Received: by 2002:ac0:aed5:0:0:0:0:0 with SMTP id t21csp1050997imb; Sat, 2 Mar 2019 01:12:44 -0800 (PST) X-Google-Smtp-Source: AHgI3IbeF1dU0K1yLE4cpxkHV7cSFid6eaI/aY494oF3Agelqjdj6hkBJnLJ9MR8EcWcmhsYbWHA X-Received: by 2002:aa7:9141:: with SMTP id 1mr9985666pfi.38.1551517964815; Sat, 02 Mar 2019 01:12:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1551517964; cv=none; d=google.com; s=arc-20160816; b=hF1CxrneZxplvYiS9PW4VRSRlY1JIlscuw0nHoC50z55MaMPCLXNlQGZfderOygmE3 phqB0m4FuGGLr7TyXLgI2xOEvmqrNMDYzxzQ7DbU9UfYtJJwtFCw7TKl+HjZD+WttDRu WNdcCkDpopntI3WnNNd8Z6SrNFzgHx9dfOvqyQasY904FWc3HeWxu+nYwlWRMjaUWOHb 45/qKjnd7XqF+ZlCoApee8MWsSWpJvU7pzis9SOT/5/LQgcRkMF6l+XsjjwwgMUihDJx Op0O+muno4sTWM13tf/hfdzERN8B0kxMzxvZTi7IKx5soh0a3cGf6ZwjFsotMRlP1n63 2S3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=EqtmOtLohO500T9JWpzsCQ0s5C9H+UsdKM9PXICxepU=; b=VuNLD8xuDZzQz/REOZiLNWuw7Ty6+zC92y8IxyJ/qOn8oQdkUjB8YPpWP/gYgYTA3v vZmvsa+cVyLUU0ZPP6zNQvcIbtVPJ/pB6JjHLev7ofo7bo4JkI6Wr08IKyFkFzJ26z2q o9XndNCISh7+pNI61CdMzRw7eWWL0IuIr0EI+tuNU5Bc4jy78GC/YXEZck028IirCV+E QFmeEQW54Z5lWLC3/l7g96HFvNBSwh6O2jFMhfpeAcqdYEE3SyWmGmHkG0ejbnwRIrxt YRhH+Uq5fuzz30djIck1lVdHuSF9syhVwBj2tURu/ra9FE4XGbmL94WCNrGPz5hjGpjs nCjQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=rAc74re3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i10si203680pfj.186.2019.03.02.01.12.28; Sat, 02 Mar 2019 01:12:44 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=rAc74re3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726336AbfCBJKv (ORCPT + 99 others); Sat, 2 Mar 2019 04:10:51 -0500 Received: from mail.kernel.org ([198.145.29.99]:51976 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725902AbfCBJKu (ORCPT ); Sat, 2 Mar 2019 04:10:50 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 769E220836; Sat, 2 Mar 2019 09:10:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1551517850; bh=2fY7kXEz5TZrvwiB0rqf/WoL+YIL7ujRa26JCZxFtNk=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=rAc74re3JOM+PRxI+34de3voEz4ANEy7NTeMadDBin0kQEM7TQNnrIkjIb4MQ9bBd SErBl6vAamTFMx9IJtWi+PdZ4IGUb5z6meyNylu365Eosl5hXcKsAXV8P5wESUSWL4 xAcTRjkyUzv6YbfxEFpUnQRkUATP2BZ7kysoleWA= Date: Sat, 2 Mar 2019 10:10:47 +0100 From: Greg KH To: Andy Lutomirski Cc: Steve Muckle , Shuah Khan , Thomas Gleixner , "open list:KERNEL SELFTEST FRAMEWORK" , LKML , Android Kernel Team Subject: Re: [PATCH] selftests: x86: add version check in test_syscall_vdso Message-ID: <20190302091047.GA14963@kroah.com> References: <20190301001806.154271-1-smuckle@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.11.3 (2019-02-01) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 01, 2019 at 11:59:24AM -0800, Andy Lutomirski wrote: > > On Feb 28, 2019, at 4:18 PM, Steve Muckle wrote: > > > > Since 4.17 registers r8-r11 are not clobbered/zeroed by a 64-bit kernel > > handling a 32-bit syscall and this behavior is enforced by the > > test_syscall_vdso testcase. See commit 8bb2610bc496 > > ("x86/entry/64/compat: Preserve r8-r11 in int $0x80"). > > > > Permit the old behavior in the testcase for kernels prior to 4.17. > > NAK. If you want an old buggy kernel to pass a test, please either > patch the kernel or run an old test. Yeah, this isn't ok, especially as you might have 4.14 or 4.9 kernels that can pass the test if the needed patches were backported. Checking kernel version numbers should never be used for anything. greg k-h