Message ID | 1546539240-20647-3-git-send-email-will.deacon@arm.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | Fix private compat syscall emulation | expand |
Hi, [This is an automated email] This commit has been processed because it contains a -stable tag. The stable tag indicates that it's relevant for the following trees: all The bot has tested the following trees: v4.20.0, v4.19.13, v4.14.91, v4.9.148, v4.4.169, v3.18.131, v4.20.0: Failed to apply! Possible dependencies: caf41328c3a5 ("arm64: compat: Avoid sending SIGILL for unallocated syscall numbers") v4.19.13: Failed to apply! Possible dependencies: 6fa998e83ef9 ("signal/arm64: Push siginfo generation into arm64_notify_die") caf41328c3a5 ("arm64: compat: Avoid sending SIGILL for unallocated syscall numbers") v4.14.91: Failed to apply! Possible dependencies: 1fc5dce78ad1 ("arm64/sve: Low-level SVE architectural state manipulation functions") 2923f5ea7738 ("nds32: Exception handling") 2c9120f3a86a ("arm64: signal: Make force_signal_inject more robust") 3eb0f5193b49 ("signal: Ensure every siginfo we send has all bits initialized") 3f7c86b2382e ("arm64: Update fault_info table with new exception types") 42dbf54e8890 ("arm64: consistently log ESR and page table") 4fb158f65ac5 ("powerpc: track allocation status of all pkeys") 526c3ddb6aa2 ("signal/arm64: Document conflicts with SI_USER and SIGFPE,SIGTRAP,SIGBUS") 532826f3712b ("arm64: Mirror arm for unimplemented compat syscalls") 664eec400bf8 ("nds32: MMU fault handling and page table management") 6fa998e83ef9 ("signal/arm64: Push siginfo generation into arm64_notify_die") 76d2a0493a17 ("RISC-V: Init and Halt Code") 92e3da3cf193 ("powerpc: initial pkey plumbing") 92ff0674f5d8 ("arm64: mm: Rework unhandled user pagefaults to call arm64_force_sig_info") 94ef7ecbdf6f ("arm64: fpsimd: Correctly annotate exception helpers called from asm") af40ff687bc9 ("arm64: signal: Ensure si_code is valid for all fault signals") bc0ee4760364 ("arm64/sve: Core task context handling") c5cc1f4df6b1 ("powerpc/ptrace: Add memory protection key regset") v4.9.148: Failed to apply! Possible dependencies: 0e3a9026396c ("arm64: mm: Update perf accounting to handle poison faults") 32015c235603 ("arm64: exception: handle Synchronous External Abort") 3eb0f5193b49 ("signal: Ensure every siginfo we send has all bits initialized") 3f7c86b2382e ("arm64: Update fault_info table with new exception types") 4e2648db9c5f ("ARM: remove indirection of asm/mach-types.h") 526c3ddb6aa2 ("signal/arm64: Document conflicts with SI_USER and SIGFPE,SIGTRAP,SIGBUS") 532826f3712b ("arm64: Mirror arm for unimplemented compat syscalls") 5b53696a30d5 ("ACPI / APEI: Switch to use new generic UUID API") 67ce16ec15ce ("arm64: mm: print out correct page table entries") 6bc51cbaa9d7 ("signal: Remove non-uapi <asm/siginfo.h>") 6fa998e83ef9 ("signal/arm64: Push siginfo generation into arm64_notify_die") 7edda0886bc3 ("acpi: apei: handle SEA notification type for ARMv8") 80dce5e37493 ("signal/ia64: Document a conflict with SI_USER with SIGFPE") 83016b204225 ("arm64: mm: print file name of faulting vma") 92ff0674f5d8 ("arm64: mm: Rework unhandled user pagefaults to call arm64_force_sig_info") 96a8fae0fe09 ("ARM: convert to generated system call tables") a8ada146f517 ("arm64: Update the synchronous external abort fault description") af40ff687bc9 ("arm64: signal: Ensure si_code is valid for all fault signals") b9253a43370e ("signal: Move copy_siginfo_to_user to <linux/signal.h>") bbcc2e7b642e ("ras: acpi/apei: cper: add support for generic data v3 structure") c07ab957d9af ("arm64: Call __show_regs directly") cc731525f26a ("signal: Remove kernel interal si_code magic") cc9f72e474a4 ("signal/sparc: Document a conflict with SI_USER with SIGFPE") e2bd64d92a10 ("signal/alpha: Document a conflict with SI_USER for SIGTRAP") e7c600f149b8 ("arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling") ea1b75cf9138 ("signal/mips: Document a conflict with SI_USER with SIGFPE") v4.4.169: Failed to apply! Possible dependencies: 09a6adf53d42 ("arm64: mm: unaligned access by user-land should be received as SIGBUS") 0a8ea52c3eb1 ("arm64: Add HAVE_REGS_AND_STACK_ACCESS_API feature") 0e3a9026396c ("arm64: mm: Update