Received: by 10.223.185.116 with SMTP id b49csp1379487wrg; Wed, 14 Feb 2018 16:31:21 -0800 (PST) X-Google-Smtp-Source: AH8x226W4ucVKeIjqIg/g3/jjZRDMWbSUSocPpAeGaDTyomck02FIh+Wn2qslC7/8kWUErZYL+FS X-Received: by 10.99.60.8 with SMTP id j8mr652072pga.209.1518654681327; Wed, 14 Feb 2018 16:31:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1518654681; cv=none; d=google.com; s=arc-20160816; b=EJFws5Mm51th613vWj8J/EtgQjcriy9WkLUT7ccys7zAwvyU4a/PxWyCHkn1KNocNE EZmNAr8EVUzl2SEi31/ybBbx/3mmC4tYymvhEzkLkq/4m6IJwUZ7u6Fi2cErsdJrb/9l Dpvm00onpJF+zTwxdVtLNIGail+LTqbfl8q31vYNafkj7jhZpfmSYACglR9nuTllz4TI uTIlUSxFjLNnRj3tFDK76989cxWp2FmdMreyArEx1Jmj/jM7kCOdrOUyUUH8t/SiE2Cn A3o+kp0fbrD1l23gtYsE7phdRdU24LEr1PHbcXeVd9puo9YlA4bYdmg/RY4X9dLr1Qvt JY/w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition :content-transfer-encoding:mime-version:robot-unsubscribe:robot-id :git-commit-id:subject:to:references:in-reply-to:reply-to:cc :message-id:from:date:arc-authentication-results; bh=TidkaoC4T+2Np7NYmn2J/+PR17fSu5EcPMGge9wUmS4=; b=VNkN5l5HqYlxNKYkkNVgDTX5551gtRD0lmVFgSz/ulhkc5UI6OqMpetKX0BU8dmq30 nwctScThzNbHtZavi1z6vyot1OTi1fX8s4FzL/RsT+gtd2XYp1rmswb3LgR5DpA8LD7r Kw5v7Uvmh1Ip966//u64H1GHkXy2OUsb2nV4vp+Fxym6gYXt47aE3nz1Qd+ZR4rkGPif 0U9LZAKmvGbVzbvwDkqSg0oHKd6FW/J0cT3P254AleEmKRsXQoDTG7MCeL128zDkrrDB I57NXNbc6Gu+yIwKpuTZcL8ciCDoeyKVJnKF3eiDYMRH7LliyC/JC1f7n6sdb9JiE9CD VABg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m22si2995495pgv.643.2018.02.14.16.31.06; Wed, 14 Feb 2018 16:31:21 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1032306AbeBOA3v (ORCPT + 99 others); Wed, 14 Feb 2018 19:29:51 -0500 Received: from terminus.zytor.com ([198.137.202.136]:56889 "EHLO terminus.zytor.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1032219AbeBOA3t (ORCPT ); Wed, 14 Feb 2018 19:29:49 -0500 Received: from terminus.zytor.com (localhost [127.0.0.1]) by terminus.zytor.com (8.15.2/8.15.2) with ESMTP id w1F0TOF1012004; Wed, 14 Feb 2018 16:29:24 -0800 Received: (from tipbot@localhost) by terminus.zytor.com (8.15.2/8.15.2/Submit) id w1F0TOwC012000; Wed, 14 Feb 2018 16:29:24 -0800 Date: Wed, 14 Feb 2018 16:29:24 -0800 X-Authentication-Warning: terminus.zytor.com: tipbot set sender to tipbot@zytor.com using -f From: tip-bot for Rui Wang Message-ID: Cc: hpa@zytor.com, torvalds@linux-foundation.org, tglx@linutronix.de, peterz@infradead.org, mingo@kernel.org, linux-kernel@vger.kernel.org, rui.y.wang@intel.com Reply-To: peterz@infradead.org, mingo@kernel.org, rui.y.wang@intel.com, linux-kernel@vger.kernel.org, hpa@zytor.com, tglx@linutronix.de, torvalds@linux-foundation.org In-Reply-To: <1513586050-1641-1-git-send-email-rui.y.wang@intel.com> References: <1513586050-1641-1-git-send-email-rui.y.wang@intel.com> To: linux-tip-commits@vger.kernel.org Subject: [tip:x86/pti] selftests/x86/mpx: Fix incorrect bounds with old _sigfault Git-Commit-ID: 961888b1d76d84efc66a8f5604b06ac12ac2f978 X-Mailer: tip-git-log-daemon Robot-ID: Robot-Unsubscribe: Contact to get blacklisted from these emails MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain; charset=UTF-8 Content-Disposition: inline X-Spam-Status: No, score=-2.9 required=5.0 tests=ALL_TRUSTED,BAYES_00 autolearn=ham autolearn_force=no version=3.4.1 X-Spam-Checker-Version: SpamAssassin 3.4.1 (2015-04-28) on terminus.zytor.com Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Commit-ID: 961888b1d76d84efc66a8f5604b06ac12ac2f978 Gitweb: https://git.kernel.org/tip/961888b1d76d84efc66a8f5604b06ac12ac2f978 Author: Rui Wang AuthorDate: Mon, 18 Dec 2017 16:34:10 +0800 Committer: Ingo Molnar CommitDate: Thu, 15 Feb 2018 01:15:52 +0100 selftests/x86/mpx: Fix incorrect bounds with old _sigfault For distributions with old userspace header files, the _sigfault structure is different. mpx-mini-test fails with the following error: [root@Purley]# mpx-mini-test_64 tabletest XSAVE is supported by HW & OS XSAVE processor supported state mask: 0x2ff XSAVE OS supported state mask: 0x2ff BNDREGS: size: 64 user: 1 supervisor: 0 aligned: 0 BNDCSR: size: 64 user: 1 supervisor: 0 aligned: 0 starting mpx bounds table test ERROR: siginfo bounds do not match shadow bounds for register 0 Fix it by using the correct offset of _lower/_upper in _sigfault. RHEL needs this patch to work. Signed-off-by: Rui Wang Cc: Linus Torvalds Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: dave.hansen@linux.intel.com Fixes: e754aedc26ef ("x86/mpx, selftests: Add MPX self test") Link: http://lkml.kernel.org/r/1513586050-1641-1-git-send-email-rui.y.wang@intel.com Signed-off-by: Ingo Molnar --- tools/testing/selftests/x86/mpx-mini-test.c | 32 +++++++++++++++++++++++++++-- 1 file changed, 30 insertions(+), 2 deletions(-) diff --git a/tools/testing/selftests/x86/mpx-mini-test.c b/tools/testing/selftests/x86/mpx-mini-test.c index ec0f6b4..9c0325e 100644 --- a/tools/testing/selftests/x86/mpx-mini-test.c +++ b/tools/testing/selftests/x86/mpx-mini-test.c @@ -315,11 +315,39 @@ static inline void *__si_bounds_upper(siginfo_t *si) return si->si_upper; } #else + +/* + * This deals with old version of _sigfault in some distros: + * + +old _sigfault: + struct { + void *si_addr; + } _sigfault; + +new _sigfault: + struct { + void __user *_addr; + int _trapno; + short _addr_lsb; + union { + struct { + void __user *_lower; + void __user *_upper; + } _addr_bnd; + __u32 _pkey; + }; + } _sigfault; + * + */ + static inline void **__si_bounds_hack(siginfo_t *si) { void *sigfault = &si->_sifields._sigfault; void *end_sigfault = sigfault + sizeof(si->_sifields._sigfault); - void **__si_lower = end_sigfault; + int *trapno = (int*)end_sigfault; + /* skip _trapno and _addr_lsb */ + void **__si_lower = (void**)(trapno + 2); return __si_lower; } @@ -331,7 +359,7 @@ static inline void *__si_bounds_lower(siginfo_t *si) static inline void *__si_bounds_upper(siginfo_t *si) { - return (*__si_bounds_hack(si)) + sizeof(void *); + return *(__si_bounds_hack(si) + 1); } #endif