Received: by 2002:a05:7412:f584:b0:e2:908c:2ebd with SMTP id eh4csp1930845rdb; Tue, 5 Sep 2023 09:06:48 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFW4q8aCYSYIRmmoa32ZpQ4DzLfDle8NqzmEFebVrcVXCIt7I8QjL2HeXKu9eF5BpZZREz2 X-Received: by 2002:a17:906:76c7:b0:9a2:16e2:353 with SMTP id q7-20020a17090676c700b009a216e20353mr233106ejn.6.1693930008134; Tue, 05 Sep 2023 09:06:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1693930008; cv=none; d=google.com; s=arc-20160816; b=LRIf+HX0WaHAiplYiPZDNvB/D8IZpGETw9KgPDLR0oLv3hxJS78Ttc3wvi8EVWzrvp y7LYe59os+IUvhtHeMYJ4AjFU47yPjv5AIwTGGrTxoTY4pNpzSJn5CPBFKvSWzSB/15t CrLPDBPjXXZEmMdsz3axvisOtw8ACwNW6WNvuNIyeOCcqDT38wklt0fpQXk7aggiarZL qvks/yy3tI61Dut0u5in4OeWfMLXLCmhaaxm2HMD7dJg8tZf23pdlQtyG5twWPOvjKx5 dS6mrvxqJzAdti/JHQRnMx3QBk3dyJUmz7L/1iDY7YGpl5XEfPXBMh03C/LxSCqX6Fj0 MYxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=N2Oj4duDqdNpidaLNzNZrg/jMfBODVI8TSKgSbIOYoA=; fh=/jVTao/mx0skXq8I1xO13SRkvpKlJEfx82ksN8vv0yE=; b=vJyRoQODjiwLrhDWhnMyS6n3EBiDWnTNJAtIxJGaeODi4c+3OVU9W/BY8cckqD1Bnd lJwzik4J0r/Ht2Pvwrwq0d61uOLAkm+zzrsbSM0x5jB97gETWH4esMFF5Hx656y9el1K z+YC/9fb/7X38fc+SgcqmM75cBagvPSfz5GBfqOkv7G1NjxcirAiO7mdlawicJ2M2dUc Zo0RMXNXB3fvz21rIZqDPtC24h7S9yzrdkCM5/kaNlNOnFGoaD9adAIfTdnPcttlurqG RO+vb6OtkMc2zY+KxnUL1usQ1EDjSrWjFPQiNMncb7weKnawiG8FpYaBfi7deics17BL OE3w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=IqfOq0l4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ti7-20020a170907c20700b009a18d8a64e9si7906108ejc.774.2023.09.05.09.06.43; Tue, 05 Sep 2023 09:06:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=IqfOq0l4; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1350531AbjIASRP (ORCPT + 10 others); Fri, 1 Sep 2023 14:17:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52370 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244823AbjIASRO (ORCPT ); Fri, 1 Sep 2023 14:17:14 -0400 Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.115]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 526CA1707 for ; Fri, 1 Sep 2023 11:17:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1693592227; x=1725128227; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=TbWSp+CQPKRZ1zYd1VCNuFvodX7IQ75yftc9mVnbeJQ=; b=IqfOq0l4P1H2UYV0/04Sei8u0HscU3VZo/9TSbYDu/vqCUKavfkCX1cr LHDzamG+e6HMonDKJ4317PJ+1dzqMTTSKTZTdQlpECjdf49ILhSDqeZgC hTkgo/LP2mrN9NidFsTpS4c6IRpBTbZj47fRxumWSO5zmPcmiRo0+mlsX QR+tpY9K9szbzr+pbecu+2/K+izH9PjJ/2uIxhgUnF4jNFs9Rk5Zg3yTN R2SW7KStWI9pN2t+RJhUY5aqaG16BLFgBe7hwuQZ34mpIUJUepxG43YKQ 96BtssIWC9WwSBN5/KEDkSU7EI6lCT5Jrk8gHdnuJBkFQccqvwPZT5Myv A==; X-IronPort-AV: E=McAfee;i="6600,9927,10819"; a="376208968" X-IronPort-AV: E=Sophos;i="6.02,220,1688454000"; d="scan'208";a="376208968" Received: from orsmga001.jf.intel.com ([10.7.209.18]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Sep 2023 11:17:06 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10819"; a="775084459" X-IronPort-AV: E=Sophos;i="6.02,220,1688454000"; d="scan'208";a="775084459" Received: from ylee37-mobl.amr.corp.intel.com (HELO rpedgeco-desk4.intel.com) ([10.209.18.85]) by orsmga001-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Sep 2023 11:17:06 -0700 From: Rick Edgecombe To: x86@kernel.org, Thomas Gleixner , Ingo Molnar , Andy Lutomirski , Borislav Petkov , Dave Hansen , "H . Peter Anvin" , Peter Zijlstra , linux-kernel@vger.kernel.org Cc: rick.p.edgecombe@intel.com Subject: [PATCH] selftests/x86: Update map_shadow_stack syscall nr Date: Fri, 1 Sep 2023 11:16:52 -0700 Message-Id: <20230901181652.2583861-1-rick.p.edgecombe@intel.com> X-Mailer: git-send-email 2.34.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Shadow stack's selftest utilizes the map_shadow_stack syscall. The syscall is new with the feature, but the selftests cannot automatically find the headers for the kernel source tree they are located in. This resulted in the shadow stack test failing to build until the brand new headers were installed. To avoid this, a copy of the new uapi defines needed by the test were included in the selftest (see link for discussion). When shadow stack was merged the syscall number was changed, but the copy in the selftest was not updated. So update the copy of the syscall number define used when the required headers are not installed, to have the final syscall number from the merge. Link: https://lore.kernel.org/lkml/Y%2FijdXoTAATt0+Ct@zn.tnic/ Signed-off-by: Rick Edgecombe --- tools/testing/selftests/x86/test_shadow_stack.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/testing/selftests/x86/test_shadow_stack.c b/tools/testing/selftests/x86/test_shadow_stack.c index 2188968674cb..757e6527f67e 100644 --- a/tools/testing/selftests/x86/test_shadow_stack.c +++ b/tools/testing/selftests/x86/test_shadow_stack.c @@ -40,7 +40,7 @@ * without building the headers. */ #ifndef __NR_map_shadow_stack -#define __NR_map_shadow_stack 452 +#define __NR_map_shadow_stack 453 #define SHADOW_STACK_SET_TOKEN (1ULL << 0) -- 2.34.1