Received: by 10.223.185.116 with SMTP id b49csp3985530wrg; Tue, 13 Feb 2018 10:49:02 -0800 (PST) X-Google-Smtp-Source: AH8x2243oO7atiubmnZOxGq214VKjoSPau3IQmEOjYCVkZZTPGN1NJRbLgT2VpLbjjx9ni+NKUvi X-Received: by 10.98.103.131 with SMTP id t3mr2175695pfj.53.1518547742524; Tue, 13 Feb 2018 10:49:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518547742; cv=none; d=google.com; s=arc-20160816; b=zMRsvJHRehXNHj3W+CMzal2w2hUrb3McV5KJomrtjNHnWZZQJ+u1BiQUjFYe9mMPwh l1JmkszO3/9Oh4Pr3scJcvaIPM3zPLNR/NGO/blYKxWiDm7SdnAbV/FQaD6yEftlJam1 wUsIpfj8q+vwDOBm4DYwaz8iQ2gC4vgEEWzszEPRTtIZX79OYarZ8RnH5HkaUJHv3Pzq n6fuYXaz8fjfFmlTQ5Kayjwfi+rgziq5Vlq/waXX7cUZHz/Pj/gA2wrfLaMMRbbzEQnc 3qZUIpfT9DJeqH3Rlw/Kosm+3iTxiQYHNkXSFtuIaY1FlY2s4YG86os2HabR4yQ+w8HK gCZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition :content-transfer-encoding:mime-version:robot-unsubscribe:robot-id :git-commit-id:subject:to:references:in-reply-to:reply-to:cc :message-id:from:date:arc-authentication-results; bh=pfsxP7r4e8U65VDhGZ9f/N/IKMNgUlBj2I0fLZgsoE0=; b=vqDS7COFaIbYSUPML7Loml3TIbUZDgmoq0hN5T8hjV54unAgbgg9lFqP7ZuRyzs88S N8JKxAx2kKU0UD8iGqtOL1VANByySlIf6VRBT+NbKRmPXeTM3RhEJhrbKuMRgj1Y2ORz WZPIIoM2x/H+V65669tl/ON1kbfYdKAdLDXEEonvHKe8b5pDNaFHPm/5Nh3p5M8lua6L zMjg5hq+9f4/7fABKLycNXBdbteUghIr9MVErp1KE35RnoM0GSHYc3j6HGdhkUqlG1dQ TFls8ZNN4Hz5Ym6S0udxCbyxqTFDdA1M/awhBh85javub9g9KywlDrwLMnOu25JFHISc +rfA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s3-v6si219999plb.171.2018.02.13.10.48.48; Tue, 13 Feb 2018 10:49:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S965580AbeBMSrZ (ORCPT + 99 others); Tue, 13 Feb 2018 13:47:25 -0500 Received: from terminus.zytor.com ([198.137.202.136]:38365 "EHLO terminus.zytor.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S965421AbeBMSrW (ORCPT ); Tue, 13 Feb 2018 13:47:22 -0500 Received: from terminus.zytor.com (localhost [127.0.0.1]) by terminus.zytor.com (8.15.2/8.15.2) with ESMTP id w1DIl2sO012808; Tue, 13 Feb 2018 10:47:02 -0800 Received: (from tipbot@localhost) by terminus.zytor.com (8.15.2/8.15.2/Submit) id w1DIl1sG012805; Tue, 13 Feb 2018 10:47:01 -0800 Date: Tue, 13 Feb 2018 10:47:01 -0800 X-Authentication-Warning: terminus.zytor.com: tipbot set sender to tipbot@zytor.com using -f From: tip-bot for Rui Wang Message-ID: Cc: torvalds@linux-foundation.org, tglx@linutronix.de, linux-kernel@vger.kernel.org, mingo@kernel.org, peterz@infradead.org, hpa@zytor.com, rui.y.wang@intel.com Reply-To: peterz@infradead.org, hpa@zytor.com, rui.y.wang@intel.com, torvalds@linux-foundation.org, tglx@linutronix.de, linux-kernel@vger.kernel.org, mingo@kernel.org In-Reply-To: <1513586050-1641-1-git-send-email-rui.y.wang@intel.com> References: <1513586050-1641-1-git-send-email-rui.y.wang@intel.com> To: linux-tip-commits@vger.kernel.org Subject: [tip:x86/pti] selftests/x86/mpx: Fix incorrect bounds with old _sigfault Git-Commit-ID: d101567aec6653cc372af3b9b957299fee06cca8 