Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp1229283pxv; Fri, 16 Jul 2021 04:50:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwuIim/YaGdpGBFSywKUSiw6CoUkMly8Fop8u6OAkZX2/j59EJ7gekzDKiYbF33fyjMpGyM X-Received: by 2002:a5d:8986:: with SMTP id m6mr7035236iol.87.1626436226558; Fri, 16 Jul 2021 04:50:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626436226; cv=none; d=google.com; s=arc-20160816; b=t2oWWA54LGeJvYk64xgiUt9dxMjGcIWJBirIpPpkLy+oYVDnIzqKkyUyoz2YNWZw1I Y7ao/crvw5UnfklAKtn5cyxvgOG+j+vYlyJNszIzAjp1eHbREr0urdCDWhAGJ4msCHDM /KHATnUCc6WynbG8ekqAypvXDxlVuZLd//nOlWzvaI0oRwYuktj030evEft7IeAIraJT STCjTzwsQJhweME7R0pzRhBMdC7mpnWsJcjoRlrgOLC+sY+xv3lftUmIPJx2uhD1jap8 cFChdJZduVXGAH5kTmu5jrpCrV0WHa5XRpPN60CFu8cokA5ye0i8G0ikN+IrLkq/HB89 ID9g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=JBDiVd1cIkOM0UYh+A3OX5H90z0c0oFIied3Z31qv0U=; b=hUUlYDoJNW59U1ptqGSkcj/OQRWoSOzf2Gy2HfZhfJqiho427eYMadR+B55cETrrwI esF3zbPp8mRiiiZ0+c/B+r10kkLoDhFb5kLgRIk7P7mJZMXSCuySrTRX3/NXeQT77HNF 3vWVGyipCLFMJeRrZwY5GL5RHIeDvkWblBTWltA3ZGUC1dKNwRsUxEHGYNXrgOnuOBrt i5wcDHBrhGvLvIA8ChHrM6iSv/2/Y6q9CyCHgektlgkk78wOhpAh8ucY+sMw5fz/IULP muSQRVekHzH50IQWqH9vZg/08vl5u9r7Rt0Jw/8nJDAthM/8hA/l0Xp8vvVHwgMGTyma LzoQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=gSPmr7lU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x10si2826698ilu.80.2021.07.16.04.50.14; Fri, 16 Jul 2021 04:50:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=gSPmr7lU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235127AbhGPLvp (ORCPT + 99 others); Fri, 16 Jul 2021 07:51:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34548 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232923AbhGPLvo (ORCPT ); Fri, 16 Jul 2021 07:51:44 -0400 Received: from mail-oi1-x22d.google.com (mail-oi1-x22d.google.com [IPv6:2607:f8b0:4864:20::22d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 85480C061760 for ; Fri, 16 Jul 2021 04:48:49 -0700 (PDT) Received: by mail-oi1-x22d.google.com with SMTP id h9so10585995oih.4 for ; Fri, 16 Jul 2021 04:48:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=JBDiVd1cIkOM0UYh+A3OX5H90z0c0oFIied3Z31qv0U=; b=gSPmr7lU1oUhLDXOUzHAv8ekI3BKFM0jh/vQdNZoh+RYnQYQSi9u0tDVeJJZN2eRsf YGChMn2y0O/oOdUG954AtIkWRKiJVrorBf/W6GGSk27+zPJH/6LXgEwQ1r5NER1AhbQR 2wdIi7xU94X/B8g2gZ0jYxsPiR6nWD2NFG9SkYbhsfsZVfWuEFyi9NakKL/zLjlwLn6Y uszvMIR8nKDP/1cxzBWl0rW1x2krgK93IIzHtrmZXODzNgUA10cppjag6Dwt2zFyCeZ0 RHAaQtINMzrMkOrTfXcYfdFNcdjLJ/BqlS4p4YmsOlc7XHs3Nz3TrhBqe5Tl5fUBnyXL zh7w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=JBDiVd1cIkOM0UYh+A3OX5H90z0c0oFIied3Z31qv0U=; b=YIhE+sDgmt2ZUqCJzk/fnVXKWJKr7mi73mEH96Ccyz6ehzVFcEuOrM7AloZW/xjQby CLAVkJOLdTPfj9BwPXOGhu4zpDGLu6YZc7o/P+nVnTkEtwQJ6/dEZ9W5I0Fq42IK7oyz Z2frAc1Zlu7Lazkra/5d4ZVggeXR6qnY2VklDhi0C8e5mlLqKv8uCjlhfL3z283JoDRk rT9vGLlEDJToNuA2Knxw00whhInQe2Ullt4pD0hJlFFxG2BUoLQ5NbC9PDKDrldDMWwZ //fEIyEFe6Al9oZ7s4p4cFw/123oGo+JwyKiSvjWQMNSVymsF2s5FKwZM9IziDyT/01V