Received: by 2002:a05:6a10:a852:0:0:0:0 with SMTP id d18csp779595pxy; Fri, 30 Apr 2021 16:44:19 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx5J65YA4TlLCOqhqddHSwTNdcRaYn3yf+vTuIMSDmqa9l3AJl/Tg1McpSuDuU1xzBAB+d4 X-Received: by 2002:a17:906:4407:: with SMTP id x7mr6851493ejo.546.1619826259418; Fri, 30 Apr 2021 16:44:19 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1619826259; cv=none; d=google.com; s=arc-20160816; b=kB2dRUBo1tnbWdBaI6eitJMmF5Xw4Vsc1xPaW0nRijqsND4wA91NqXK5KRFw3M64cf 8T8oBsuU5HiRPEVKRlZrVa2k5U6/1Kpj4g/xc63JYnZ2zR6ShwX1UA7WbFaWHD0FUlNI 7vrmlLGOCCNpwFep/O45+UQV4kiPW/w++SUXAIAc5cahWDLnmlpl5UcOm3GuS8eM9m2R iT8ikofheE3MkhIkCVnYE/lVGlijM83TPq/2EKoLZVFJlwGrEZ2H43OTi8d876hlzNhU qKAIBrHzmXJ8y2O2ieVbuPn1ou89rNB3y/+N2o2uRc9XfQ0OX0L2npXSFZ7BGSaWGc2G x5Jg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:subject:mime-version:user-agent:message-id :in-reply-to:date:references:cc:to:from; bh=s5I+R4RUq9FVHCkDh71Kn64ttMDth8OiFszzN0AEOz4=; b=cH0ElX5AnOVp/lsPJ5mXjSWsT4jVSgWjhRzhNxmWJaSoQ5rNGNr15HhXFzoQ9WCdDS noYA9R6cn0s4q68m2MPns/Id2Ao7Utp5piVOW7mIN/tqJzNNMduHTpNoebjOMz4UE6W1 flVB8UcV4GfjvyNjjlJMo3jw87n+mL0nVhBirz+QMQOERq8vkrDH9SXfxYOQiFilUtHa w+kluVFE8xddGAGiz17XueqAGlK1/hBFJvXa9vXrZ1zwZr5Ub4qX6q4ek73l2oCrmVa3 kLcxi2CDIf7CYLuK//YESVP2k4HTc6m9wFxnW2Nafat4ls530VpCtzuWzVwdexf+5psm UBlg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xmission.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id br1si4790333ejb.367.2021.04.30.16.43.54; Fri, 30 Apr 2021 16:44:19 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xmission.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232847AbhD3Xnr (ORCPT + 99 others); Fri, 30 Apr 2021 19:43:47 -0400 Received: from out01.mta.xmission.com ([166.70.13.231]:39858 "EHLO out01.mta.xmission.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230508AbhD3Xnq (ORCPT ); Fri, 30 Apr 2021 19:43:46 -0400 Received: from in02.mta.xmission.com ([166.70.13.52]) by out01.mta.xmission.com with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1lccmX-00Ctw7-Ct; Fri, 30 Apr 2021 17:42:52 -0600 Received: from ip68-227-160-95.om.om.cox.net ([68.227.160.95] helo=fess.xmission.com) by in02.mta.xmission.com with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1lccmV-007JVW-DO; Fri, 30 Apr 2021 17:42:49 -0600 From: ebiederm@xmission.com (Eric W. Biederman) To: Marco Elver Cc: Arnd Bergmann , Florian Weimer , "David S. Miller" , Peter Zijlstra , Ingo Molnar , Thomas Gleixner , Peter Collingbourne , Dmitry Vyukov , Alexander Potapenko , sparclinux , linux-arch , Linux Kernel Mailing List , Linux API , kasan-dev References: Date: Fri, 30 Apr 2021 18:42:43 -0500 In-Reply-To: (Eric W. Biederman's message of "Fri, 30 Apr 2021 17:49:45 -0500") Message-ID: User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/26.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-XM-SPF: eid=1lccmV-007JVW-DO;;;mid=;;;hst=in02.mta.xmission.com;;;ip=68.227.160.95;;;frm=ebiederm@xmission.com;;;spf=neutral X-XM-AID: U2FsdGVkX1/kf+yGDzUX0CpCd2ph7fHuiNjnEXad7QU= X-SA-Exim-Connect-IP: 68.227.160.95 X-SA-Exim-Mail-From: ebiederm@xmission.com X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on sa04.xmission.com X-Spam-Level: *** X-Spam-Status: No, score=3.7 required=8.0 tests=ALL_TRUSTED,BAYES_50, DCC_CHECK_NEGATIVE,LotsOfNums_01,T_TooManySym_01,XMGappySubj_01, XMNoVowels,XMSubLong autolearn=disabled version=3.4.2 X-Spam-Report: * -1.0 ALL_TRUSTED Passed through trusted hosts only via SMTP * 0.8 BAYES_50 BODY: Bayes spam probability is 40 to 60% * [score: 0.4942] * 0.7 XMSubLong Long Subject * 0.5 XMGappySubj_01 Very gappy subject * 1.5 XMNoVowels Alpha-numberic number with no vowels * 1.2 LotsOfNums_01 BODY: Lots of long strings