Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp5021278ybl; Tue, 14 Jan 2020 02:07:03 -0800 (PST) X-Google-Smtp-Source: APXvYqy7y4Fe+1IZ+IRxizlSFaAEKYuzw5n+kGsOMmlkVEJhBli+ZtW3EH5BN71XkrwRePohR10O X-Received: by 2002:a9d:7851:: with SMTP id c17mr16878338otm.58.1578996421037; Tue, 14 Jan 2020 02:07:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578996421; cv=none; d=google.com; s=arc-20160816; b=NnnSwKB1AGfCddEvYjC6FvC8BqQMM6c6EBrgWj4TENDxfkbTxIszTnC7eGb6NrAsND q34YIEWtpsFsMHCsOpuHnMbmRhu6y9Vgdd62SDlm40lwZyI94wMjIP16/YfBlKE0FXH9 +IYRvq4Kcsevy5HgQoJQZpWQfglvw72U2NaJLVIgT0zhk+VgPdBxcfJ2beskyN/GWXIv nk9+CDyDsmF72HjhN2dQ+tgFR8Ra3otUmS+2x74sn7duooN/aQq2OAMBR1mDyZ+WAdNz C++4xi7SEhR1K1Qwyn0TcaaTofxa6yYtDRQGxYrhgdZNIi5O8+EevFJW8kAUpealDfQW TDWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JDyiE4803p9t14UxckAskkpvk1P2YRdD7L3zhErq04E=; b=D71dAm2iBM0mqRjN3ASY6ciic7orXIhlwAONULsPzQYCLA77TEIE1cW2tusk0kktuD rf5oW3XqIhw90/URjp4CTzU5oWfKhp7xMfV4ygguOA2plIPk5laki7r98HLoIXgbwx2j 4UF/pviNhu37ja+aFdnCuH2sY5oQX0IVhFGEWNS3YJgEW8pao4GjnybPk2raZBaD87wK nqYRDcj1pZPiFNtz18Igt5NlTkaAJtyGc0JHkdTfh5rj32iosQV89bMWuJkh0PGm9IjA gD5TIalLI3ObjHxzB+DAc4hwekQIgXE0FwbEG2MaOcthyRwDEx4tDgi+x331vzITKSJD vpiw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=rXWK6rTa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w5si8587790otq.238.2020.01.14.02.06.48; Tue, 14 Jan 2020 02:07:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=rXWK6rTa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730189AbgANKFn (ORCPT + 99 others); Tue, 14 Jan 2020 05:05:43 -0500 Received: from mail.kernel.org ([198.145.29.99]:33882 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730154AbgANKFi (ORCPT ); Tue, 14 Jan 2020 05:05:38 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 91BA52467D; Tue, 14 Jan 2020 10:05:37 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1578996338; bh=jMKI6v65FTBsSYZvJUeHNjo+HJGBAmYqD6BdTqDO74M=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=rXWK6rTaQm1Lx1OyZOwu1Mvdsig3DkqhYxkVhoGZsgyr7Kcg9tiqQeXTKgss1tgrC mpTP/j3gbV1Gpx2m8uQM6nI0ohRW+vrLEOTodSZwZr7rnFZThiXMr/SiGzSHf91hAq 3HezGaDPuSSIvD8hufEt0iWfYcO9V3+WNE0I7TII= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Amanieu dAntras , linux-riscv@lists.infradead.org, Christian Brauner Subject: [PATCH 5.4 61/78] riscv: Implement copy_thread_tls Date: Tue, 14 Jan 2020 11:01:35 +0100 Message-Id: <20200114094401.622410384@linuxfoundation.org> X-Mailer: git-send-email 2.24.1 In-Reply-To: <20200114094352.428808181@linuxfoundation.org> References: <20200114094352.428808181@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Amanieu d'Antras commit 20bda4ed62f507ed72e30e817b43c65fdba60be7 upstream. This is required for clone3 which passes the TLS value through a struct rather than a register. Signed-off-by: Amanieu d'Antras Cc: linux-riscv@lists.infradead.org Cc: # 5.3.x Link: https://lore.kernel.org/r/20200102172413.654385-6-amanieu@gmail.com Signed-off-by: Christian Brauner Signed-off-by: Greg Kroah-Hartman --- arch/riscv/Kconfig | 1 + arch/riscv/kernel/process.c | 6 +++--- 2 files changed, 4 insertions(+), 3 deletions(-) --- a/arch/riscv/Kconfig +++ b/arch/riscv/Kconfig @@ -61,6 +61,7 @@ config RISCV select SPARSEMEM_STATIC if 32BIT select ARCH_WANT_DEFAULT_TOPDOWN_MMAP_LAYOUT if MMU select HAVE_ARCH_MMAP_RND_BITS + select HAVE_COPY_THREAD_TLS config ARCH_MMAP_RND_BITS_MIN default 18 if 64BIT --- a/arch/riscv/kernel/process.c +++ b/arch/riscv/kernel/process.c @@ -99,8 +99,8 @@ int arch_dup_task_struct(struct task_str return 0; } -int copy_thread(unsigned long clone_flags, unsigned long usp, - unsigned long arg, struct task_struct *p) +int copy_thread_tls(unsigned long clone_flags, unsigned long usp, + unsigned long arg, struct task_struct *p, unsigned long tls) { struct pt_regs *childregs = task_pt_regs(p); @@ -120,7 +120,7 @@ int copy_thread(unsigned long clone_flag if (usp) /* User fork */ childregs->sp = usp; if (clone_flags & CLONE_SETTLS) - childregs->tp = childregs->a5; + childregs->tp = tls; childregs->a0 = 0; /* Return value of fork() */ p->thread.ra = (unsigned long)ret_from_fork; }