Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1505786pxk; Fri, 4 Sep 2020 11:03:07 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwzNUtROJKLi/9R6Jh6u3uqH1GU61UGsDhdCczCozfNTZOFwEEaeCxgJXvX7gWaH0Bo9VCf X-Received: by 2002:a05:6402:1b0f:: with SMTP id by15mr9600017edb.289.1599242586996; Fri, 04 Sep 2020 11:03:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599242586; cv=none; d=google.com; s=arc-20160816; b=yz7QLbV7Qv5eMww4PlM3D4J+JuXMU9cOOp6es0kfmJZDSi30AKPEEWaE4hLk7e59rC FuQpWxLGNpQrTc9y3AX39IWdSgJ7UCSWpWIyukB9SO3Y0Mil1fm4iZaSpZKHL3tacduw E561o0scS0yf1I2Fc4J93iGZ5F89XXOJsJ3wbzhbtme1KLlm+AQpmBvwFkcclZAj07V3 i7jKF00umzTTj3SqKjRlMrQ6RiVzH4/toJru7oo/CnN8slIV9Urn0KRIlD1Mgks13FtP ZIQC0vU2vaB6n5z50PbNBZLFhwQXBEwE50dLDqAuUlcJezb55Y5UM2DuWWET93v0hRV9 T0+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=i3C6nPHDDxNs016aJZjbryq7wFOLTrA9Fq0KKNZ0cgk=; b=O7xu0QYBTG7P+t0GCZP6ccLmHpAm9fsRrQwB6irec288wspF+4PYomdAJRLYinUVLk 9acDioL5bJ6JYJq0wj3rP9lVjP4i/bDI8uIx5QDO2u8mQk0Q8MBfoMv5ROjDh1+sQIY/ DUimashK4YIB4KiFLAqYSgJLfq82Od5A/IwtZ4aMOgXRt1y60y2FHiDM5zsNCtQawu2h k2oiMoGwm1HhB1sjNB0EkPbQ9xWY7DvCGgyj3kSGcLfaTH4B4n3avkwVZ/iLavgK5fOd ditIpeMIii1NPC9UAWOJmbDP1294CE3AJcJy/E+Z7KpiOGjl2AjVhD/7DcS4I0E8qmx4 5crw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dd25si4606729ejb.177.2020.09.04.11.02.35; Fri, 04 Sep 2020 11:03:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727963AbgIDSAD (ORCPT + 99 others); Fri, 4 Sep 2020 14:00:03 -0400 Received: from mx2.suse.de ([195.135.220.15]:46608 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726966AbgIDSAC (ORCPT ); Fri, 4 Sep 2020 14:00:02 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 4A8D9ABA2; Fri, 4 Sep 2020 18:00:02 +0000 (UTC) From: Cyril Hrubis To: ltp@lists.linux.it Cc: linux-kernel@vger.kernel.org, lkp@lists.01.org, Andy Lutomirski , Peter Zijlstra , Thomas Gleixner , Alexandre Chartre Subject: [PATCH] syscalls/ptrace10: Add new regression test Date: Fri, 4 Sep 2020 20:00:30 +0200 Message-Id: <20200904180030.14838-1-chrubis@suse.cz> X-Mailer: git-send-email 2.26.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org New regression test for a kernel commit: commit bd14406b78e6daa1ea3c1673bda1ffc9efdeead0 Author: Jiri Olsa Date: Mon Aug 27 11:12:25 2018 +0200 perf/hw_breakpoint: Modify breakpoint even if the new attr has disabled set Signed-off-by: Cyril Hrubis CC: Andy Lutomirski CC: Peter Zijlstra CC: Thomas Gleixner CC: Alexandre Chartre --- This is a follow up for the ptrace08 fixes. runtest/syscalls | 1 + testcases/kernel/syscalls/ptrace/.gitignore | 1 + testcases/kernel/syscalls/ptrace/ptrace10.c | 86 +++++++++++++++++++++ 3 files changed, 88 insertions(+) create mode 100644 testcases/kernel/syscalls/ptrace/ptrace10.c diff --git a/runtest/syscalls b/runtest/syscalls