Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp2744384ybh; Mon, 5 Aug 2019 06:11:26 -0700 (PDT) X-Google-Smtp-Source: APXvYqz45JUwmPSgPg/+tNr+cOGwgo0y9XSPJ+QeVi2s0fcVqr3WQMuGxUAlOfVQSZRz0LXLkxjM X-Received: by 2002:a17:902:7612:: with SMTP id k18mr142300156pll.48.1565010686168; Mon, 05 Aug 2019 06:11:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565010686; cv=none; d=google.com; s=arc-20160816; b=zSqdE5XLTAeRLqNcr0zzc06bUMUCZW/dnz2519OHJ5yPBCjYgti8mQ6IKaESH0CJkp anH+tbDdrkHBw0fYzSa3V2OWlg9S5HzW+HBML3iNcJe5EoXXX57iil/EILYTtsqnkTvV DcRIaIpsLjG1xB44M7ZW/JkRIFzrxY7k+TN0dJXhUKaeAKdtFFyzXImuLSznKDi5Zmju 3iHqs4yuYYwg05/tKVjy4lz7sDNI+6aHzc3lI+Qx8pDYiMWyY6rFNbl/oiODijWXPiRg Z0CJv9K+DJpsKn+XgyLhlLdQz67IdRyl9AoYU9q/+5g5JpCSkRDr+VnAf38nrE0jhHkY uDXg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=9XU808ibAb+HkHvSDPTpINvu8z7+dgM8B2PaMpyCVLk=; b=Uzl2duZhwuhYmar1ozf/oHvpdbDpEKQoLLTajOMMYgtwWnbohGn3T4orrW677RnVvm f7XlQJFzAqcEfgpsPAXm5kZTxp3IYaeQ8swzfWfu2KisukFA7IXKVaRGA4sKcK0vazD/ MgBEs3Kt0uS7a0v/nwdlazblKfveaObt92cPwSP0v9VdWDJkDMkm7cxBf3O9XrHX1KMA CkB2zAu5E+kdtjatuwnWA8e9OS9P5cRTsewdaEPYm8rauYPYsI+fiBt0evQbaF4qXcPY EYb5bdBoCWDG0QzaMWgDz1QbLYWOxBj9C/CKNyI5uW4FrLE2g/3SfbWg86ed2xqpLeGK qd0g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZYs4bL+2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a13si43350881pgt.217.2019.08.05.06.11.11; Mon, 05 Aug 2019 06:11:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=ZYs4bL+2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730276AbfHENJ5 (ORCPT + 99 others); Mon, 5 Aug 2019 09:09:57 -0400 Received: from mail.kernel.org ([198.145.29.99]:48534 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729035AbfHENJx (ORCPT ); Mon, 5 Aug 2019 09:09:53 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7226F2075B; Mon, 5 Aug 2019 13:09:52 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565010593; bh=4Oveecdha/pb64ZWvVOdcWAJv5q/swTY08yW+2J80r8=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ZYs4bL+2+rgbMn2Xh+tdSEMknodjPJCyhSqNh+q30gaAlbYCrm8q69q8Y6XEgIgSk OaaPwtruWQw5iPe2HERaulGmqZltBIx8D/dCNPylPbY4S4wL1lX0VTU/Z1V/h0Qe5T zoRCwpmHwxvjpJ5MvFoxl9dN1GIH21HOEmyIwb+U= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Peter Rosin , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 4.19 30/74] lib/test_string.c: avoid masking memset16/32/64 failures Date: Mon, 5 Aug 2019 15:02:43 +0200 Message-Id: <20190805124938.186161074@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190805124935.819068648@linuxfoundation.org> References: <20190805124935.819068648@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 33d6e0ff68af74be0c846c8e042e84a9a1a0561e ] If a memsetXX implementation is completely broken and fails in the first iteration, when i, j, and k are all zero, the failure is masked as zero is returned. Failing in the first iteration is perhaps the most likely failure, so this makes the tests pretty much useless. Avoid the situation by always setting a random unused bit in the result on failure. Link: http://lkml.kernel.org/r/20190506124634.6807-3-peda@axentia.se Fixes: 03270c13c5ff ("lib/string.c: add testcases for memset16/32/64") Signed-off-by: Peter Rosin Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- lib/test_string.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lib/test_string.c b/lib/test_string.c index 0fcdb82dca866..98a787e7a1fd6 100644 --- a/lib/test_string.c +++ b/lib/test_string.c @@ -35,7 +35,7 @@ static __init int memset16_selftest(void) fail: kfree(p); if (i < 256) - return (i << 24) | (j << 16) | k; + return (i << 24) | (j << 16) | k | 0x8000; return 0; } @@ -71,7 +71,7 @@ static __init int memset32_selftest(void) fail: kfree(p); if (i < 256) - return (i << 24) | (j << 16) | k; + return (i << 24) | (j << 16) | k | 0x8000; return 0; } @@ -107,7 +107,7 @@ static __init int memset64_selftest(void) fail: kfree(p); if (i < 256) - return (i << 24) | (j << 16) | k; + return (i << 24) | (j << 16) | k | 0x8000; return 0; } -- 2.20.1