Received: by 2002:a05:6a10:af89:0:0:0:0 with SMTP id iu9csp2204891pxb; Sun, 30 Jan 2022 08:16:32 -0800 (PST) X-Google-Smtp-Source: ABdhPJzQVOxzTUmn711ISi3SYxIor1QNNn0sVeR4i2QrbkFKmbhpScPY4oksDkHCjrPmUvpX68/E X-Received: by 2002:a17:90a:7e10:: with SMTP id i16mr30012607pjl.188.1643559391907; Sun, 30 Jan 2022 08:16:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1643559391; cv=none; d=google.com; s=arc-20160816; b=pTenpBVSsbsrS2B6RgsiU6iDg7UoCSk1sQlsNgvqBQfkwYKImbqf/lsAdnps/Iu7o4 3C+a5VQPOvBgkv9l58Q5qmvMHrodBvsEuW8dtb2udENzQxup7GaOHuHi/M4Rl+ezOAae 124amcg+ZjMwttUyJcQgpt4dTVM+Z4XxiZZ0PaeG95MH5PjMypLWVJdPJfD3ndGr0uxD PBYi8I6gaakxpcHzGRK8Vd7Y9SKBT7VDfnGTH0atf2tG0xFSTzPK1jGocUne48w/tN/O 4IErjQ/YYiTEHxrf11oaJHSxNTGwCuudAEbaWPU7ncbzR+pIRJaWhEcENli+AA69dbNQ //pg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=QiZ0wFdXD4uWeni4Ge5OBAL5lL6kFRUcZpIV1lxEF6g=; b=wKoyoXzK6W+kIvidJ3Edy5b/VjiTnzJPNU4EaAvbE9j1kpo91pazvjKBerTatWAtLD /Kre6+jwiQa3m9wGs2IyBClsdakvIzyTf+M0lJTzeykN1UvSxgfoEifMahNnzvjMtOU+ 7H5eA22J1Em/SK1Zd8470iAiizgyU/V+8XVGtKJ+XwgctvWgKAvYGB3bn/Wi07xx875L kq1dNgll0CSlN0WyRiP0WxBuswqHjpwd1j62gPJytfnwHUnDH/HVBJVGOjcxhjn6IjfA CMZPxVE0a2Rs7ym8/Y2GqZcLR77s/6d1GB/eMuqWAAaPwtUdNVWlL/LmdxzN3OLYlHOa LbkQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=CRAb5TSq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id kk6si4183472pjb.145.2022.01.30.08.16.20; Sun, 30 Jan 2022 08:16:31 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=CRAb5TSq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1347395AbiA1Iwr (ORCPT + 99 others); Fri, 28 Jan 2022 03:52:47 -0500 Received: from ams.source.kernel.org ([145.40.68.75]:34248 "EHLO ams.source.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238669AbiA1Iwg (ORCPT ); Fri, 28 Jan 2022 03:52:36 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id E8637B824F3; Fri, 28 Jan 2022 08:52:34 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E58E4C340E8; Fri, 28 Jan 2022 08:52:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1643359953; bh=A4ZIq4YD54mut6tILAfqK6qkKR21qOF5XKfRj9haV7U=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=CRAb5TSqgtbYl/IuvBdAeio42OQkKV8HONQvLbracpULCcVf4ckEOQIbGpEy89J0y Zyn508vIY/LKWJ/gTeXV1neO5E4LYN+y8aSu52Yzlr5bksmAye+T3h8/+vHfR8WSO0 CL2shUlnt0Xwoj4sB3n0oJ9TmcvYZPhgYb9oEKGtzKQknZnVtC4sXOVUivG+h8RC6E t3rDMlLGsG5VPY7IdKsbx9lKnQGH231ls8WgalFLUDLpBZuQt2QpmwW34FGv+Jkp4/ 8VGzOzi+aBYIleGYPrdjQRnhPpdkGn2bx1Cgg9o+asYslsEXSCFaO8VwkzvwAl02fl 3MaBw8qE9fawg== Date: Fri, 28 Jan 2022 09:52:24 +0100 From: Christian Brauner To: Mathieu Desnoyers Cc: Peter Zijlstra , linux-kernel@vger.kernel.org, Thomas Gleixner , "Paul E . McKenney" , Boqun Feng , "H . Peter Anvin" , Paul Turner , linux-api@vger.kernel.org, Shuah Khan , linux-kselftest@vger.kernel.org, Florian Weimer , Andy Lutomirski , Dave Watson , Andrew Morton , Russell King , Andi Kleen , Christian Brauner , Ben Maurer , Steven Rostedt , Josh Triplett , Linus Torvalds , Catalin Marinas , Will Deacon , Michael Kerrisk , Joel Fernandes Subject: Re: [RFC PATCH v2] rseq: Remove broken uapi field layout on 32-bit little endian Message-ID: <20220128085224.twfwxz4ttxnaeweo@wittgenstein> References: <1116876795.2062.1643223596536.JavaMail.zimbra@efficios.com> <20220127152720.25898-1-mathieu.desnoyers@efficios.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20220127152720.25898-1-mathieu.desnoyers@efficios.