Received: by 2002:a5d:9c59:0:0:0:0:0 with SMTP id 25csp1079555iof; Mon, 6 Jun 2022 20:09:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyriJPJyJMKVSA1Blf0Wk/Bogc8TSAvorWfRbTC6kB+7n7HGjtKUXV6ivbP6h+3/XuTmsnS X-Received: by 2002:a17:907:9722:b0:706:19d0:80b5 with SMTP id jg34-20020a170907972200b0070619d080b5mr24479904ejc.33.1654571371770; Mon, 06 Jun 2022 20:09:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1654571371; cv=none; d=google.com; s=arc-20160816; b=pT55gpUxnk3rnW4TJTfbca34FUBAiFi961rnoWB9mcUgk+HVS4aNoLNdZouuSm3ORf o3Lpvormb0USaFY7J6EGlOnAFsPQ7jKQ9Wm+5UXBS05PxTX/hEwnvytyZHPZDMbDyvoa 7qoao7wbSrd8BXm4NhjyySy1oYITXuNRXnFAK3zh8C9xs7N30rsoDnD9ooy85jWUcvwi TZB56cuvbBkfidhv+QLz2GN/v3gASmrMNRzp0hsSQvStZq3/pc1Xd7Ap6muZEBukUBRF hRBC0D5bUlxHINhYgXrjP97l0i9UD8eSSlf8ihC8OvxhXaNO/6aMiBeql/IC99bt+xVa OcXQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=MjojrqCS6xuxZg5uh79IanvQVrJGjYSajetX/zMk8e0=; b=AfZyqm03tbf7mHV9GtKEiyHT8KZF0sXaUNufADO7HBx9bgZwdGL+Uynnyh8amfEfmk 2pBfrD+9fQfpkMyD3q0DhjHsULo/E5b9XyC5Fpi3tKQKHbDQPQ95iafFlZQWc93pqacq 4DGZpNcToPD59B9Mvvlu/IGTwogD+P5u7K5m9dPFd+JXs5V+JXujfPuSc9SJiS44kiQ+ LCitaQr2ql0ql2Kv73+TMdbwNsCBNqdiq2zOWZlGgnvLfgdDi94HPU2qmqcdMCTFTfk4 mLMvvUBnXzdybwGT/q4hFRpVO56OFiDWsP1YyhXPqtq5uiWH4aVTCWWWRqe+SP0BYEEW 5sww== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=CyCxT5Cc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u23-20020a1709060b1700b00711dc1e614csi1683747ejg.883.2022.06.06.20.09.02; Mon, 06 Jun 2022 20:09:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=CyCxT5Cc; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234323AbiFFUne (ORCPT + 99 others); Mon, 6 Jun 2022 16:43:34 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54020 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234181AbiFFUms (ORCPT ); Mon, 6 Jun 2022 16:42:48 -0400 Received: from mail-oi1-x231.google.com (mail-oi1-x231.google.com [IPv6:2607:f8b0:4864:20::231]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id AB041122B6C for ; Mon, 6 Jun 2022 13:38:54 -0700 (PDT) Received: by mail-oi1-x231.google.com with SMTP id q11so5934396oih.10 for ; Mon, 06 Jun 2022 13:38:54 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=MjojrqCS6xuxZg5uh79IanvQVrJGjYSajetX/zMk8e0=; b=CyCxT5CceEiDwirzG5qf3Az/veov1N3xQFxd+GDt5IeT6iXLElSuuJiVfLgT0IH+bQ sePYEi9fuWmV4kN01dV49Mzcq72MvZPPzVTDOxFRvOPYVxmc3piQ1KAvTYzzgjLDC2bn yxW7w96cbKcD+tg2oUfzWi9exLkmI8Nm55adKYpL4h6CIi5GVmE1077zh36ZGnGdw3+8 mxWJTnk+Gb6fC+cBYkrVOh+JwXFj4APDuUWg+5wDgFzxOXax7P4jo00om8Ch8rxgwIvx tKwbXmqNcbRjYnPCLUfzEy3ZbFdQNTjwehaHQMKLjR7u/XghCI1493zfPyicVlIlibba 3cUw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=MjojrqCS6xuxZg5uh79IanvQVrJGjYSajetX/zMk8e0=; b=0wwR88+C8EALD2biq7U0g7371il+/pwMZmTzw97epawRAJc8jVULGrYSX6vtzGInGu m3MihlEhUS1ud8YwOWDiyMJHJVfqTcL6ykenqYwL5zEq98hYKCJ0EAO9R2JG/lWvjFy7 myknGpMfPEf1v6OjWiFDs+MdwenbOpMoVHOetdPCzVjyVUztMlCk8fnyOhjn93Ng0LBB q80eRXVsfE6RDhdpJJgvz9vRZRBADbuP6Q3AdMWpXHEq2g7vR39Z1wK2BqgDcZUHxofA Q3nYngn2La1jNQTPsV+oCCw96eDEfd6Q7L2pyTLcte2YrmSCo9sIcBl1m/rWuNtap5ys x81A== X-Gm-Message-State: AOAM532DHyqfrKeE3NUxHp0tykZVHnI8dK0yvz+XibRMTa6oB6g2Wc4Q ek9mtfmSHnuz2YI7oYZJrW4+8BXWXg== X-Received: by 2002:a05:6808:f91:b0:32b:5c6f:4cce with SMTP id o17-20020a0568080f9100b0032b5c6f4ccemr15325454oiw.274.1654547934113; Mon, 06 Jun 2022 13:38:54 -0700 (PDT) Received: from citadel.. (174-084-153-250.res.spectrum.com. [174.84.153.250]) by smtp.gmail.com with ESMTPSA id j22-20020a056808035600b0032e3cca8561sm4327188oie.21.2022.06.06.13.38.