From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.5 required=3.0 tests=DKIM_INVALID,DKIM_SIGNED, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS, USER_AGENT_GIT autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 3F37BC47256 for ; Wed, 6 May 2020 06:22:31 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id D23F72073A for ; Wed, 6 May 2020 06:22:30 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=infradead.org header.i=@infradead.org header.b="CIUsCHj7" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org D23F72073A Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=lst.de Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=owner-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix) id 49DED8E0005; Wed, 6 May 2020 02:22:30 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 426298E0003; Wed, 6 May 2020 02:22:30 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 33CBD8E0005; Wed, 6 May 2020 02:22:30 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0157.hostedemail.com [216.40.44.157]) by kanga.kvack.org (Postfix) with ESMTP id 1C8B58E0003 for ; Wed, 6 May 2020 02:22:30 -0400 (EDT) Received: from smtpin23.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay03.hostedemail.com (Postfix) with ESMTP id CCEE5824559C for ; Wed, 6 May 2020 06:22:29 +0000 (UTC) X-FDA: 76785300018.23.fuel18_15c2687771e23 X-HE-Tag: fuel18_15c2687771e23 X-Filterd-Recvd-Size: 2248 Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) by imf22.hostedemail.com (Postfix) with ESMTP for ; Wed, 6 May 2020 06:22:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20170209; h=Content-Transfer-Encoding: MIME-Version:Message-Id:Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type: Content-ID:Content-Description:In-Reply-To:References; bh=+QeiLvlGEJMuVoqXNKh/LxTQ/T3qKj7iVtFa2X0kLrA=; b=CIUsCHj7W0F+STX4nCisy4hqyJ 5ORj2O7Kb2H3ACRqskaeUjkJFG0KwGbK95D1NYObW2E9bXD0FFifkGd4jbkspYorh5RZ9UsOcqtPp dTAGbeJaHf8PGyXQUQK+EEyCBb6VqYX0GVfWnlkdM8LgZlWGMn8eBW04MRhUpVB3nCAdGwMu2Vd04 EL+x2SDiK5TR4QOTj5pzQQpNFUmDxlEqLBMLGC5u8o/umlXcNjM1mjQramTZDXAcyjieoXaNOiDl+ k6wp7FpQb0foCoyR+2O+QiBPzR7x7UYN46lggaWOofrYFe4JjvCUp9U7Cr8sNQ3MWsnwOAarTLEsL pJyWOQ0w==; Received: from [2001:4bb8:191:66b6:c70:4a89:bc61:2] (helo=localhost) by bombadil.infradead.org with esmtpsa (Exim 4.92.3 #3 (Red Hat Linux)) id 1jWDRp-0006JV-Nj; Wed, 06 May 2020 06:22:26 +0000 From: Christoph Hellwig To: x86@kernel.org, Alexei Starovoitov , Daniel Borkmann , Masami Hiramatsu , Linus Torvalds , Andrew Morton Cc: linux-parisc@vger.kernel.org, linux-um@lists.infradead.org, netdev@vger.kernel.org, bpf@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: clean up and streamline probe_kernel_* and friends Date: Wed, 6 May 2020 08:22:08 +0200 Message-Id: <20200506062223.30032-1-hch@lst.de> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 X-SRS-Rewrite: SMTP reverse-path rewritten from by bombadil.infradead.org. See http://www.infradead.org/rpr.html Content-Transfer-Encoding: quoted-printable X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Hi all, this series start cleaning up the safe kernel and user memory probing helpers in mm/maccess.c, and then allows architectures to implement the kernel probing without overriding the address space limit and temporarily allowing access to user memory. It then switches x86 over to this new mechanism by reusing the unsafe_* uaccess logic.