X-Mailer: tip-git-log-daemon Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=UTF-8 Content-Disposition: inline X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=ham autolearn_force=no version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on terminus.zytor.com Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit-ID: d101567aec6653cc372af3b9b957299fee06cca8 Gitweb: https://git.kernel.org/tip/d101567aec6653cc372af3b9b957299fee06cca8 Author: Rui Wang AuthorDate: Mon, 18 Dec 2017 16:34:10 +0800 Committer: Ingo Molnar CommitDate: Tue, 13 Feb 2018 19:20:05 +0100 selftests/x86/mpx: Fix incorrect bounds with old _sigfault For distributions with old userspace header files, the _sigfault structure is different. mpx-mini-test fails with the following error: [root@Purley]# mpx-mini-test_64 tabletest XSAVE is supported by HW & OS XSAVE processor supported state mask: 0x2ff XSAVE OS supported state mask: 0x2ff BNDREGS: size: 64 user: 1 supervisor: 0 aligned: 0 BNDCSR: size: 64 user: 1 supervisor: 0 aligned: 0 starting mpx bounds table test ERROR: siginfo bounds do not match shadow bounds for register 0 Fix it by using the correct offset of _lower/_upper in _sigfault. RHEL needs this patch to work. Signed-off-by: Rui Wang Cc: Linus Torvalds Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: dave.hansen@linux.intel.com Fixes: e754aedc26ef ("x86/mpx, selftests: Add MPX self test") Link: http://lkml.kernel.org/r/1513586050-1641-1-git-send-email-rui.y.wang@intel.com Signed-off-by: Ingo Molnar --- tools/testing/selftests/x86/mpx-mini-test.c | 32 +++++++++++++++++++++++++++-- 1 file changed, 30 insertions(+), 2 deletions(-) diff --git a/tools/testing/selftests/x86/mpx-mini-test.c b/tools/testing/selftests/x86/mpx-mini-test.c index ec0f6b4..9c0325e 100644 --- a/tools/testing/selftests/x86/mpx-mini-test.c +++ b/tools/testing/selftests/x86/mpx-mini-test.c @@ -315,11 +315,39 @@ static inline void *__si_bounds_upper(siginfo_t *si) return si->si_upper; } #else + +/* + * This deals with old version of _sigfault in some distros: + * + +old _sigfault: + struct { + void *si_addr; + } _sigfault; + +new _sigfault: + struct { + void __user *_addr; + int _trapno; + short _addr_lsb; + union { + struct { + void __user *_lower; + void __user *_upper; + } _addr_bnd; + __u32 _pkey; + }; + } _sigfault; + * + */ + static inline void **__si_bounds_hack(siginfo_t *si) { void *sigfault = &si->_sifields._sigfault; void *end_sigfault = sigfault + sizeof(si->_sifields._sigfault); - void **__si_lower = end_sigfault; + int *trapno = (int*)end_sigfault; + /* skip _trapno and _addr_lsb */ + void **__si_lower = (void**)(trapno + 2); return __si_lower; } @@ -331,7 +359,7 @@ static inline void *__si_bounds_lower(siginfo_t *si) static inline void *__si_bounds_upper(siginfo_t *si) { - return (*__si_bounds_hack(si)) + sizeof(void *); + return *(__si_bounds_hack(si) + 1); } #endif