Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp553465ybh; Tue, 21 Jul 2020 01:59:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzS6ew/X+D1W6EN3COpOpZ7NxaCze6c45lF2SDlgvTvCPAVrNVMC3PYe+ggiiRl6GTLwSpo X-Received: by 2002:aa7:ce91:: with SMTP id y17mr25246367edv.105.1595321998055; Tue, 21 Jul 2020 01:59:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595321998; cv=none; d=google.com; s=arc-20160816; b=Z847dUOYbCTOh/eH6paO0PGGzqfNpUc5Ybjk4dT7u05L+P7q4ugN5atWpdri8+G3LU DZNlWYex76Q3aSQt2DH0b19pPJ/w1IupswqQMDLFNaipxI5FeyPx8X/bE/k+DDzXLUuO fVd/BUtHtLXqVBG52LO8302onIiDb7p1AVt2Ci9p/+YvzWwxnlxyk7k87uJBflaNdpLK swj5XSpWfPZxQQKTqyUZz4w7vuxqktPWbbGuQAleWkgT7X5ONhIbldxBTKmQCv6EhItH n7gpbCZr64EI0fkA45ET6faClCb0Us5MDC2TMAwMowCt+XgGVxnD+///91CSCdaxYDzt qhoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:in-reply-to:date :references:subject:cc:to:from; bh=0CQ6V1ZHICoeQUWjhOrVZ7QAlh5/5ZytiQ+yug2yDqY=; b=SXZy+MeUfe01kiV4dxHPCm5cMtY1Cp59EFa19+6sgAsh6eGn25ut3yyyy6jvXEJFsV xR5VqVHEyLQyZaPTBFOjK5QhqdXD2yBUPskGHIgZMZl2MsbsE0uDFP/kIaRCMArs/AbE gWNV2gNwD9TL2q19C2ePdKL/itHBR9n0Eh7sAXt60nFxflLY9sVdRSZiLw2eRqarxSk0 pf9UGDHoGRjIPMHZPnIJ3Wutr+a+UWbGGYA9Cqp40djR9JpBQTQyZ2rmsXTOYfTHD7fO xE7AarSR1Ob8H34QQjMs8dXdjZq7zt37NJtdfXl7nEN2gd7CRVO5z5SEx+JivvbWYzuF tixw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k7si12141713edq.567.2020.07.21.01.59.35; Tue, 21 Jul 2020 01:59:57 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728348AbgGUI7R (ORCPT + 99 others); Tue, 21 Jul 2020 04:59:17 -0400 Received: from albireo.enyo.de ([37.24.231.21]:51974 "EHLO albireo.enyo.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726919AbgGUI7R (ORCPT ); Tue, 21 Jul 2020 04:59:17 -0400 Received: from [172.17.203.2] (helo=deneb.enyo.de) by albireo.enyo.de with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) id 1jxo79-0002DH-Dg; Tue, 21 Jul 2020 08:59:07 +0000 Received: from fw by deneb.enyo.de with local (Exim 4.92) (envelope-from ) id 1jxo79-00066m-99; Tue, 21 Jul 2020 10:59:07 +0200 From: Florian Weimer To: Kevin Buettner Cc: Al Viro , linux-kernel@vger.kernel.org Subject: Re: [PATCH] copy_xstate_to_kernel: Fix typo which caused GDB regression References: <20200718002003.6e0a2aef@f32-m1.lan> Date: Tue, 21 Jul 2020 10:59:07 +0200 In-Reply-To: <20200718002003.6e0a2aef@f32-m1.lan> (Kevin Buettner's message of "Sat, 18 Jul 2020 00:20:03 -0700") Message-ID: <87tuy1s0pw.fsf@mid.deneb.enyo.de> MIME-Version: 1.0 Content-Type: text/plain Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Kevin Buettner: > This commit fixes a regression encountered while running the > gdb.base/corefile.exp test in GDB's test suite. > > In my testing, the typo prevented the sw_reserved field of struct > fxregs_state from being output to the kernel XSAVES area. Thus the > correct mask corresponding to XCR0 was not present in the core file > for GDB to interrogate, resulting in the following behavior: > > [kev@f32-1 gdb]$ ./gdb -q testsuite/outputs/gdb.base/corefile/corefile testsuite/outputs/gdb.base/corefile/corefile.core > Reading symbols from testsuite/outputs/gdb.base/corefile/corefile... > [New LWP 232880] > > warning: Unexpected size of section `.reg-xstate/232880' in core file. > > With the typo fixed, the test works again as expected. > > Signed-off-by: Kevin Buettner > --- > arch/x86/kernel/fpu/xstate.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/arch/x86/kernel/fpu/xstate.c b/arch/x86/kernel/fpu/xstate.c > index 6a54e83d5589..9cf40a7ff7ae 100644 > --- a/arch/x86/kernel/fpu/xstate.c > +++ b/arch/x86/kernel/fpu/xstate.c > @@ -1022,7 +1022,7 @@ int copy_xstate_to_kernel(void *kbuf, struct xregs_state *xsave, unsigned int of > copy_part(offsetof(struct fxregs_state, st_space), 128, > &xsave->i387.st_space, &kbuf, &offset_start, &count); > if (header.xfeatures & XFEATURE_MASK_SSE) > - copy_part(xstate_offsets[XFEATURE_MASK_SSE], 256, > + copy_part(xstate_offsets[XFEATURE_SSE], 256, > &xsave->i387.xmm_space, &kbuf, &offset_start, &count); > /* > * Fill xsave->i387.sw_reserved value for ptrace frame: Does this read out-of-bounds, potentially disclosing kernel memory? Not if the system supports AVX, I assume.