index 398145f65..163471bcd 100644 --- a/runtest/syscalls +++ b/runtest/syscalls @@ -993,6 +993,7 @@ ptrace05 ptrace05 ptrace07 ptrace07 ptrace08 ptrace08 ptrace09 ptrace09 +ptrace10 ptrace10 pwrite01 pwrite01 pwrite02 pwrite02 diff --git a/testcases/kernel/syscalls/ptrace/.gitignore b/testcases/kernel/syscalls/ptrace/.gitignore index 7639e1a9f..7ee3b3c47 100644 --- a/testcases/kernel/syscalls/ptrace/.gitignore +++ b/testcases/kernel/syscalls/ptrace/.gitignore @@ -5,3 +5,4 @@ /ptrace07 /ptrace08 /ptrace09 +/ptrace10 diff --git a/testcases/kernel/syscalls/ptrace/ptrace10.c b/testcases/kernel/syscalls/ptrace/ptrace10.c new file mode 100644 index 000000000..b5d6b9f8f --- /dev/null +++ b/testcases/kernel/syscalls/ptrace/ptrace10.c @@ -0,0 +1,86 @@ +// SPDX-License-Identifier: GPL-2.0-or-later +/* + * Copyright (C) 2020 Cyril Hrubis + * + * After fix for CVE-2018-1000199 (see ptrace08.c) subsequent calls to POKEUSER + * for x86 debug registers were ignored silently. + * + * This is a regression test for commit: + * + * commit bd14406b78e6daa1ea3c1673bda1ffc9efdeead0 + * Author: Jiri Olsa + * Date: Mon Aug 27 11:12:25 2018 +0200 + * + * perf/hw_breakpoint: Modify breakpoint even if the new attr has disabled set + */ + +#include +#include +#include +#include +#include +#include +#include "tst_test.h" + +#if defined(__i386__) || defined(__x86_64__) + +static pid_t child_pid; + +static void child_main(void) +{ + raise(SIGSTOP); + exit(0); +} + +static void run(void) +{ + int status; + unsigned long addr; + + child_pid = SAFE_FORK(); + + if (!child_pid) + child_main(); + + if (SAFE_WAITPID(child_pid, &status, WUNTRACED) != child_pid) + tst_brk(TBROK, "Received event from unexpected PID"); + + SAFE_PTRACE(PTRACE_ATTACH, child_pid, NULL, NULL); + SAFE_PTRACE(PTRACE_POKEUSER, child_pid, + (void *)offsetof(struct user, u_debugreg[0]), (void *)1); + SAFE_PTRACE(PTRACE_POKEUSER, child_pid, + (void *)offsetof(struct user, u_debugreg[0]), (void *)2); + + addr = ptrace(PTRACE_PEEKUSER, child_pid, + (void*)offsetof(struct user, u_debugreg[0]), NULL); + + if (addr == 2) + tst_res(TPASS, "The rd0 was set on second PTRACE_POKEUSR"); + else + tst_res(TFAIL, "The rd0 wasn't set on second PTRACE_POKEUSER"); + + SAFE_PTRACE(PTRACE_DETACH, child_pid, NULL, NULL); + SAFE_KILL(child_pid, SIGCONT); + child_pid = 0; + tst_reap_children(); +} + +static void cleanup(void) +{ + /* Main process terminated by tst_brk() with child still paused */ + if (child_pid) + SAFE_KILL(child_pid, SIGKILL); +} + +static struct tst_test test = { + .test_all = run, + .cleanup = cleanup, + .forks_child = 1, + .tags = (const struct tst_tag[]) { + {"linux-git", "bd14406b78e6"}, + {} + } +}; +#else +TST_TEST_TCONF("This test is only supported on x86 systems"); +#endif -- 2.26.2