernel] powerpc/kuap: Restore AMR after replaying soft interrupts

2021-02-02 Thread Alexey Kardashevskiy
Since de78a9c "powerpc: Add a framework for Kernel Userspace Access Protection", user access helpers call user_{read|write}_access_{begin|end} when user space access is allowed. 890274c "powerpc/64s: Implement KUAP for Radix MMU" made the mentioned helpers program a AMR special register to allow

Re: [PATCH kernel] powerpc/kuap: Restore AMR after replaying soft interrupts

2020-12-02 Thread kernel test robot
Hi Alexey, Thank you for the patch! Yet something to improve: [auto build test ERROR on powerpc/next] [also build test ERROR on linus/master v5.10-rc6 next-20201201] [cannot apply to scottwood/next] [If your patch is applied to the wrong git tree, kindly drop us a note. And when submitting

[PATCH kernel] powerpc/kuap: Restore AMR after replaying soft interrupts

2020-12-01 Thread Alexey Kardashevskiy
When interrupted in raw_copy_from_user()/... after user memory access is enabled, a nested handler may also access user memory (perf is one example) and when it does so, it calls prevent_read_from_user() which prevents the upper handler from accessing user memory. This saves/restores AMR when