Received: by 2002:a05:6512:3d0e:0:0:0:0 with SMTP id d14csp42991lfv; Tue, 12 Apr 2022 16:31:21 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx6UIuIO7IajQK9z7y/VW5Gm3LzbDcRD3F54Bj6tD0+Ce8ZJFY0JxYzkIIKRgEroguP3AUX X-Received: by 2002:a05:6830:2649:b0:5e6:c629:e1bc with SMTP id f9-20020a056830264900b005e6c629e1bcmr6326232otu.287.1649806281671; Tue, 12 Apr 2022 16:31:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649806281; cv=none; d=google.com; s=arc-20160816; b=vL6yzdvvJP/0D3FEHyU5Omy2CjKV1qnZhW8yx8j8JfKoLjczWgyiNVyABs9n9nSUli MDIVT3HWmPW9Uxlr/Mtp3Riyc5ENA/oGCqMTO/nvGaYVzY2burktQ2P0C39w9vt1yQqX w0FJxXDSdpOOYq0ANJa/GYU5iMDqRS2OzGeTYoMnUvgNWSGuB4ePjZLwXjSrjtWqw57W bpKAmnnrLmRNiSZt621rkhIyFqehbfu3i4nqPSZWMUMI3qKQZqBFPYB0kpodJ69EGfgy f1kQtpd5FSWCvXjj/ojgzV+ObC9SLVu0Moslnrmf/lMq01cUM13LZfVPs8/lpqeYK+cn mhCA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=mmJQqY0RH6Q1fa/vpzlCZe7P5nN1enM7YVjZk9UkUJE=; b=Hrn1ASujrJWW3fENHWo3TiiwexAFPbh6RBpqS1KE6A+G01xhyhxYPqlYcGKWjIeP3Y fdCnTUcwtRrQrT+VzGoQ5w/AAD3EtEeX7cwT+itsKXVpzJZuAn3uAk8AYhayLE3H9gXy 7LuvaKugHfhXUzu1ZY5SfML+PboMj1lP4DkcUV3cb+2Rew1p/OOgApGGcTjLOvRjEgZI nculso7hgrUv5nALtM1AC0AVeSUDovYk1C5VMW7LmQn1sUZyy+fsLW7qNnHKgGNSujxO HLk3WYJsxYOrCaAdlSQLt+FFywP/AwOL60341fkYNMdHsQSR5mZPX89gT7vzUuWdjAlM G2kg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=DoPyGBgs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id k13-20020a056830150d00b005ce1060d0a6si7631495otp.31.2022.04.12.16.31.21 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Apr 2022 16:31:21 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=DoPyGBgs; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 9850B182DAD; Tue, 12 Apr 2022 14:23:03 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1359429AbiDLJU3 (ORCPT + 99 others); Tue, 12 Apr 2022 05:20:29 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50438 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1356998AbiDLHjj (ORCPT ); Tue, 12 Apr 2022 03:39:39 -0400 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4925E13D7E; Tue, 12 Apr 2022 00:10:43 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id DD48CB81B5D; Tue, 12 Apr 2022 07:10:41 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3E891C385A8; Tue, 12 Apr 2022 07:10:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1649747440; bh=X3zK7TOo5YU38lUQfqqw5eqP95X751iVUWcD1uQ09Fs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DoPyGBgsGbM8uqL8BInylp+IoNIMKe6Zgmcs/txuirbflAZHPuv3CeFc2k7TwO3C4 T8mzr8wHIGCIH1N8lAZ8q3Qc9FePvSFUNumcDFhbD76622SMxtX5HogI7pSG8UgIt4 +vbtJV9oVeC5cPS4mpZS5IGUrCi6EtU8yFgxK7AI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Ricardo Koller , Reiji Watanabe , Andrew Jones , Marc Zyngier , Sasha Levin Subject: [PATCH 5.17 063/343] kvm: selftests: aarch64: fix the failure check in kvm_set_gsi_routing_irqchip_check Date: Tue, 12 Apr 2022 08:28:01 +0200 Message-Id: <20220412062952.921289965@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220412062951.095765152@linuxfoundation.org> References: <20220412062951.095765152@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ricardo Koller [ Upstream commit 5b7898648f02083012900e48d063e51ccbdad165 ] kvm_set_gsi_routing_irqchip_check(expect_failure=true) is used to check the error code returned by the kernel when trying to setup an invalid gsi routing table. The ioctl fails if "pin >= KVM_IRQCHIP_NUM_PINS", so kvm_set_gsi_routing_irqchip_check() should test the error only when "intid >= KVM_IRQCHIP_NUM_PINS+32". The issue is that the test check is "intid >= KVM_IRQCHIP_NUM_PINS", so for a case like "intid = KVM_IRQCHIP_NUM_PINS" the test wrongly assumes that the kernel will return an error. Fix this by using the right check. Signed-off-by: Ricardo Koller Reported-by: Reiji Watanabe Cc: Andrew Jones Signed-off-by: Marc Zyngier Link: https://lore.kernel.org/r/20220127030858.3269036-4-ricarkol@google.com Signed-off-by: Sasha Levin --- tools/testing/selftests/kvm/aarch64/vgic_irq.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/tools/testing/selftests/kvm/aarch64/vgic_irq.c b/tools/testing/selftests/kvm/aarch64/vgic_irq.c index 7f3afee5cc00..48e43e24d240 100644 --- a/tools/testing/selftests/kvm/aarch64/vgic_irq.c +++ b/tools/testing/selftests/kvm/aarch64/vgic_irq.c @@ -573,8 +573,8 @@ static void kvm_set_gsi_routing_irqchip_check(struct kvm_vm *vm, kvm_gsi_routing_write(vm, routing); } else { ret = _kvm_gsi_routing_write(vm, routing); - /* The kernel only checks for KVM_IRQCHIP_NUM_PINS. */ - if (intid >= KVM_IRQCHIP_NUM_PINS) + /* The kernel only checks e->irqchip.pin >= KVM_IRQCHIP_NUM_PINS */ + if (((uint64_t)intid + num - 1 - MIN_SPI) >= KVM_IRQCHIP_NUM_PINS) TEST_ASSERT(ret != 0 && errno == EINVAL, "Bad intid %u did not cause KVM_SET_GSI_ROUTING " "error: rc: %i errno: %i", intid, ret, errno); -- 2.35.1