Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751196AbcCKSIp (ORCPT ); Fri, 11 Mar 2016 13:08:45 -0500 Received: from foss.arm.com ([217.140.101.70]:51628 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750934AbcCKSIm (ORCPT ); Fri, 11 Mar 2016 13:08:42 -0500 Message-ID: <56E3094E.5010906@arm.com> Date: Fri, 11 Mar 2016 18:07:10 +0000 From: James Morse User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Icedove/31.6.0 MIME-Version: 1.0 To: David Long CC: Catalin Marinas , Will Deacon , Sandeepa Prabhu , William Cohen , Pratyush Anand , Steve Capper , linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, Marc Zyngier , Dave P Martin , Mark Rutland , Robin Murphy , Ard Biesheuvel , Jens Wiklander , Christoffer Dall , =?windows-1252?Q?Alex_?= =?windows-1252?Q?Benn=E9e?= , Yang Shi , Greg Kroah-Hartman , Viresh Kumar , "Suzuki K. Poulose" , Kees Cook , Zi Shen Lim , John Blackwood , Feng Kan , Balamurugan Shanmugam , Vladimir Murzin , Mark Salyzyn , Petr Mladek , Andrew Morton , Mark Brown Subject: Re: [PATCH v11 1/9] arm64: Add HAVE_REGS_AND_STACK_ACCESS_API feature References: <1457501543-24197-1-git-send-email-dave.long@linaro.org> <1457501543-24197-2-git-send-email-dave.long@linaro.org> In-Reply-To: <1457501543-24197-2-git-send-email-dave.long@linaro.org> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1681 Lines: 52 Hi David, On 09/03/16 05:32, David Long wrote: > From: "David A. Long" > > Add HAVE_REGS_AND_STACK_ACCESS_API feature for arm64. > > Signed-off-by: David A. Long > diff --git a/arch/arm64/kernel/ptrace.c b/arch/arm64/kernel/ptrace.c > index ff7f132..efebf0f 100644 > --- a/arch/arm64/kernel/ptrace.c > +++ b/arch/arm64/kernel/ptrace.c [ ... SNIP ... ] > +/** > + * regs_within_kernel_stack() - check the address in the stack > + * @regs: pt_regs which contains kernel stack pointer. > + * @addr: address which is checked. > + * > + * regs_within_kernel_stack() checks @addr is within the kernel stack page(s). > + * If @addr is within the kernel stack, it returns true. If not, returns false. > + */ > +bool regs_within_kernel_stack(struct pt_regs *regs, unsigned long addr) > +{ > + return ((addr & ~(THREAD_SIZE - 1)) == > + (kernel_stack_pointer(regs) & ~(THREAD_SIZE - 1))); I'm not sure where this is called from, but if kernel_stack_pointer(regs) could ever point into an irq_stack you will get the wrong result. arch/arm64/include/asm/irq.h has 'on_irq_stack(sp, cpu)' which should help, although you will need to check the bounds of the irq_stack separately. The horrible details... >From arch/arm64/kernel/irq.c:20 > /* irq stack only needs to be 16 byte aligned - not IRQ_STACK_SIZE aligned. */ > DEFINE_PER_CPU(unsigned long [IRQ_STACK_SIZE/sizeof(long)], irq_stack) > __aligned(16); This was because per-cpu variables can be at-most page aligned. 6cdf9c7ca687 ("arm64: Store struct thread_info in sp_el0") changed current_thread_info() to work on these weirdly aligned irq_stacks. Thanks, James