[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CALCETrUcH9R62gDdiG-EGTfSt2kQktv-0+bYmPcLn4PWNMrHSQ@mail.gmail.com>
Date: Fri, 1 Mar 2019 11:59:24 -0800
From: Andy Lutomirski <luto@...nel.org>
To: Steve Muckle <smuckle@...gle.com>
Cc: Shuah Khan <shuah@...nel.org>, Andy Lutomirski <luto@...nel.org>,
Thomas Gleixner <tglx@...utronix.de>,
"open list:KERNEL SELFTEST FRAMEWORK"
<linux-kselftest@...r.kernel.org>,
LKML <linux-kernel@...r.kernel.org>,
Android Kernel Team <kernel-team@...roid.com>
Subject: Re: [PATCH] selftests: x86: add version check in test_syscall_vdso
> On Feb 28, 2019, at 4:18 PM, Steve Muckle <smuckle@...gle.com> wrote:
>
> Since 4.17 registers r8-r11 are not clobbered/zeroed by a 64-bit kernel
> handling a 32-bit syscall and this behavior is enforced by the
> test_syscall_vdso testcase. See commit 8bb2610bc496
> ("x86/entry/64/compat: Preserve r8-r11 in int $0x80").
>
> Permit the old behavior in the testcase for kernels prior to 4.17.
NAK. If you want an old buggy kernel to pass a test, please either
patch the kernel or run an old test.
>
> Signed-off-by: Steve Muckle <smuckle@...gle.com>
> ---
> .../testing/selftests/x86/test_syscall_vdso.c | 30 +++++++++++++++++++
> 1 file changed, 30 insertions(+)
>
> diff --git a/tools/testing/selftests/x86/test_syscall_vdso.c b/tools/testing/selftests/x86/test_syscall_vdso.c
> index c9c3281077bc..f7284dc4c32b 100644
> --- a/tools/testing/selftests/x86/test_syscall_vdso.c
> +++ b/tools/testing/selftests/x86/test_syscall_vdso.c
> @@ -30,6 +30,7 @@
> #include <sys/time.h>
> #include <elf.h>
> #include <sys/ptrace.h>
> +#include <sys/utsname.h>
> #include <sys/wait.h>
>
> #if !defined(__i386__)
> @@ -71,6 +72,7 @@ struct regs64 {
> };
> struct regs64 regs64;
> int kernel_is_64bit;
> +int clobber_ok;
>
> asm (
> " .pushsection .text\n"
> @@ -130,6 +132,28 @@ void print_regs64(void)
> printf("12:%016llx 13:%016llx 14:%016llx 15:%016llx\n", regs64.r12, regs64.r13, regs64.r14, regs64.r15);
> }
>
> +static void get_kernel_version(int *version, int *patchlevel)
> +{
> + int ret, sublevel;
> + struct utsname utsname;
> +
> + ret = uname(&utsname);
> + if (ret) {
> + perror("uname");
> + exit(1);
> + }
> +
> + ret = sscanf(utsname.release, "%d.%d.%d", version, patchlevel,
> + &sublevel);
> + if (ret < 0) {
> + perror("sscanf");
> + exit(1);
> + } else if (ret != 3) {
> + printf("Malformed kernel version %s\n", &utsname.release);
> + exit(1);
> + }
> +}
> +
> int check_regs64(void)
> {
> int err = 0;
> @@ -166,6 +190,8 @@ int check_regs64(void)
> * Historically (and probably unintentionally), they
> * were clobbered or zeroed.
> */
> + if (clobber_ok && *r64 == 0 && num <= 11)
> + continue;
> }
> printf("[FAIL]\tR%d has changed:%016llx\n", num, *r64);
> err++;
> @@ -385,6 +411,7 @@ int main(int argc, char **argv, char **envp)
> {
> int exitcode = 0;
> int cs;
> + int version, patchlevel;
>
> asm("\n"
> " movl %%cs, %%eax\n"
> @@ -394,6 +421,9 @@ int main(int argc, char **argv, char **envp)
> if (!kernel_is_64bit)
> printf("[NOTE]\tNot a 64-bit kernel, won't test R8..R15 leaks\n");
>
> + get_kernel_version(&version, &patchlevel);
> + clobber_ok = version < 4 || (version == 4 && patchlevel < 17);
> +
> /* This only works for non-static builds:
> * syscall_addr = dlsym(dlopen("linux-gate.so.1", RTLD_NOW), "__kernel_vsyscall");
> */
> --
> 2.21.0.352.gf09ad66450-goog
>
Powered by blists - more mailing lists