From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.8 required=3.0 tests=DKIMWL_WL_HIGH, DKIM_ADSP_CUSTOM_MED,DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS, URIBL_BLOCKED,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id AAADDC433DF for ; Thu, 21 May 2020 02:30:38 +0000 (UTC) Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 69E1A2067B for ; Thu, 21 May 2020 02:30:38 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="JL0oiApG"; dkim=fail reason="signature verification failed" (2048-bit key) header.d=google.com header.i=@google.com header.b="JK+IjLTS" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 69E1A2067B Authentication-Results: mail.kernel.org; dmarc=fail (p=reject dis=none) header.from=google.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:To:From:Subject:References:Mime-Version :Message-Id:In-Reply-To:Date:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=Y9FdG7jmcyoLI6TWXBBHm6m5LC2n2hNOzM2nJloubK4=; b=JL0oiApGkLHNmL 8tT1WJh0pgv5qrTD+dB7sdABaxaJP3MFl3SHvZxFJP8JbACvlJe72ilfJU0AuJknr5/M5x+gmz0Dr vtZb0TumQgwG9iVkn8sXNJvdMgdQeC+BqRC4FJ9RirPz3PengawVockODAJIlkM9XVTd0zFgpXi3O 8jAlmYIzx8RmvHQdkWGz+zmQQ7nwmUgj5mxtnqVz7jETXw0g15szLLH0YgSk+Z4+yrYBnkIA5pFd+ j/Zjof5lRYgAHvjTw+7jyZWTigKZ6kzCVLG3rSnI5frT5ohXTgb5aVhQ6kkgV3CsCn6v5gZiwu66P CU+vznzE4o7oU0FupdWQ==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1jbayj-0006ix-Vm; Thu, 21 May 2020 02:30:38 +0000 Received: from mail-qk1-x749.google.com ([2607:f8b0:4864:20::749]) by bombadil.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1jbayN-0006Hm-U4 for linux-arm-kernel@lists.infradead.org; Thu, 21 May 2020 02:30:17 +0000 Received: by mail-qk1-x749.google.com with SMTP id p15so5987399qkk.15 for ; Wed, 20 May 2020 19:30:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=/PmXtPSmbKgVaFyQJeMweqUEn43XgLRuGhsRNegCzM0=; b=JK+IjLTSMYJhnMA24HgvVJH3iqh8ZgA3yg883FvSbrm/2R/oAv/qgtnU7zpj1ctgA0 dkZjd+XvSR4yWSr7i0qafAfecCfH5z8HD+tPcX1f0SAnW03+Rk/N7M9iV4aKpM3AMUP1 Dx/eFscQi7jwxJyFFveOKicqJRzrF6GwS8ipgxwPH6UAfz/pZyzPfAO7yWp/4L0l69l1 jbhEzdZrrH+oMyn8ud++Fh65XehPNJbROhuP54TRfTmpfu2IZW23SsqqhmBzAa3jRaNh HbHQNNAZ2vzAnnGBRCR8zFQGy9xVSOIrkeI6dpD3Ac6UxTHo+JUI47Ltco2WQi6GZdfO lp/A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=/PmXtPSmbKgVaFyQJeMweqUEn43XgLRuGhsRNegCzM0=; b=ps+tTB6xFJPZsL4k5HlbqKfvTXa63rVc62FnPDlOFwwtEr7cR2PqKuB6Oa1gfEDVbK NRNq5SNGTVbitO3jymfQLC7ekitkHhg46tPG/KoP7VYXR2P++H9s5h2TFSpMKB4VAFvA NUJjV44uqspqyjQzNZ2Hzi2QUdDoiRP3qk8Ovp/EqJa/GK0QIFmPB5lw+WM/2mvv9U0I VDxhN2qflY3UB8HnjjEo5k76W8qQaIvQSpUqvJj0EWVkrBBvu49G9K94mP8U1FP4WQBI EDMY43XSq/Xv1sROocwUnqRk5lO9kUfZdmdT/BnNKCynb+mUNGCGAU0Iloir/a199P4A Ea4Q== X-Gm-Message-State: AOAM531/UcaL0uxiFIV1jpb7v1GwrjfaUxghh1E1lqH4LRmYW7Ke5IeF ox9NqvRSKfXTKsro2N+ptfuGp7c= X-Google-Smtp-Source: ABdhPJyVlXFuts2xiEi8HP67nXEjQ+TmW3WUQSl595mxP8URIB+cviRxKI8ixNlBalXa/P6EDT1B34U= X-Received: by 2002:a0c:e4d4:: with SMTP id g20mr7472769qvm.228.1590028209146; Wed, 20 May 2020 19:30:09 -0700 (PDT) Date: Wed, 20 May 2020 19:29:41 -0700 In-Reply-To: <20200521022943.195898-1-pcc@google.com> Message-Id: <20200521022943.195898-2-pcc@google.com> Mime-Version: 1.0 References: <20200521022943.195898-1-pcc@google.com> X-Mailer: git-send-email 2.26.2.761.g0e0b3e54be-goog Subject: [PATCH v6 1/3] signal: Allow architectures to store arch-specific data in kernel_siginfo From: Peter Collingbourne To: Catalin Marinas , Evgenii Stepanov , Kostya Serebryany , Vincenzo Frascino , Dave Martin , Will Deacon , Oleg Nesterov , "Eric W. Biederman" X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20200520_193016_045869_BFE53F09 X-CRM114-Status: GOOD ( 16.60 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Andrey Konovalov , Kevin Brodsky , Peter Collingbourne , Linux ARM , Richard Henderson Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org In some cases we would like to store architecture-specific data in the kernel's siginfo but not in the userspace one. This is generally data is conceptually part of siginfo but is not stored there for one reason or another. For