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jan 27, 2022 at 10:27:20AM -0500, Mathieu Desnoyers wrote: > The rseq rseq_cs.ptr.{ptr32,padding} uapi endianness handling is > entirely wrong on 32-bit little endian: a preprocessor logic mistake > wrongly uses the big endian field layout on 32-bit little endian > architectures. > > Fortunately, those ptr32 accessors were never used within the kernel, > and only meant as a convenience for user-space. > > Remove those and replace the whole rseq_cs union by a __u64 type, as > this is the only thing really needed to express the ABI. Document how > 32-bit architectures are meant to interact with this field. > > Fixes: ec9c82e03a74 ("rseq: uapi: Declare rseq_cs field as union, update includes") > Signed-off-by: Mathieu Desnoyers > Cc: Florian Weimer > Cc: Thomas Gleixner > Cc: linux-api@vger.kernel.org > Cc: Peter Zijlstra > Cc: Boqun Feng > Cc: Andy Lutomirski > Cc: Dave Watson > Cc: Paul Turner > Cc: Andrew Morton > Cc: Russell King > Cc: "H . Peter Anvin" > Cc: Andi Kleen > Cc: Christian Brauner > Cc: Ben Maurer > Cc: Steven Rostedt > Cc: Josh Triplett > Cc: Linus Torvalds > Cc: Catalin Marinas > Cc: Will Deacon > Cc: Michael Kerrisk > Cc: Joel Fernandes > Cc: Paul E. McKenney > --- Looks way cleaner now! Fwiw, Acked-by: Christian Brauner > include/uapi/linux/rseq.h | 20 ++++---------------- > kernel/rseq.c | 8 ++++---- > 2 files changed, 8 insertions(+), 20 deletions(-) > > diff --git a/include/uapi/linux/rseq.h b/include/uapi/linux/rseq.h > index 9a402fdb60e9..77ee207623a9 100644 > --- a/include/uapi/linux/rseq.h > +++ b/include/uapi/linux/rseq.h > @@ -105,23 +105,11 @@ struct rseq { > * Read and set by the kernel. Set by user-space with single-copy > * atomicity semantics. This field should only be updated by the > * thread which registered this data structure. Aligned on 64-bit. > + * > + * 32-bit architectures should update the low order bits of the > + * rseq_cs field, leaving the high order bits initialized to 0. > */ > - union { > - __u64 ptr64; > -#ifdef __LP64__ > - __u64 ptr; > -#else > - struct { > -#if (defined(__BYTE_ORDER) && (__BYTE_ORDER == __BIG_ENDIAN)) || defined(__BIG_ENDIAN) > - __u32 padding; /* Initialized to zero. */ > - __u32 ptr32; > -#else /* LITTLE */ > - __u32 ptr32; > - __u32 padding; /* Initialized to zero. */ > -#endif /* ENDIAN */ > - } ptr; > -#endif > - } rseq_cs; > + __u64 rseq_cs; > > /* > * Restartable sequences flags field. > diff --git a/kernel/rseq.c b/kernel/rseq.c > index 6d45ac3dae7f..97ac20b4f738 100644 > --- a/kernel/rseq.c > +++ b/kernel/rseq.c > @@ -128,10 +128,10 @@ static int rseq_get_rseq_cs(struct task_struct *t, struct rseq_cs *rseq_cs) > int ret; > > #ifdef CONFIG_64BIT > - if (get_user(ptr, &t->rseq->rseq_cs.ptr64)) > + if (get_user(ptr, &t->rseq->rseq_cs)) > return -EFAULT; > #else > - if (copy_from_user(&ptr, &t->rseq->rseq_cs.ptr64, sizeof(ptr))) > + if (copy_from_user(&ptr, &t->rseq->rseq_cs, sizeof(ptr))) > return -EFAULT; > #endif > if (!ptr) { > @@ -217,9 +217,9 @@ static int clear_rseq_cs(struct task_struct *t) > * Set rseq_cs to NULL. > */ > #ifdef CONFIG_64BIT > - return put_user(0UL, &t->rseq->rseq_cs.ptr64); > + return put_user(0UL, &t->rseq->rseq_cs); > #else > - if (clear_user(&t->rseq->rseq_cs.ptr64, sizeof(t->rseq->rseq_cs.ptr64))) > + if (clear_user(&t->rseq->rseq_cs, sizeof(t->rseq->rseq_cs))) > return -EFAULT; > return 0; > #endif > -- > 2.17.1 >