Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp558460imd; Fri, 26 Oct 2018 12:58:00 -0700 (PDT) X-Google-Smtp-Source: AJdET5exK64KMFDkKqiz6roTeOHzFzIkbACsP3Sjf7MtED9LQn5dc2icUg5RxyMv2BMvCZu5Sb5T X-Received: by 2002:a17:902:bd4a:: with SMTP id b10-v6mr4755449plx.171.1540583880325; Fri, 26 Oct 2018 12:58:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540583880; cv=none; d=google.com; s=arc-20160816; b=cikjq8s8+YvcVFwjsZt/SHYCm018k73+rDV13/9xen4rtCsuHPDK+Rom+xq68aQUSF SDeSLuHKnFA4VPCMCs88EprwfbADMHe0+AU30/jP1BWJVXIZTuwvSX22HP/7XFJWY7Yx dgcbGq5/918xywl4MPfaeL+gPEn3RwaxeI5l2fsb3X0BQv30nlSl3ElhHxKl4SyCqd9d F+Ai0OTqlriy5QVLE6XCnCt/QXrtIGPVJpA7haQvyylNJmPjwm4uoUgHbo5Oa7RfhZbE J2ickpgd+q5YI67RBT2v2UvGPw2oMvm5hsxYjp0qcE1cG9dHrd+79eELv8Q9V/mxojeo Samg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:in-reply-to:references:date :from:cc:to:subject; bh=inMoUEG6RU2feSjiCnXJH3pJJzrHXZ5rpnlRXd7McQI=; b=zluQS09QDCgFgOqAkP24e3hDWS4midrEIUDehwKvDwpG4oUlk1WJPTXeyodYBkGjuu QJgM2KrFKLPHmppgtnzN02sHLRHo0NPI6FdWvaODs5fjGASIi2qCCIbgVNsmJ7c97TQH QgkJy3OwohdDaSLMcxdT+UVYSU+E9Llyn/Bls9M+VSh8EmTSO1pNuYJ3dbMb71H3bKw8 +emHD7o7TAW8X/Y9aEa3NHgUXeM/t6VPQvsEMMGCYzX1RBV59QAgQyyo1qmopjzsbdrJ YexKiErmoNkysmG/BqC0gGeH4yvX5mnrn7qjcw8eQxtZAiNHKS57sBO/NUjd4JJOop8e KIaw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m128-v6si10380647pfm.159.2018.10.26.12.57.45; Fri, 26 Oct 2018 12:58:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727985AbeJ0Efm (ORCPT + 99 others); Sat, 27 Oct 2018 00:35:42 -0400 Received: from mga03.intel.com ([134.134.136.65]:50067 "EHLO mga03.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725965AbeJ0Efl (ORCPT ); Sat, 27 Oct 2018 00:35:41 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga103.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 26 Oct 2018 12:57:21 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.54,429,1534834800"; d="scan'208";a="103608979" Received: from viggo.jf.intel.com (HELO localhost.localdomain) ([10.54.77.144]) by orsmga002.jf.intel.com with ESMTP; 26 Oct 2018 12:57:21 -0700 Subject: [PATCH 2/2] x86/selftests/pkeys: fork() to check for state being preserved To: linux-kernel@vger.kernel.org Cc: Dave Hansen , tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, x86@kernel.org, peterz@infradead.org, mpe@ellerman.id.au, will.deacon@arm.com, luto@kernel.org, jroedel@suse.de From: Dave Hansen Date: Fri, 26 Oct 2018 12:51:47 -0700 References: <20181026195146.9C7C1136@viggo.jf.intel.com> In-Reply-To: <20181026195146.9C7C1136@viggo.jf.intel.com> Message-Id: <20181026195147.78D4C275@viggo.jf.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dave Hansen There was a bug where the per-mm pkey state was not being preserved across fork() in the child. fork() is performed in the pkey selftests, but all of our pkey activity is performed in the parent. The child does not perform any actions sensitive to pkey state. To make the test more sensitive to these kinds of bugs, add a fork() where we let the parent exit, and continue execution in the child. Signed-off-by: Dave Hansen Cc: Thomas Gleixner Cc: Ingo Molnar Cc: Borislav Petkov Cc: "H. Peter Anvin" Cc: x86@kernel.org Cc: Dave Hansen Cc: Peter Zijlstra Cc: Michael Ellerman Cc: Will Deacon Cc: Andy Lutomirski Cc: Joerg Roedel --- b/tools/testing/selftests/x86/protection_keys.c | 30 ++++++++++++++++++++---- 1 file changed, 26 insertions(+), 4 deletions(-) diff -puN tools/testing/selftests/x86/protection_keys.c~x86-pkeys-no-init-at-fork-selftests tools/testing/selftests/x86/protection_keys.c --- a/tools/testing/selftests/x86/protection_keys.c~x86-pkeys-no-init-at-fork-selftests 2018-10-26 09:26:51.970102217 -0700 +++ b/tools/testing/selftests/x86/protection_keys.c 2018-10-26 09:26:51.974102217 -0700 @@ -1133,6 +1133,21 @@ void test_pkey_syscalls_bad_args(int *pt pkey_assert(err); } +void become_child(void) +{ + pid_t forkret; + + forkret = fork(); + pkey_assert(forkret >= 0); + dprintf3("[%d] fork() ret: %d\n", getpid(), forkret); + + if (!forkret) { + /* in the child */ + return; + } + exit(0); +} + /* Assumes that all pkeys other than 'pkey' are unallocated */ void test_pkey_alloc_exhaust(int *ptr, u16 pkey) { @@ -1141,7 +1156,7 @@ void test_pkey_alloc_exhaust(int *ptr, u int nr_allocated_pkeys = 0; int i; - for (i = 0; i < NR_PKEYS*2; i++) { + for (i = 0; i < NR_PKEYS*3; i++) { int new_pkey; dprintf1("%s() alloc loop: %d\n", __func__, i); new_pkey = alloc_pkey(); @@ -1152,10 +1167,17 @@ void test_pkey_alloc_exhaust(int *ptr, u if ((new_pkey == -1) && (errno == ENOSPC)) { dprintf2("%s() failed to allocate pkey after %d tries\n", __func__, nr_allocated_pkeys); - break; + } else { + pkey_assert(nr_allocated_pkeys < NR_PKEYS); + allocated_pkeys[nr_allocated_pkeys++] = new_pkey; } - pkey_assert(nr_allocated_pkeys < NR_PKEYS); - allocated_pkeys[nr_allocated_pkeys++] = new_pkey; + + /* + * Make sure that allocation state is properly + * preserved across fork(). + */ + if (i == NR_PKEYS*2) + become_child(); } dprintf3("%s()::%d\n", __func__, __LINE__); _