example, on arm64, the arch-specific fault code register ESR_EL1 is exposed to signal handlers, but since it is associated with many different types of signals it does not fit well into siginfo and appears in sigcontext instead. Currently this data is stored in thread_struct, which is error-prone because the data is associated with the signal itself and not the task, and as a result it could get out of sync with the signal that is currently being delivered. To help avoid these types of errors, introduce a way for architectures to store architecture-specific data in the kernel_siginfo. This part of the kernel_siginfo is not exposed to userspace so the architecture can use it in any way that it likes without ABI concerns. A follow-up change will start using this mechanism on arm64 to store the fault code and fault address. Signed-off-by: Peter Collingbourne --- include/linux/signal.h | 2 -- include/linux/signal_types.h | 3 +++ kernel/signal.c | 17 +++++++++++++---- 3 files changed, 16 insertions(+), 6 deletions(-) diff --git a/include/linux/signal.h b/include/linux/signal.h index 05bacd2ab135..34bf18932e9b 100644 --- a/include/linux/signal.h +++ b/include/linux/signal.h @@ -22,8 +22,6 @@ static inline void clear_siginfo(kernel_siginfo_t *info) memset(info, 0, sizeof(*info)); } -#define SI_EXPANSION_SIZE (sizeof(struct siginfo) - sizeof(struct kernel_siginfo)) - int copy_siginfo_to_user(siginfo_t __user *to, const kernel_siginfo_t *from); int copy_siginfo_from_user(kernel_siginfo_t *to, const siginfo_t __user *from); diff --git a/include/linux/signal_types.h b/include/linux/signal_types.h index f8a90ae9c6ec..a8635eeb890b 100644 --- a/include/linux/signal_types.h +++ b/include/linux/signal_types.h @@ -11,6 +11,9 @@ typedef struct kernel_siginfo { __SIGINFO; +#ifdef __ARCH_HAS_PRIVATE_SIGINFO + struct arch_private_siginfo arch; +#endif } kernel_siginfo_t; /* diff --git a/kernel/signal.c b/kernel/signal.c index 284fc1600063..a33df2280ed5 100644 --- a/kernel/signal.c +++ b/kernel/signal.c @@ -3180,15 +3180,21 @@ enum siginfo_layout siginfo_layout(unsigned sig, int si_code) return layout; } +struct shared_siginfo { + __SIGINFO; +}; + +#define SI_EXPANSION_SIZE (sizeof(struct siginfo) - sizeof(struct shared_siginfo)) + static inline char __user *si_expansion(const siginfo_t __user *info) { - return ((char __user *)info) + sizeof(struct kernel_siginfo); + return ((char __user *)info) + sizeof(struct shared_siginfo); } int copy_siginfo_to_user(siginfo_t __user *to, const kernel_siginfo_t *from) { char __user *expansion = si_expansion(to); - if (copy_to_user(to, from , sizeof(struct kernel_siginfo))) + if (copy_to_user(to, from , sizeof(struct shared_siginfo))) return -EFAULT; if (clear_user(expansion, SI_EXPANSION_SIZE)) return -EFAULT; @@ -3198,6 +3204,9 @@ int copy_siginfo_to_user(siginfo_t __user *to, const kernel_siginfo_t *from) static int post_copy_siginfo_from_user(kernel_siginfo_t *info, const siginfo_t __user *from) { +#ifdef __ARCH_HAS_PRIVATE_SIGINFO + memset(&info->arch, 0, sizeof(info->arch)); +#endif if (unlikely(!known_siginfo_layout(info->si_signo, info->si_code))) { char __user *expansion = si_expansion(from); char buf[SI_EXPANSION_SIZE]; @@ -3221,7 +3230,7 @@ static int post_copy_siginfo_from_user(kernel_siginfo_t *info, static int __copy_siginfo_from_user(int signo, kernel_siginfo_t *to, const siginfo_t __user *from) { - if (copy_from_user(to, from, sizeof(struct kernel_siginfo))) + if (copy_from_user(to, from, sizeof(struct shared_siginfo))) return -EFAULT; to->si_signo = signo; return post_copy_siginfo_from_user(to, from); @@ -3229,7 +3238,7 @@ static int __copy_siginfo_from_user(int signo, kernel_siginfo_t *to, int copy_siginfo_from_user(kernel_siginfo_t *to, const siginfo_t __user *from) { - if (copy_from_user(to, from, sizeof(struct kernel_siginfo))) + if (copy_from_user(to, from, sizeof(struct shared_siginfo))) return -EFAULT; return post_copy_siginfo_from_user(to, from); } -- 2.26.2.761.g0e0b3e54be-goog _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel