Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp17653877ybl; Thu, 2 Jan 2020 09:26:17 -0800 (PST) X-Google-Smtp-Source: APXvYqxdgnp/0Xgi7iE7MMPgYluGi6eJrhwLHXuf+VcpsD/Cb14CugcB5DYcD1VB3rAK7KS7lnyj X-Received: by 2002:aca:5793:: with SMTP id l141mr2405603oib.38.1577985977586; Thu, 02 Jan 2020 09:26:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1577985977; cv=none; d=google.com; s=arc-20160816; b=YBhHSV80XC4/bUHW2r28q1W9L6fTA89Z/S4hVvpmziVuphN0n7CwyYs1S7eASXNhZx CnxGPgA/ZBm9R+RKFvP+Hdu0bBWuavkRVjjwLBojlhPgsvUpOELQ0Qa920MJJNA42ugR QRLoJWQnsqsJ/Yp1OaS/Y5zjseq06qWkTfQxPHejeyWfZY4crsC4wY+JCHG8u5xYnJer m/FJjCDrze8pUrWvHyHj22wYlRkf8nH5LeVLuVJSp4+72eeckDLeHNAN/5kyfwsRFJrb J3iAy2qfqPczeid90j2qeTnZEPXPxyxXM657TcrReBPbKmYIW3otN+sLjGQ3CV7/TtUS BCRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=Vn6xY74ZAHf5UXr9SkY5xfMygu9Z5Gc/im6mstwFvf0=; b=WrXamXrEXaqv05ONhJwsP8PoQcw6DOrhH+Qho65LQ5M2qyoOk9KjDpHTdm4Et87Xt+ UIsrlL9WKDjgkCQQpt1qT4gMcFts92IySDFkBvNNIO7GllrWbSGrz39Ri8B6emBv65Br bww0PgqtRxwbKyxs1MRGgQdc3ke+F5ViqAHJcmrtvVvafDpJKb4/jUeO1dJHBk9FjvHM DAqX+MhUS71KvfpTrDHuplOitEtydlScWc6SQMqjp+ffiG/tgNQp4CCIjDxwpRoH3wrV cp5yHd1ftEhDcJhxkLNjP5yEicjypxtvqHG5tdysaZOV1sUEvi1QU/ISCQB3dJd5y9Oz xq9w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=h4rz0FNb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 73si27377750oii.60.2020.01.02.09.26.06; Thu, 02 Jan 2020 09:26:17 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=h4rz0FNb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727939AbgABRY2 (ORCPT + 99 others); Thu, 2 Jan 2020 12:24:28 -0500 Received: from mail-wm1-f68.google.com ([209.85.128.68]:55580 "EHLO mail-wm1-f68.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727880AbgABRYX (ORCPT ); Thu, 2 Jan 2020 12:24:23 -0500 Received: by mail-wm1-f68.google.com with SMTP id q9so6190248wmj.5; Thu, 02 Jan 2020 09:24:23 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=Vn6xY74ZAHf5UXr9SkY5xfMygu9Z5Gc/im6mstwFvf0=; b=h4rz0FNbsGFBoCp9A74wHTOndORuPQ0li2XYGekvUA2OyINJgjgFUX3YhOPQCGJt30 uoDbXxwA5mLFlnFeecPALaEQQD8T4qunF9Yc1KjfEvMDJL7hTMIf3E/VRiP992QN67MD rlSd8QmM9osfSfYjZacCchY15eUB6uTTR+uSzII+0b/CdK0AShMgWeZmUc7pAtW0puGu UgddoyEoxt0eu6NB/4TWmLQIU8pc29ZXZtUAZQJdj3IYJKOot0dVySR5AWfntF1aWDlp YiEVFzxiHI/4mDqmoOkYYekatoYgjaYaz/KHSXYa4Q/p7zpBzs/jJ4ksC+tt10GVr3t9 apSg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=Vn6xY74ZAHf5UXr9SkY5xfMygu9Z5Gc/im6mstwFvf0=; b=pLWy5ojzukBgteMpl/OU9ceIc++52M2Fs+CzOuuukmSEEKUMp4rAjkwHvgZjTn07Hl 2yURQO5P68NHEHDfI/scOsTO3wGWtstG1dmEI7ZxhZRO+U5FuRIAsVpX+72nD1JvscZl cqKdKkBau8tmQxjGqpQg3i+0e4ozuPqsW20MyGP+YfAhT90TAGR/34thk+mlajyASlQ7 PrgHh2mNWV9YEo4z/e+bDUvTM+U0HOu3x0aJC/unvP7aMAUw7rDHYO7yoYJf5Tmm2Teq czElzigYVMyenrQJ3fsV93KkT4+F1xYaJ1cqOA/SYF/kTunELGdHfOTRlq5M//cOe6cO LFXw== X-Gm-Message-State: APjAAAXxzjPKwUtALPdb4DXX7Usm5Npa8a+qb0c2RVsMt+09NUM8DEv1 3bkjZNhWIv2LNJb1AZ5vxiVaQ79peVZ6rh3T X-Received: by 2002:a1c:964f:: with SMTP id y76mr15063961wmd.62.1577985862154; Thu, 02 Jan 2020 09:24:22 -0800 (PST) Received: from amanieu-laptop.home ([2a01:cb19:8051:6200:3fe7:84:7f3:e713]) by smtp.gmail.com with ESMTPSA id z21sm9480328wml.5.2020.01.02.09.24.21 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 02 Jan 2020 09:24:21 -0800 (PST) From: Amanieu d'Antras To: linux-kernel@vger.kernel.org Cc: Christian Brauner , stable@vger.kernel.org, Amanieu d'Antras Subject: [PATCH 7/7] clone3: ensure copy_thread_tls is implemented Date: Thu, 2 Jan 2020 18:24:13 +0100 Message-Id: <20200102172413.654385-8-amanieu@gmail.com> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200102172413.654385-1-amanieu@gmail.com> References: <20200102172413.654385-1-amanieu@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org copy_thread implementations handle CLONE_SETTLS by reading the TLS value from the registers containing the syscall arguments for clone. This doesn't work with clone3 since the TLS value is passed in clone_args instead. Signed-off-by: Amanieu d'Antras Cc: # 5.3.x --- kernel/fork.c | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/kernel/fork.c b/kernel/fork.c index 2508a4f238a3..080809560072 100644 --- a/kernel/fork.c +++ b/kernel/fork.c @@ -2578,6 +2578,16 @@ SYSCALL_DEFINE5(clone, unsigned long, clone_flags, unsigned long, newsp, #endif #ifdef __ARCH_WANT_SYS_CLONE3 + +/* + * copy_thread implementations handle CLONE_SETTLS by reading the TLS value from + * the registers containing the syscall arguments for clone. This doesn't work + * with clone3 since the TLS value is passed in clone_args instead. + */ +#ifndef CONFIG_HAVE_COPY_THREAD_TLS +#error clone3 requires copy_thread_tls support in arch +#endif + noinline static int copy_clone_args_from_user(struct kernel_clone_args *kargs, struct clone_args __user *uargs, size_t usize) -- 2.24.1