Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp2177911ybg; Fri, 5 Jun 2020 07:30:32 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw1EMl/jsCTPqfrYGKbqOjD4vlnfzijU3+CpaAeLmbQjh4BYu03YsdjfuZCrE7soKgGF9m1 X-Received: by 2002:aa7:c910:: with SMTP id b16mr10045958edt.0.1591367432646; Fri, 05 Jun 2020 07:30:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591367432; cv=none; d=google.com; s=arc-20160816; b=NZowz+4WI/oCd8gZp9TMIIyYo5SBfROKTg6S/vkTE/e+SyDOnHfbouQomgBKwb5/Po w4I3Pu1XFpu5IgMqIX2nlLyrVkTF3HaYrQCHZRIEX9jzkPBC1JpXpeYsakC4CwC174oF CcwnCPuiwdEoQQLCKA34oz5GVq29OZgMs5LRCzeFKMyGYPRm3ancBrXQFlp+ZrjVJ3wL i2xHbtxi0gT4PspOjGShqgFRImWUTbVpICElImCDOY6viuTYaeqO1XAaOt5lgMckuU6Z Af59Hzv05YoT0OfkzX0/vn7q9y4sWX8SkQgODHLWY92tKldGMtpRc9NT8f59gzNGNHWP Kp8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=LwUCe5eSl6+Jh18/GukIykGtLyxPvIrLSC66zsDr3Fs=; b=zBOCFtLQrYgU2XMlfymKTvmLJtK0wPp5wGRNWcCA91dibVQ6BfC5uQUZRXrFi9VPQ0 gMOhe2Ze5TAp6h82RMTM88a2Xyhb3w8tUzCua/9djEdxGRHYG7i0MD+34tQJuDaDL7BM /jLF6xmc/sg7lJjjaRaSmxDf9ehybl63DK4rxtjNNcLmVDk7VczY1INDhxEj4ad8bp5e 4gYxe5N+isNJLGyyLSbEL5cqdHd6+xPl/6BTOct7ezbPIGjZoWTtWQUws7hvZq6vKPOX TSMyDaJ0BL9DYSdptzqbc+HP7MxJTJXfW4nt45MlsgMGgpsqVBnHpEn2od3IurSrOaKQ Ux9g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dVCLnCrU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r3si3461120eji.126.2020.06.05.07.30.09; Fri, 05 Jun 2020 07:30:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dVCLnCrU; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728249AbgFEOQb (ORCPT + 99 others); Fri, 5 Jun 2020 10:16:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:45408 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728212AbgFEOQT (ORCPT ); Fri, 5 Jun 2020 10:16:19 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DF8FB208A9; Fri, 5 Jun 2020 14:16:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1591366578; bh=G61HIjVZvMgRo7LlxxL+AVvu+MxFpRf/gwQh5Wz4BXw=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=dVCLnCrUuJKAt2cQ4Hpyn34E4nQgqPNYQBqFDLHTIf47hS/2LlC42oifsA1qUbQ5f 6EHhtOUbjf7cmI8kOuPkIa1ZwQGyit4KYAI/bIzSpNqhwh3PexX3OvbH1bSiNkmSPH hLKRkWUyY5tZb/t/0CIenWMw18MaF3dAzfCl+A6g= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Thorsten Glaser , Andy Lutomirski , Borislav Petkov , stable@kernel.org, Sasha Levin Subject: [PATCH 5.6 01/43] x86/syscalls: Revert "x86/syscalls: Make __X32_SYSCALL_BIT be unsigned long" Date: Fri, 5 Jun 2020 16:14:31 +0200 Message-Id: <20200605140152.573595118@linuxfoundation.org> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20200605140152.493743366@linuxfoundation.org> References: <20200605140152.493743366@linuxfoundation.org> User-Agent: quilt/0.66 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Andy Lutomirski [ Upstream commit 700d3a5a664df267f01ec8887fd2d8ff98f67e7f ] Revert 45e29d119e99 ("x86/syscalls: Make __X32_SYSCALL_BIT be unsigned long") and add a comment to discourage someone else from making the same mistake again. It turns out that some user code fails to compile if __X32_SYSCALL_BIT is unsigned long. See, for example [1] below. [ bp: Massage and do the same thing in the respective tools/ header. ] Fixes: 45e29d119e99 ("x86/syscalls: Make __X32_SYSCALL_BIT be unsigned long") Reported-by: Thorsten Glaser Signed-off-by: Andy Lutomirski Signed-off-by: Borislav Petkov Cc: stable@kernel.org Link: [1] https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=954294 Link: https://lkml.kernel.org/r/92e55442b744a5951fdc9cfee10badd0a5f7f828.1588983892.git.luto@kernel.org Signed-off-by: Sasha Levin --- arch/x86/include/uapi/asm/unistd.h | 11 +++++++++-- tools/arch/x86/include/uapi/asm/unistd.h | 2 +- 2 files changed, 10 insertions(+), 3 deletions(-) diff --git a/arch/x86/include/uapi/asm/unistd.h b/arch/x86/include/uapi/asm/unistd.h index 196fdd02b8b1..be5e2e747f50 100644 --- a/arch/x86/include/uapi/asm/unistd.h +++ b/arch/x86/include/uapi/asm/unistd.h @@ -2,8 +2,15 @@ #ifndef _UAPI_ASM_X86_UNISTD_H #define _UAPI_ASM_X86_UNISTD_H -/* x32 syscall flag bit */ -#define __X32_SYSCALL_BIT 0x40000000UL +/* + * x32 syscall flag bit. Some user programs expect syscall NR macros + * and __X32_SYSCALL_BIT to have type int, even though syscall numbers + * are, for practical purposes, unsigned long. + * + * Fortunately, expressions like (nr & ~__X32_SYSCALL_BIT) do the right + * thing regardless. + */ +#define __X32_SYSCALL_BIT 0x40000000 #ifndef __KERNEL__ # ifdef __i386__ diff --git a/tools/arch/x86/include/uapi/asm/unistd.h b/tools/arch/x86/include/uapi/asm/unistd.h index 196fdd02b8b1..30d7d04d72d6 100644 --- a/tools/arch/x86/include/uapi/asm/unistd.h +++ b/tools/arch/x86/include/uapi/asm/unistd.h @@ -3,7 +3,7 @@ #define _UAPI_ASM_X86_UNISTD_H /* x32 syscall flag bit */ -#define __X32_SYSCALL_BIT 0x40000000UL +#define __X32_SYSCALL_BIT 0x40000000 #ifndef __KERNEL__ # ifdef __i386__ -- 2.25.1