fVog== X-Gm-Message-State: AOAM530Vd/LFMMm2NpEU4jxMeosR75c4CJcknvy2sFn8xXOyviF0lYAD /RF9bo51kv3wdlt1HOfKyXnrHfjPjVc71DfqER8umw== X-Received: by 2002:aca:4705:: with SMTP id u5mr7755996oia.70.1626436128741; Fri, 16 Jul 2021 04:48:48 -0700 (PDT) MIME-Version: 1.0 References: <87a6mnzbx2.fsf_-_@disp2133> <87h7gvxx7l.fsf_-_@disp2133> In-Reply-To: <87h7gvxx7l.fsf_-_@disp2133> From: Marco Elver Date: Fri, 16 Jul 2021 13:48:37 +0200 Message-ID: Subject: Re: [PATCH 5/6] signal/alpha: si_trapno is only used with SIGFPE and SIGTRAP TRAP_UNK To: "Eric W. Biederman" Cc: Arnd Bergmann , Florian Weimer , "David S. Miller" , Peter Zijlstra , Ingo Molnar , Thomas Gleixner , Peter Collingbourne , Dmitry Vyukov , Alexander Potapenko , sparclinux , linux-arch , Linux Kernel Mailing List , Linux API , kasan-dev Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 15 Jul 2021 at 20:13, Eric W. Biederman wrote: > While reviewing the signal handlers on alpha it became clear that > si_trapno is only set to a non-zero value when sending SIGFPE and when > sending SITGRAP with si_code TRAP_UNK. > > Add send_sig_fault_trapno and send SIGTRAP TRAP_UNK, and SIGFPE with it. > > Remove the define of __ARCH_SI_TRAPNO and remove the always zero > si_trapno parameter from send_sig_fault and force_sig_fault. > > v1: https://lkml.kernel.org/r/m1eeers7q7.fsf_-_@fess.ebiederm.org > v2: https://lkml.kernel.org/r/20210505141101.11519-7-ebiederm@xmission.com > Signed-off-by: "Eric W. Biederman" Reviewed-by: Marco Elver > --- > arch/alpha/include/uapi/asm/siginfo.h | 2 -- > arch/alpha/kernel/osf_sys.c | 2 +- > arch/alpha/kernel/signal.c | 4 ++-- > arch/alpha/kernel/traps.c | 26 +++++++++++++------------- > arch/alpha/mm/fault.c | 4 ++-- > include/linux/sched/signal.h | 2 ++ > kernel/signal.c | 21 +++++++++++++++++++++ > 7 files changed, 41 insertions(+), 20 deletions(-) > > diff --git a/arch/alpha/include/uapi/asm/siginfo.h b/arch/alpha/include/uapi/asm/siginfo.h > index 6e1a2af2f962..e08eae88182b 100644 > --- a/arch/alpha/include/uapi/asm/siginfo.h > +++ b/arch/alpha/include/uapi/asm/siginfo.h > @@ -2,8 +2,6 @@ > #ifndef _ALPHA_SIGINFO_H > #define _ALPHA_SIGINFO_H > > -#define __ARCH_SI_TRAPNO > - > #include > > #endif > diff --git a/arch/alpha/kernel/osf_sys.c b/arch/alpha/kernel/osf_sys.c > index d5367a1c6300..bbdb1a9a5fd8 100644 > --- a/arch/alpha/kernel/osf_sys.c > +++ b/arch/alpha/kernel/osf_sys.c > @@ -876,7 +876,7 @@ SYSCALL_DEFINE5(osf_setsysinfo, unsigned long, op, void __user *, buffer, > if (fex & IEEE_TRAP_ENABLE_DZE) si_code = FPE_FLTDIV; > if (fex & IEEE_TRAP_ENABLE_INV) si_code = FPE_FLTINV; > > - send_sig_fault(SIGFPE, si_code, > + send_sig_fault_trapno(SIGFPE, si_code, > (void __user *)NULL, /* FIXME */ > 0, current); > } > diff --git a/arch/alpha/kernel/signal.c b/arch/alpha/kernel/signal.c > index 948b89789da8..bc077babafab 100644 > --- a/arch/alpha/kernel/signal.c > +++ b/arch/alpha/kernel/signal.c > @@ -219,7 +219,7 @@ do_sigreturn(struct sigcontext __user *sc) > > /* Send SIGTRAP if we're single-stepping: */ > if (ptrace_cancel_bpt (current)) { > - send_sig_fault(SIGTRAP, TRAP_BRKPT, (void __user *) regs->pc, 0, > + send_sig_fault(SIGTRAP, TRAP_BRKPT, (void __user *) regs->pc, > current); > } > return; > @@ -247,7 +247,7 @@ do_rt_sigreturn(struct rt_sigframe __user *frame) > > /* Send SIGTRAP if we're single-stepping: */ > if (ptrace_cancel_bpt (current)) { > - send_sig_fault(SIGTRAP, TRAP_BRKPT, (void __user *) regs->pc, 0, > + send_sig_fault(SIGTRAP, TRAP_BRKPT, (void __user *) regs->pc, > current); > } > return; > diff --git a/arch/alpha/kernel/traps.c b/arch/alpha/kernel/traps.c > index 921d4b6e4d95..e9e3de18793b 100644 > --- a/arch/alpha/kernel/traps.c > +++ b/arch/alpha/kernel/traps.c > @@ -227,7 +227,7 @@ do_entArith(unsigned long summary, unsigned long write_mask, > } > die_if_kernel("Arithmetic fault", regs, 0, NULL); > > - send_sig_fault(SIGFPE, si_code, (void __user *) regs->pc, 0, current); > + send_sig_fault_trapno(SIGFPE, si_code, (void __user *) regs->pc, 0, current); > } > > asmlinkage void > @@ -268,13 +268,13 @@ do_entIF(unsigned long type, struct pt_regs *regs) > regs->pc -= 4; /* make pc point to former bpt */ > } > > - send_sig_fault(SIGTRAP, TRAP_BRKPT, (void __user *)regs->pc, 0, > + send_sig_fault(SIGTRAP, TRAP_BRKPT, (void __user *)regs->pc, > current); > return; > > case 1: /* bugcheck */ > - send_sig_fault(SIGTRAP, TRAP_UNK, (void __user *) regs->pc, 0, > - current); > + send_sig_fault_trapno(SIGTRAP, TRAP_UNK, > + (void __user *) regs->pc, 0, current); > return; > > case 2: /* gentrap */ > @@ -335,8 +335,8 @@ do_entIF(unsigned long type, struct pt_regs *regs) > break; > } > > - send_sig_fault(signo, code, (void __user *) regs->pc, regs->r16, > - current); > + send_sig_fault_trapno(signo, code, (void __user *) regs->pc, > + regs->r16, current); > return; > > case 4: /* opDEC */ > @@ -360,9 +360,9 @@ do_entIF(unsigned long type, struct pt_regs *regs) > if (si_code == 0) > return; > if (si_code > 0) { > - send_sig_fault(SIGFPE, si_code, > - (void __user *) regs->pc, 0, > - current); > + send_sig_fault_trapno(SIGFPE, si_code, > + (void __user *) regs->pc, > + 0, current); > return; > } > } > @@ -387,7 +387,7 @@ do_entIF(unsigned long type, struct pt_regs *regs) > ; > } > > - send_sig_fault(SIGILL, ILL_ILLOPC, (void __user *)regs->pc, 0, current); > + send_sig_fault(SIGILL, ILL_ILLOPC, (void __user *)regs->pc, current); > } > > /* There is an ifdef in the PALcode in MILO that enables a > @@ -402,7 +402,7 @@ do_entDbg(struct pt_regs *regs) > { > die_if_kernel("Instruction fault", regs, 0, NULL); > > - force_sig_fault(SIGILL, ILL_ILLOPC, (void __user *)regs->pc, 0); > + force_sig_fault(SIGILL, ILL_ILLOPC, (void __user *)regs->pc); > } > > > @@ -964,12 +964,12 @@ do_entUnaUser(void __user * va, unsigned long opcode, > si_code = SEGV_MAPERR; > mmap_read_unlock(mm); > } > - send_sig_fault(SIGSEGV, si_code, va, 0, current); > + send_sig_fault(SIGSEGV, si_code, va, current); > return; > > give_sigbus: > regs->pc -= 4; > - send_sig_fault(SIGBUS, BUS_ADRALN, va, 0, current); > + send_sig_fault(SIGBUS, BUS_ADRALN, va, current); > return; > } > > diff --git a/arch/alpha/mm/fault.c b/arch/alpha/mm/fault.c > index 09172f017efc..eee5102c3d88 100644 > --- a/arch/alpha/mm/fault.c > +++ b/arch/alpha/mm/fault.c > @@ -219,13 +219,13 @@ do_page_fault(unsigned long address, unsigned long mmcsr, > mmap_read_unlock(mm); > /* Send a sigbus, regardless of whether we were in kernel > or user mode. */ > - force_sig_fault(SIGBUS, BUS_ADRERR, (void __user *) address, 0); > + force_sig_fault(SIGBUS, BUS_ADRERR, (void __user *) address); > if (!user_mode(regs)) > goto no_context; > return; > > do_sigsegv: > - force_sig_fault(SIGSEGV, si_code, (void __user *) address, 0); > + force_sig_fault(SIGSEGV, si_code, (void __user *) address); > return; > > #ifdef CONFIG_ALPHA_LARGE_VMALLOC > diff --git a/include/linux/sched/signal.h b/include/linux/sched/signal.h > index 99a9ab2b169a..6657184cef07 100644 > --- a/include/linux/sched/signal.h > +++ b/include/linux/sched/signal.h > @@ -330,6 +330,8 @@ int force_sig_perf(void __user *addr, u32 type, u64 sig_data); > > int force_sig_ptrace_errno_trap(int errno, void __user *addr); > int force_sig_fault_trapno(int sig, int code, void __user *addr, int trapno); > +int send_sig_fault_trapno(int sig, int code, void __user *addr, int trapno, > + struct task_struct *t); > > extern int send_sig_info(int, struct kernel_siginfo *, struct task_struct *); > extern void force_sigsegv(int sig); > diff --git a/kernel/signal.c b/kernel/signal.c > index 87a374225277..ae06a424aa72 100644 > --- a/kernel/signal.c > +++ b/kernel/signal.c > @@ -1824,6 +1824,23 @@ int force_sig_fault_trapno(int sig, int code, void __user *addr, int trapno) > return force_sig_info(&info); > } > > +/* For the rare architectures that include trap information using > + * si_trapno. > + */ > +int send_sig_fault_trapno(int sig, int code, void __user *addr, int trapno, > + struct task_struct *t) > +{ > + struct kernel_siginfo info; > + > + clear_siginfo(&info); > + info.si_signo = sig; > + info.si_errno = 0; > + info.si_code = code; > + info.si_addr = addr; > + info.si_trapno = trapno; > + return send_sig_info(info.si_signo, &info, t); > +} > + > int kill_pgrp(struct pid *pid, int sig, int priv) > { > int ret; > @@ -3262,6 +3279,10 @@ enum siginfo_layout siginfo_layout(unsigned sig, int si_code) > else if (IS_ENABLED(CONFIG_SPARC) && > (sig == SIGILL) && (si_code == ILL_ILLTRP)) > layout = SIL_FAULT_TRAPNO; > + else if (IS_ENABLED(CONFIG_ALPHA) && > + ((sig == SIGFPE) || > + ((sig == SIGTRAP) && (si_code == TRAP_UNK)))) > + layout = SIL_FAULT_TRAPNO; > #ifdef __ARCH_SI_TRAPNO > else if (layout == SIL_FAULT) > layout = SIL_FAULT_TRAPNO; > -- > 2.20.1 >