perf accounting to handle poison faults") 2dd0e8d2d2a1 ("arm64: Kprobes with single stepping support") 3eb0f5193b49 ("signal: Ensure every siginfo we send has all bits initialized") 3eca86e75ec7 ("arm64: Remove fixmap include fragility") 532826f3712b ("arm64: Mirror arm for unimplemented compat syscalls") 67ce16ec15ce ("arm64: mm: print out correct page table entries") 6fa998e83ef9 ("signal/arm64: Push siginfo generation into arm64_notify_die") 83016b204225 ("arm64: mm: print file name of faulting vma") 92ff0674f5d8 ("arm64: mm: Rework unhandled user pagefaults to call arm64_force_sig_info") bbb1681ee365 ("arm64: mm: mark fault_info table const") c07ab957d9af ("arm64: Call __show_regs directly") cab15ce604e5 ("arm64: Introduce execute-only page access permissions") d59bee887231 ("arm64: Add more test functions to insn.c") e04a28d45ff3 ("arm64: debug: re-enable irqs before sending breakpoint SIGTRAP") e7c600f149b8 ("arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling") v3.18.131: Failed to apply! Possible dependencies: 04597a65c5ef ("arm64: Track system support for mixed endian EL0") 1b907f46db07 ("arm64: kconfig: move emulation option under kernel features") 2d888f48e056 ("arm64: Emulate SETEND for AArch32 tasks") 338d4f49d6f7 ("arm64: kernel: Add support for Privileged Access Never") 359b706473b4 ("arm64: Extract feature parsing code from cpu_errata.c") 3eb0f5193b49 ("signal: Ensure every siginfo we send has all bits initialized") 532826f3712b ("arm64: Mirror arm for unimplemented compat syscalls") 587064b610c7 ("arm64: Add framework for legacy instruction emulation") 6fa998e83ef9 ("signal/arm64: Push siginfo generation into arm64_notify_die") 7209c868600b ("arm64: mm: Set PSTATE.PAN from the cpu_enable_pan() call") 736d474f0faf ("arm64: Consolidate hotplug notifier for instruction emulation") 870828e57b14 ("arm64: kernel: Move config_sctlr_el1") 92ff0674f5d8 ("arm64: mm: Rework unhandled user pagefaults to call arm64_force_sig_info") 94a9e04aa16a ("arm64: alternative: Introduce feature for GICv3 CPU interface") 9b79f52d1a70 ("arm64: Add support for hooks to handle undefined instructions") a4980448ed65 ("arm: Remove signal translation and exec_domain") bd35a4adc413 ("arm64: Port SWP/SWPB emulation support from arm") c852f3205846 ("arm64: Emulate CP15 Barrier instructions") c9453a3ab1a3 ("arm64: alternatives: fix pr_fmt string for consistency") e7c600f149b8 ("arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling") How should we proceed with this patch? -- Thanks, Sasha
On Thu, Jan 03, 2019 at 06:13:59PM +0000, Will Deacon wrote: > The syscall number may have been changed by a tracer, so we should pass > the actual number in from the caller instead of pulling it from the > saved r7 value directly. Reviewed-by: Dave Martin <Dave.Martin@arm.com> I was confused by the history here: commit 4141c857fd09 ("arm64: convert raw syscall invocation to C") breaks syscall changing via discarding the return from syscall_trace_enter() (which would also break this case for compat), but the subsequent patch that migrates the syscall code to C appears to fix it again. > > Cc: <stable@vger.kernel.org> > Cc: Dave Martin <Dave.Martin@arm.com> > Cc: Pi-Hsun Shih <pihsun@chromium.org> > Signed-off-by: Will Deacon <will.deacon@arm.com> > --- > arch/arm64/kernel/sys_compat.c | 9 ++++----- > arch/arm64/kernel/syscall.c | 9 ++++----- > 2 files changed, 8 insertions(+), 10 deletions(-) > > diff --git a/arch/arm64/kernel/sys_compat.c b/arch/arm64/kernel/sys_compat.c > index 5972b7533fa0..54c29cd38ff9 100644 > --- a/arch/arm64/kernel/sys_compat.c > +++ b/arch/arm64/kernel/sys_compat.c > @@ -66,12 +66,11 @@ do_compat_cache_op(unsigned long start, unsigned long end, int flags) > /* > * Handle all unrecognised system calls. > */ > -long compat_arm_syscall(struct pt_regs *regs) > +long compat_arm_syscall(struct pt_regs *regs, int scno) > { > - unsigned int no = regs->regs[7]; > void __user *addr; > > - switch (no) { > + switch (scno) { > /* > * Flush a region from virtual address 'r0' to virtual address 'r1' > * _exclusive_. There is no alignment requirement on either address; > @@ -107,7 +106,7 @@ long compat_arm_syscall(struct pt_regs *regs) > * way the calling program can gracefully determine whether > * a feature is supported. > */ > - if (no < __ARM_NR_compat_syscall_end) > + if (scno < __ARM_NR_compat_syscall_end) > return -ENOSYS; > break; > } > @@ -116,6 +115,6 @@ long compat_arm_syscall(struct pt_regs *regs) > (compat_thumb_mode(regs) ? 