Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp232999pxf; Wed, 31 Mar 2021 01:48:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzKARF3gh7o63btZatz6IkyRV9MrdNMTTlD0D9fagv8q01NEgYxGLfQbTeoeYNcW7jGKeil X-Received: by 2002:a05:6402:17d6:: with SMTP id s22mr2338577edy.232.1617180516572; Wed, 31 Mar 2021 01:48:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617180516; cv=none; d=google.com; s=arc-20160816; b=ziFFPZ4X339/V7or3bauhzCxTI51tpnJ1p/F3D7+slkyTn01/DxV3cjDr9337gbw/J mktdiQSoIjNn+32SF+oTQMo/148LGGh7TIoIvxDimcHqND4Jzk9RgAN5l/yZgqu2Rhvq +EBxU2KNP8lAkikwCcnrxkPHDuxAstQrQxH+EBX7mAPrHf+gWgAbABDKZfKiwhdkWqvy LJGeD8VVmUOuiwj2cmPvYc6/wC+hQphx16RUSAYMOo+sgb2N+Uh1HSELUj3CtYEslOem 1DziIyXMkC81CspeHj7Z4GI11xf6sLTAKPhV08gPp8QZ1Id+0nRAyBswQYgSffgqNXOU FdNQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=kgS3ZS/q4Odn+57ahl9GaVmE2T7pZuknmq5xc0/y72Y=; b=qBvfQYA/KZM6yIxgYCkJLGg63YqXAGQrx2yfgqBU773sXl+vBkHGJHPROZR3gCcxct lk/bvyw/tNDKKH7djDDMTpfEFsJY6gaNMr5H8Kv6a+wlNS3XU91UlObJJAPFS7vliy9D 9uaFGN2+0Exl203UEXmRdtnMTxuXYCYSRzDhI6MfGhxzM/KSy0+nAJZcSkaNx+pK5sGK FdCHb0NYhWsBMuLF1uCOUO/LVQ77jTfrVnFGG6MjWYQq2ObonAcd/OOHesDDCkiFG0qB pBY13XPqHJykoiReTofn1scI3KMaPmW13QdcigEJRB/Gv4tbNtsYdlJWVUETCPjuAZVj QnXA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=gentoo.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ec10si1146380ejb.386.2021.03.31.01.48.13; Wed, 31 Mar 2021 01:48:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=gentoo.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230527AbhCaIpK (ORCPT + 99 others); Wed, 31 Mar 2021 04:45:10 -0400 Received: from smtp.gentoo.org ([140.211.166.183]:57624 "EHLO smtp.gentoo.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230080AbhCaIpH (ORCPT ); Wed, 31 Mar 2021 04:45:07 -0400 Received: by sf.home (Postfix, from userid 1000) id E54155A22061; Wed, 31 Mar 2021 09:44:56 +0100 (BST) From: Sergei Trofimovich To: Andrew Morton Cc: linux-kernel@vger.kernel.org, Sergei Trofimovich , Oleg Nesterov , linux-ia64@vger.kernel.org, "Dmitry V . Levin" Subject: [PATCH] ia64: fix user_stack_pointer() for ptrace() Date: Wed, 31 Mar 2021 09:44:47 +0100 Message-Id: <20210331084447.2561532-1-slyfox@gentoo.org> X-Mailer: git-send-email 2.31.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org ia64 has two stacks: - memory stack (or stack), pointed at by by r12 - register backing store (register stack), pointed at ar.bsp/ar.bspstore with complications around dirty register frame on CPU. In https://bugs.gentoo.org/769614 Dmitry noticed that PTRACE_GET_SYSCALL_INFO returns register stack instead memory stack. The bug comes from the fact that user_stack_pointer() and current_user_stack_pointer() don't return the same register: ulong user_stack_pointer(struct pt_regs *regs) { return regs->ar_bspstore; } #define current_user_stack_pointer() (current_pt_regs()->r12) The change gets both back in sync. I think ptrace(PTRACE_GET_SYSCALL_INFO) is the only affected user by this bug on ia64. The change fixes 'rt_sigreturn.gen.test' strace test where it was observed initially. CC: Andrew Morton CC: Oleg Nesterov CC: linux-ia64@vger.kernel.org Bug: https://bugs.gentoo.org/769614 Reported-by: Dmitry V. Levin Signed-off-by: Sergei Trofimovich --- arch/ia64/include/asm/ptrace.h | 8 +------- 1 file changed, 1 insertion(+), 7 deletions(-) diff --git a/arch/ia64/include/asm/ptrace.h b/arch/ia64/include/asm/ptrace.h index b3aa46090101..08179135905c 100644 --- a/arch/ia64/include/asm/ptrace.h +++ b/arch/ia64/include/asm/ptrace.h @@ -54,8 +54,7 @@ static inline unsigned long user_stack_pointer(struct pt_regs *regs) { - /* FIXME: should this be bspstore + nr_dirty regs? */ - return regs->ar_bspstore; + return regs->r12; } static inline int is_syscall_success(struct pt_regs *regs) @@ -79,11 +78,6 @@ static inline long regs_return_value(struct pt_regs *regs) unsigned long __ip = instruction_pointer(regs); \ (__ip & ~3UL) + ((__ip & 3UL) << 2); \ }) -/* - * Why not default? Because user_stack_pointer() on ia64 gives register - * stack backing store instead... - */ -#define current_user_stack_pointer() (current_pt_regs()->r12) /* given a pointer to a task_struct, return the user's pt_regs */ # define task_pt_regs(t) (((struct pt_regs *) ((char *) (t) + IA64_STK_OFFSET)) - 1) -- 2.31.1