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 06 Jun 2022 13:38:53 -0700 (PDT) From: Brian Gerst To: linux-kernel@vger.kernel.org, x86@kernel.org Cc: Thomas Gleixner , Andy Lutomirski , Borislav Petkov , "H . Peter Anvin" , Peter Zijlstra , "Eric W . Biederman" , Brian Gerst Subject: [PATCH 6/8] x86/signal: Add ABI prefixes to frame setup functions Date: Mon, 6 Jun 2022 16:38:00 -0400 Message-Id: <20220606203802.158958-7-brgerst@gmail.com> X-Mailer: git-send-email 2.35.3 In-Reply-To: <20220606203802.158958-1-brgerst@gmail.com> References: <20220606203802.158958-1-brgerst@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add ABI prefixes to the frame setup functions that didn't already have them. To avoid compiler warnings and prepare for moving these functions to separate files, make them non-static. Signed-off-by: Brian Gerst --- arch/x86/include/asm/fpu/signal.h | 5 ----- arch/x86/include/asm/sighandling.h | 5 +++++ arch/x86/kernel/signal.c | 18 +++++++----------- 3 files changed, 12 insertions(+), 16 deletions(-) diff --git a/arch/x86/include/asm/fpu/signal.h b/arch/x86/include/asm/fpu/signal.h index 2f255aca5622..611fa41711af 100644 --- a/arch/x86/include/asm/fpu/signal.h +++ b/arch/x86/include/asm/fpu/signal.h @@ -13,14 +13,9 @@ #ifdef CONFIG_X86_64 # include # include -struct ksignal; -int ia32_setup_rt_frame(struct ksignal *ksig, struct pt_regs *regs); -int ia32_setup_frame(struct ksignal *ksig, struct pt_regs *regs); #else # define user_i387_ia32_struct user_i387_struct # define user32_fxsr_struct user_fxsr_struct -# define ia32_setup_frame __setup_frame -# define ia32_setup_rt_frame __setup_rt_frame #endif extern void convert_from_fxsr(struct user_i387_ia32_struct *env, diff --git a/arch/x86/include/asm/sighandling.h b/arch/x86/include/asm/sighandling.h index c9e9784efe38..e770c4fc47f4 100644 --- a/arch/x86/include/asm/sighandling.h +++ b/arch/x86/include/asm/sighandling.h @@ -19,4 +19,9 @@ void __user * get_sigframe(struct ksignal *ksig, struct pt_regs *regs, size_t frame_size, void __user **fpstate); +int ia32_setup_frame(struct ksignal *ksig, struct pt_regs *regs); +int ia32_setup_rt_frame(struct ksignal *ksig, struct pt_regs *regs); +int x64_setup_rt_frame(struct ksignal *ksig, struct pt_regs *regs); +int x32_setup_rt_frame(struct ksignal *ksig, struct pt_regs *regs); + #endif /* _ASM_X86_SIGHANDLING_H */ diff --git a/arch/x86/kernel/signal.c b/arch/x86/kernel/signal.c index 890ca0523570..0511e050d24a 100644 --- a/arch/x86/kernel/signal.c +++ b/arch/x86/kernel/signal.c @@ -336,8 +336,7 @@ static const struct { 0 }; -static int -__setup_frame(struct ksignal *ksig, struct pt_regs *regs) +int ia32_setup_frame(struct ksignal *ksig, struct pt_regs *regs) { sigset_t *set = sigmask_to_save(); struct sigframe __user *frame; @@ -392,7 +391,7 @@ __setup_frame(struct ksignal *ksig, struct pt_regs *regs) return -EFAULT; } -static int __setup_rt_frame(struct ksignal *ksig, struct pt_regs *regs) +int ia32_setup_rt_frame(struct ksignal *ksig, struct pt_regs *regs) { sigset_t *set = sigmask_to_save(); struct rt_sigframe __user *frame; @@ -471,7 +470,7 @@ static unsigned long frame_uc_flags(struct pt_regs *regs) return flags; } -static int __setup_rt_frame(struct ksignal *ksig, struct pt_regs *regs) +int x64_setup_rt_frame(struct ksignal *ksig, struct pt_regs *regs) { sigset_t *set = sigmask_to_save(); struct rt_sigframe __user *frame; @@ -571,11 +570,9 @@ int copy_siginfo_to_user32(struct compat_siginfo __user *to, return x32_copy_siginfo_to_user(to, from); return __copy_siginfo_to_user32(to, from); } -#endif /* CONFIG_X86_X32_ABI */ -static int x32_setup_rt_frame(struct ksignal *ksig, struct pt_regs *regs) +int x32_setup_rt_frame(struct ksignal *ksig, struct pt_regs *regs) { -#ifdef CONFIG_X86_X32_ABI compat_sigset_t *set = (compat_sigset_t *) sigmask_to_save(); struct rt_sigframe_x32 __user *frame; unsigned long uc_flags; @@ -622,15 +619,14 @@ static int x32_setup_rt_frame(struct ksignal *ksig, struct pt_regs *regs) regs->cs = __USER_CS; regs->ss = __USER_DS; -#endif /* CONFIG_X86_X32_ABI */ return 0; -#ifdef CONFIG_X86_X32_ABI + Efault: user_access_end(); return -EFAULT; -#endif } +#endif /* CONFIG_X86_X32_ABI */ /* * Do a signal return; undo the signal stack. @@ -770,7 +766,7 @@ setup_rt_frame(struct ksignal *ksig, struct pt_regs *regs) } else if (is_x32_frame(ksig)) { return x32_setup_rt_frame(ksig, regs); } else { - return __setup_rt_frame(ksig, regs); + return x64_setup_rt_frame(ksig, regs); } } -- 2.35.3