2 : 4); > > arm64_notify_die("Oops - bad compat syscall(2)", regs, > - SIGILL, ILL_ILLTRP, addr, no); > + SIGILL, ILL_ILLTRP, addr, scno); > return 0; > } > diff --git a/arch/arm64/kernel/syscall.c b/arch/arm64/kernel/syscall.c > index 032d22312881..5610ac01c1ec 100644 > --- a/arch/arm64/kernel/syscall.c > +++ b/arch/arm64/kernel/syscall.c > @@ -13,16 +13,15 @@ > #include <asm/thread_info.h> > #include <asm/unistd.h> > > -long compat_arm_syscall(struct pt_regs *regs); > - > +long compat_arm_syscall(struct pt_regs *regs, int scno); > long sys_ni_syscall(void); > > -asmlinkage long do_ni_syscall(struct pt_regs *regs) > +static long do_ni_syscall(struct pt_regs *regs, int scno) > { > #ifdef CONFIG_COMPAT > long ret; > if (is_compat_task()) { > - ret = compat_arm_syscall(regs); > + ret = compat_arm_syscall(regs, scno); > if (ret != -ENOSYS) > return ret; > } > @@ -47,7 +46,7 @@ static void invoke_syscall(struct pt_regs *regs, unsigned int scno, > syscall_fn = syscall_table[array_index_nospec(scno, sc_nr)]; > ret = __invoke_syscall(regs, syscall_fn); > } else { > - ret = do_ni_syscall(regs); > + ret = do_ni_syscall(regs, scno); > } > > regs->regs[0] = ret; > -- > 2.1.4 > > > _______________________________________________ > linux-arm-kernel mailing list > linux-arm-kernel@lists.infradead.org > http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
diff --git a/arch/arm64/kernel/sys_compat.c b/arch/arm64/kernel/sys_compat.c index 5972b7533fa0..54c29cd38ff9 100644 --- a/arch/arm64/kernel/sys_compat.c +++ b/arch/arm64/kernel/sys_compat.c @@ -66,12 +66,11 @@ do_compat_cache_op(unsigned long start, unsigned long end, int flags) /* * Handle all unrecognised system calls. */ -long compat_arm_syscall(struct pt_regs *regs) +long compat_arm_syscall(struct pt_regs *regs, int scno) { - unsigned int no = regs->regs[7]; void __user *addr; - switch (no) { + switch (scno) { /* * Flush a region from virtual address 'r0' to virtual address 'r1' * _exclusive_. There is no alignment requirement on either address; @@ -107,7 +106,7 @@ long compat_arm_syscall(struct pt_regs *regs) * way the calling program can gracefully determine whether * a feature is supported. */ - if (no < __ARM_NR_compat_syscall_end) + if (scno < __ARM_NR_compat_syscall_end) return -ENOSYS; break; } @@ -116,6 +115,6 @@ long compat_arm_syscall(struct pt_regs *regs) (compat_thumb_mode(regs) ? 2 : 4); arm64_notify_die("Oops - bad compat syscall(2)", regs, - SIGILL, ILL_ILLTRP, addr, no); + SIGILL, ILL_ILLTRP, addr, scno); return 0; } diff --git a/arch/arm64/kernel/syscall.c b/arch/arm64/kernel/syscall.c index 032d22312881..5610ac01c1ec 100644 --- a/arch/arm64/kernel/syscall.c +++ b/arch/arm64/kernel/syscall.c @@ -13,16 +13,15 @@ #include <asm/thread_info.h> #include <asm/unistd.h> -long compat_arm_syscall(struct pt_regs *regs); - +long compat_arm_syscall(struct pt_regs *regs, int scno); long sys_ni_syscall(void); -asmlinkage long do_ni_syscall(struct pt_regs *regs) +static long do_ni_syscall(struct pt_regs *regs, int scno) { #ifdef CONFIG_COMPAT long ret; if (is_compat_task()) { - ret = compat_arm_syscall(regs); + ret = compat_arm_syscall(regs, scno); if (ret != -ENOSYS) return ret; } @@ -47,7 +46,7 @@ static void invoke_syscall(struct pt_regs *regs, unsigned int scno, syscall_fn = syscall_table[array_index_nospec(scno, sc_nr)]; ret = __invoke_syscall(regs, syscall_fn); } else { - ret = do_ni_syscall(regs); + ret = do_ni_syscall(regs, scno); } regs->regs[0] = ret;
The syscall number may have been changed by a tracer, so we should pass the actual number in from the caller instead of pulling it from the saved r7 value directly. Cc: <stable@vger.kernel.org> Cc: Dave Martin <Dave.Martin@arm.com> Cc: Pi-Hsun Shih <pihsun@chromium.org> Signed-off-by: Will Deacon <will.deacon@arm.com> --- arch/arm64/kernel/sys_compat.c | 9 ++++----- arch/arm64/kernel/syscall.c | 9 ++++----- 2 files changed, 8 insertions(+), 10 deletions(-)