Received: by 10.223.185.116 with SMTP id b49csp1028955wrg; Wed, 21 Feb 2018 10:50:47 -0800 (PST) X-Google-Smtp-Source: AH8x226AWOxKruND2Jp8tmJI+MOaKVYCEZdXruHoEj/rx4SJC6fp41CbWXNj1wNI0dXSc1bDnNKk X-Received: by 10.98.225.2 with SMTP id q2mr4177679pfh.23.1519239047706; Wed, 21 Feb 2018 10:50:47 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519239047; cv=none; d=google.com; s=arc-20160816; b=N7QYb2WB2FAKA5iChirFXP8E3cmWGkBiQwSUZaSp48YNvwUnIleDWisnswp6P4gALm nTVcCpHrk5Sq7bsb06mOSD9FsNXMjXi4Spkze+dYFSQ+KnHjIK+vBjjdsqxQPQpyWC6p hH1My1DrQD0jr8MnekRLRajbTsSK1qYZI/FnZL3KGlAa3iCk0kR7q+LOAmg8b76mtfZU Xpqgto8Xz60ucE4i77wvIr1Ir1KfWefFdiyUnQDIdcpMlPhFui/0ySb1T9MJPYcjrclt fTT7L2GVhIJGjod9cWyBZQaN/Y7Db2RX4g4j2dL7Nry00OJS5uzhBzMOuSCHeNvdpHO4 zT4w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=atGH7SW4QcLVkzjs89cyD/+v6RXhW+abaHXAkCi5ftM=; b=gnU4XiYHEV0z+PwlOPKxCUOi6sAbw3GZljPMpAOVGEnLdPaASdaK+NNVc3wWJ1Qcqy nU2BJg+wti8fACbL8RYLAwh5AVk3bnKQ9Cvt5TpLcSYc8bpZyxaxgbMJ0uRYsjyvBuR/ phEOBU25G6PnNJMgAeQv6v+f9vQZTa32FYSkpiBr8CN5mmh7FdL1GB55/2yLItI+qr8g z1h320dsJ+24StqRT8VGDDDl94qVYMufsU/NjAEeZLf0SBnIPNnV2WRB4+PyH/0jRdro 881hmok0ulLMpAQAMBj7pP9ggk1NbCWSwRYhcHV+NzgsdkaoVIOMRxzU+IpcM42vBKNP DCoQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v30si1794490pgo.360.2018.02.21.10.50.33; Wed, 21 Feb 2018 10:50:47 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S937447AbeBUOMf (ORCPT + 99 others); Wed, 21 Feb 2018 09:12:35 -0500 Received: from mail.linuxfoundation.org ([140.211.169.12]:37740 "EHLO mail.linuxfoundation.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933018AbeBUNBI (ORCPT ); Wed, 21 Feb 2018 08:01:08 -0500 Received: from localhost (LFbn-1-12258-90.w90-92.abo.wanadoo.fr [90.92.71.90]) by mail.linuxfoundation.org (Postfix) with ESMTPSA id A479810D8; Wed, 21 Feb 2018 13:00:42 +0000 (UTC) From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dominik Brodowski , Andrew Lutomirski , Linus Torvalds , Peter Zijlstra , Thomas Gleixner , linux-kselftest@vger.kernel.org, shuah@kernel.org, Ingo Molnar Subject: [PATCH 4.14 067/167] selftests/x86: Fix vDSO selftest segfault for vsyscall=none Date: Wed, 21 Feb 2018 13:47:58 +0100 Message-Id: <20180221124528.176139720@linuxfoundation.org> X-Mailer: git-send-email 2.16.2 In-Reply-To: <20180221124524.639039577@linuxfoundation.org> References: <20180221124524.639039577@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Dominik Brodowski commit 198ee8e17502da2634f7366395db1d77630e0219 upstream. The vDSO selftest tries to execute a vsyscall unconditionally, even if it is not present on the test system (e.g. if booted with vsyscall=none or with CONFIG_LEGACY_VSYSCALL_NONE=y set. Fix this by copying (and tweaking) the vsyscall check from test_vsyscall.c Signed-off-by: Dominik Brodowski Cc: Andrew Lutomirski Cc: Linus Torvalds Cc: Peter Zijlstra Cc: Thomas Gleixner Cc: linux-kselftest@vger.kernel.org Cc: shuah@kernel.org Link: http://lkml.kernel.org/r/20180211111013.16888-3-linux@dominikbrodowski.net Signed-off-by: Ingo Molnar Signed-off-by: Greg Kroah-Hartman --- tools/testing/selftests/x86/test_vdso.c | 50 +++++++++++++++++++++++++++----- 1 file changed, 43 insertions(+), 7 deletions(-) --- a/tools/testing/selftests/x86/test_vdso.c +++ b/tools/testing/selftests/x86/test_vdso.c @@ -28,18 +28,52 @@ int nerrs = 0; +typedef long (*getcpu_t)(unsigned *, unsigned *, void *); + +getcpu_t vgetcpu; +getcpu_t vdso_getcpu; + +static void *vsyscall_getcpu(void) +{ #ifdef __x86_64__ -# define VSYS(x) (x) + FILE *maps; + char line[128]; + bool found = false; + + maps = fopen("/proc/self/maps", "r"); + if (!maps) /* might still be present, but ignore it here, as we test vDSO not vsyscall */ + return NULL; + + while (fgets(line, sizeof(line), maps)) { + char r, x; + void *start, *end; + char name[128]; + if (sscanf(line, "%p-%p %c-%cp %*x %*x:%*x %*u %s", + &start, &end, &r, &x, name) != 5) + continue; + + if (strcmp(name, "[vsyscall]")) + continue; + + /* assume entries are OK, as we test vDSO here not vsyscall */ + found = true; + break; + } + + fclose(maps); + + if (!found) { + printf("Warning: failed to find vsyscall getcpu\n"); + return NULL; + } + return (void *) (0xffffffffff600800); #else -# define VSYS(x) 0 + return NULL; #endif +} -typedef long (*getcpu_t)(unsigned *, unsigned *, void *); - -const getcpu_t vgetcpu = (getcpu_t)VSYS(0xffffffffff600800); -getcpu_t vdso_getcpu; -void fill_function_pointers() +static void fill_function_pointers() { void *vdso = dlopen("linux-vdso.so.1", RTLD_LAZY | RTLD_LOCAL | RTLD_NOLOAD); @@ -54,6 +88,8 @@ void fill_function_pointers() vdso_getcpu = (getcpu_t)dlsym(vdso, "__vdso_getcpu"); if (!vdso_getcpu) printf("Warning: failed to find getcpu in vDSO\n"); + + vgetcpu = (getcpu_t) vsyscall_getcpu(); } static long sys_getcpu(unsigned * cpu, unsigned * node,