of numbers * -0.0 DCC_CHECK_NEGATIVE Not listed in DCC * [sa04 1397; Body=1 Fuz1=1 Fuz2=1] * 0.0 T_TooManySym_01 4+ unique symbols in subject X-Spam-DCC: XMission; sa04 1397; Body=1 Fuz1=1 Fuz2=1 X-Spam-Combo: ***;Marco Elver X-Spam-Relay-Country: X-Spam-Timing: total 1414 ms - load_scoreonly_sql: 0.06 (0.0%), signal_user_changed: 13 (0.9%), b_tie_ro: 11 (0.8%), parse: 1.51 (0.1%), extract_message_metadata: 6 (0.4%), get_uri_detail_list: 2.3 (0.2%), tests_pri_-1000: 6 (0.5%), tests_pri_-950: 1.75 (0.1%), tests_pri_-900: 1.48 (0.1%), tests_pri_-90: 64 (4.5%), check_bayes: 62 (4.4%), b_tokenize: 12 (0.9%), b_tok_get_all: 8 (0.6%), b_comp_prob: 2.3 (0.2%), b_tok_touch_all: 36 (2.5%), b_finish: 0.98 (0.1%), tests_pri_0: 1281 (90.6%), check_dkim_signature: 0.84 (0.1%), check_dkim_adsp: 2.5 (0.2%), poll_dns_idle: 0.68 (0.0%), tests_pri_10: 4.4 (0.3%), tests_pri_500: 22 (1.6%), rewrite_mail: 0.00 (0.0%) Subject: [PATCH 5/3] signal: Rename SIL_PERF_EVENT SIL_FAULT_PERF_EVENT for consistency X-SA-Exim-Version: 4.2.1 (built Sat, 08 Feb 2020 21:53:50 +0000) X-SA-Exim-Scanned: Yes (on in02.mta.xmission.com) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org It helps to know which part of the siginfo structure the siginfo_layout value is talking about. --- fs/signalfd.c | 2 +- include/linux/signal.h | 2 +- kernel/signal.c | 10 +++++----- 3 files changed, 7 insertions(+), 7 deletions(-) diff --git a/fs/signalfd.c b/fs/signalfd.c index e87e59581653..83130244f653 100644 --- a/fs/signalfd.c +++ b/fs/signalfd.c @@ -132,7 +132,7 @@ static int signalfd_copyinfo(struct signalfd_siginfo __user *uinfo, new.ssi_addr = (long) kinfo->si_addr; new.ssi_addr_lsb = (short) kinfo->si_addr_lsb; break; - case SIL_PERF_EVENT: + case SIL_FAULT_PERF_EVENT: new.ssi_addr = (long) kinfo->si_addr; new.ssi_perf = kinfo->si_perf; break; diff --git a/include/linux/signal.h b/include/linux/signal.h index 5160fd45e5ca..ed896d790e46 100644 --- a/include/linux/signal.h +++ b/include/linux/signal.h @@ -44,7 +44,7 @@ enum siginfo_layout { SIL_FAULT_MCEERR, SIL_FAULT_BNDERR, SIL_FAULT_PKUERR, - SIL_PERF_EVENT, + SIL_FAULT_PERF_EVENT, SIL_CHLD, SIL_RT, SIL_SYS, diff --git a/kernel/signal.c b/kernel/signal.c index 0517ff950d38..690921960d8b 100644 --- a/kernel/signal.c +++ b/kernel/signal.c @@ -1198,7 +1198,7 @@ static inline bool has_si_pid_and_uid(struct kernel_siginfo *info) case SIL_FAULT_MCEERR: case SIL_FAULT_BNDERR: case SIL_FAULT_PKUERR: - case SIL_PERF_EVENT: + case SIL_FAULT_PERF_EVENT: case SIL_SYS: ret = false; break; @@ -2553,7 +2553,7 @@ static void hide_si_addr_tag_bits(struct ksignal *ksig) case SIL_FAULT_MCEERR: case SIL_FAULT_BNDERR: case SIL_FAULT_PKUERR: - case SIL_PERF_EVENT: + case SIL_FAULT_PERF_EVENT: ksig->info.si_addr = arch_untagged_si_addr( ksig->info.si_addr, ksig->sig, ksig->info.si_code); break; @@ -3242,7 +3242,7 @@ enum siginfo_layout siginfo_layout(unsigned sig, int si_code) layout = SIL_FAULT_PKUERR; #endif else if ((sig == SIGTRAP) && (si_code == TRAP_PERF)) - layout = SIL_PERF_EVENT; + layout = SIL_FAULT_PERF_EVENT; } else if (si_code <= NSIGPOLL) layout = SIL_POLL; @@ -3364,7 +3364,7 @@ void copy_siginfo_to_external32(struct compat_siginfo *to, to->si_addr = ptr_to_compat(from->si_addr); to->si_pkey = from->si_pkey; break; - case SIL_PERF_EVENT: + case SIL_FAULT_PERF_EVENT: to->si_addr = ptr_to_compat(from->si_addr); to->si_perf = from->si_perf; break; @@ -3440,7 +3440,7 @@ static int post_copy_siginfo_from_user32(kernel_siginfo_t *to, to->si_addr = compat_ptr(from->si_addr); to->si_pkey = from->si_pkey; break; - case SIL_PERF_EVENT: + case SIL_FAULT_PERF_EVENT: to->si_addr = compat_ptr(from->si_addr); to->si_perf = from->si_perf; break; -- 2.30.1