Received: by 2002:a25:b794:0:0:0:0:0 with SMTP id n20csp2758241ybh; Mon, 5 Aug 2019 06:23:17 -0700 (PDT) X-Google-Smtp-Source: APXvYqwZGACzM+fxnUWxNpnPv4b4QT43lrz1JWJBwpPJiP+0vwQ4yevSifNC250VibqLx6q3SKeC X-Received: by 2002:a17:902:44f:: with SMTP id 73mr146154932ple.192.1565011397817; Mon, 05 Aug 2019 06:23:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1565011397; cv=none; d=google.com; s=arc-20160816; b=LFTZcwOverMmcXDdR/P5qraISo57ENb/fW2/x8ijhLy+3llqd0KIU4hPlShWGCymIv JfoJFD6vl3oNGlCbIJ4SZ1yKf7g6uAZicSr4sg0DkVghqSueF0ioiEw1svRknpJFlRVi SBD6lu1IHT3CxRfQXm5dOQS+zO9LOHFDjPY5Y0Ac+FDLZeQS6bXper77LI2u5F/r4h3o eKefmcu789OLEOaC1dLxE/g9WtC6rqiFpcFczgCZ+XY4kZHdzKMxW/kCiWPjx6yl2j7b 9FyGuPSAbcFwmk6nFDRLoYo8gDW7wDanm42Fb9+gzKQ4UbJVJd28mIMZD8cJHwoOMwdM /Elg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=rZHm605qUaAVuNGzVHUasCVQKlYAyYFzW14+eqIhKOE=; b=AygDnSGf+YtCBNegIRgg+p4/7fKRG6BDKktyZJ1HdRTcvG3IyS0LGJfBvF7I8/Qfxr Fc+zqcdzhicspIuRmjavGhYeWdPVamwN4CXnVBgVhaiOP8h5su4C/KEWzDlwDYhcc8Yk YAT1fiZlmrM+yEq985rPD05qXYywv6L414D2uKvIrFQy6DrrLTUqyY7R+Gd3Qd606AqZ WUvQSsECD33Dp5I2ElJfr6GYKcWeba6v17Ur+qWam/OJDlkBRnI7Ycj/+eRNVD7BwxUN Cd+CxF4ILNe4sYa0uU1l36NU0yDYvZe+g9wRM+c0Ypm42aCcbHboLGyeI8omm+sQFP91 JxXQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cLVylhLb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z10si41048393pln.285.2019.08.05.06.23.02; Mon, 05 Aug 2019 06:23:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=cLVylhLb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730661AbfHENWU (ORCPT + 99 others); Mon, 5 Aug 2019 09:22:20 -0400 Received: from mail.kernel.org ([198.145.29.99]:58656 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730649AbfHENWR (ORCPT ); Mon, 5 Aug 2019 09:22:17 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9842720651; Mon, 5 Aug 2019 13:22:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565011337; bh=lPwyNVnIRzEaWGHLLwcdEhNRYl4mScGqRovi7S8MVyE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=cLVylhLb69hE6YfpfQ1dR5I2H/QnsC9mXKrwpmkaiRC1kfarMa/dWiIIkirtCGUpe YYBqCh0wtTk2QTmPAijk+DialGMipAjZqt11EiwWvqB4uchL7cajeD8PaUwyP90h3c WsXK5LFDbJ9/B4p+I+V2uh3KqupsHdN5vOgxw6MM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Peter Rosin , Andrew Morton , Linus Torvalds , Sasha Levin Subject: [PATCH 5.2 055/131] lib/test_string.c: avoid masking memset16/32/64 failures Date: Mon, 5 Aug 2019 15:02:22 +0200 Message-Id: <20190805124955.119100635@linuxfoundation.org> X-Mailer: git-send-email 2.22.0 In-Reply-To: <20190805124951.453337465@linuxfoundation.org> References: <20190805124951.453337465@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ Upstream commit 33d6e0ff68af74be0c846c8e042e84a9a1a0561e ] If a memsetXX implementation is completely broken and fails in the first iteration, when i, j, and k are all zero, the failure is masked as zero is returned. Failing in the first iteration is perhaps the most likely failure, so this makes the tests pretty much useless. Avoid the situation by always setting a random unused bit in the result on failure. Link: http://lkml.kernel.org/r/20190506124634.6807-3-peda@axentia.se Fixes: 03270c13c5ff ("lib/string.c: add testcases for memset16/32/64") Signed-off-by: Peter Rosin Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- lib/test_string.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/lib/test_string.c b/lib/test_string.c index bf8def01ed204..b5117ae596931 100644 --- a/lib/test_string.c +++ b/lib/test_string.c @@ -36,7 +36,7 @@ static __init int memset16_selftest(void) fail: kfree(p); if (i < 256) - return (i << 24) | (j << 16) | k; + return (i << 24) | (j << 16) | k | 0x8000; return 0; } @@ -72,7 +72,7 @@ static __init int memset32_selftest(void) fail: kfree(p); if (i < 256) - return (i << 24) | (j << 16) | k; + return (i << 24) | (j << 16) | k | 0x8000; return 0; } @@ -108,7 +108,7 @@ static __init int memset64_selftest(void) fail: kfree(p); if (i < 256) - return (i << 24) | (j << 16) | k; + return (i << 24) | (j << 16) | k | 0x8000; return 0; } -- 2.20.1