Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp1003218pxb; Wed, 1 Sep 2021 15:02:31 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxuHoQ01mGVG+UZZv5ZypSuw+vobGsvTvzrYPkPCBndVTUJvd4FRWrKwLQbBK4KGG9kYM1W X-Received: by 2002:a05:6602:38e:: with SMTP id f14mr31510iov.62.1630533751330; Wed, 01 Sep 2021 15:02:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1630533751; cv=none; d=google.com; s=arc-20160816; b=zD4W+7iCpDamKHf/KEBUgDSHxZ0axZsrgqNbLpPhXmU/8c9oXfWyfJ0POXoI7KSfiL j5Zx54It5Rj3XaVN6VSSl+FYVO4uvplkU6+KaR0Bw58qJrVULqou5qe8d/YMoRDoinWW Si97xVoEUpKoepgYp+VVA74UrgNR2SQQaUijrImEt7Vh42L6pq46h4YW+cW1eYy4yY63 xl/UaU/wPz5We6gY4S32akOVs2N7I0iBxYJtU1kycQoHKE6QMHJVuYQDfHUDPUjrkapR 8wcUmfYaV9pXwmXpV31UkK5xPDEC3nOyRqmP8tNrdaWGDhi6SG8Fo94yDp+LPNLM+sIN twXw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=pM+0cCHf3WPfc9FspBeepj/l1cpFhW45lNU1RQ7EIYI=; b=mbDpTSHhXkce5aWZiLTq517v/HeEkTr2Sr6t5QFa/xDTjrmBVfevWYA0+6KfJGkvUU BLvviOSS6IPKlQhJav/DBGl//Bc50kNqRxbL7b1I0WRsfzEghUiR1w2M0VYe/ejx/A1C JtPmfViKB1OIl3F+hPQfZ7Yi+uZu9Zn5UYhNLmpBxJWKQfoKRVmRXfLPl/ms59RsMnJq bXlM/M1pzZsS74kbHcuOluqP1rac5il7NlVC8tQY/e1Xy5RG5qr43VBr1cqZO+67GdE7 qN8KyE+YJhbBRv4IR72S1yaKITfHyUW+LM+4zlUgMCORLIoNvIUq5EBE1k4ossq/7wj/ X7pQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=KFRhrXqt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n3si2095ilt.132.2021.09.01.15.02.17; Wed, 01 Sep 2021 15:02:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=KFRhrXqt; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343929AbhIAMgn (ORCPT + 99 others); Wed, 1 Sep 2021 08:36:43 -0400 Received: from mail.kernel.org ([198.145.29.99]:32780 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343913AbhIAMej (ORCPT ); Wed, 1 Sep 2021 08:34:39 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 9264B610FD; Wed, 1 Sep 2021 12:32:50 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1630499571; bh=thmN39DdoxQpsvAKeQo/Rb4xDIfOQHTjYfOikOUmUL4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=KFRhrXqtjP5d6lWRlpvHy38B4RnvZDWCmrUwx8gVYKhyTucGE4+r8+qKFKZYCOc/a eooFosT4qcW3c7L5nHNEUnvSC48mSpJMrN6BcAOxS0M53Zy6p95K1vVtZhPV3fOAut rN0JlGho1zrkIggraLplwUnWgm/EwCj6qx3Sdx4o= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, =?UTF-8?q?Michel=20D=C3=A4nzer?= , Mark Yacoub , Sean Paul , Sasha Levin Subject: [PATCH 5.4 34/48] drm: Copy drm_wait_vblank to user before returning Date: Wed, 1 Sep 2021 14:28:24 +0200 Message-Id: <20210901122254.527979509@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20210901122253.388326997@linuxfoundation.org> References: <20210901122253.388326997@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Mark Yacoub [ Upstream commit fa0b1ef5f7a694f48e00804a391245f3471aa155 ] [Why] Userspace should get back a copy of drm_wait_vblank that's been modified even when drm_wait_vblank_ioctl returns a failure. Rationale: drm_wait_vblank_ioctl modifies the request and expects the user to read it back. When the type is RELATIVE, it modifies it to ABSOLUTE and updates the sequence to become current_vblank_count + sequence (which was RELATIVE), but now it became ABSOLUTE. drmWaitVBlank (in libdrm) expects this to be the case as it modifies the request to be Absolute so it expects the sequence to would have been updated. The change is in compat_drm_wait_vblank, which is called by drm_compat_ioctl. This change of copying the data back regardless of the return number makes it en par with drm_ioctl, which always copies the data before returning. [How] Return from the function after everything has been copied to user. Fixes IGT:kms_flip::modeset-vs-vblank-race-interruptible Tested on ChromeOS Trogdor(msm) Reviewed-by: Michel Dänzer Signed-off-by: Mark Yacoub Signed-off-by: Sean Paul Link: https://patchwork.freedesktop.org/patch/msgid/20210812194917.1703356-1-markyacoub@chromium.org Signed-off-by: Sasha Levin --- drivers/gpu/drm/drm_ioc32.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/drivers/gpu/drm/drm_ioc32.c b/drivers/gpu/drm/drm_ioc32.c index 2cf053fb8d54..1c691bdb8914 100644 --- a/drivers/gpu/drm/drm_ioc32.c +++ b/drivers/gpu/drm/drm_ioc32.c @@ -863,8 +863,6 @@ static int compat_drm_wait_vblank(struct file *file, unsigned int cmd, req.request.sequence = req32.request.sequence; req.request.signal = req32.request.signal; err = drm_ioctl_kernel(file, drm_wait_vblank_ioctl, &req, DRM_UNLOCKED); - if (err) - return err; req32.reply.type = req.reply.type; req32.reply.sequence = req.reply.sequence; @@ -873,7 +871,7 @@ static int compat_drm_wait_vblank(struct file *file, unsigned int cmd, if (copy_to_user(argp, &req32, sizeof(req32))) return -EFAULT; - return 0; + return err; } #if defined(CONFIG_X86) -- 2.30.2