diff options
author | Dave Hansen <dave.hansen@linux.intel.com> | 2018-05-09 13:13:52 -0400 |
---|---|---|
committer | Ingo Molnar <mingo@kernel.org> | 2018-05-14 05:14:45 -0400 |
commit | 3d64f4ed15c3c53dba4c514bf59c334464dee373 (patch) | |
tree | ae5da66568aa34c02a2b16c0ad7ed549f3152a71 | |
parent | 0a0b152083cfc44ec1bb599b57b7aab41327f998 (diff) |
x86/pkeys/selftests: Fix pointer math
We dump out the entire area of the siginfo where the si_pkey_ptr is
supposed to be. But, we do some math on the poitner, which is a u32.
We intended to do byte math, not u32 math on the pointer.
Cast it over to a u8* so it works.
Also, move this block of code to below th si_code check. It doesn't
hurt anything, but the si_pkey field is gibberish for other signal
types.
Signed-off-by: Dave Hansen <dave.hansen@linux.intel.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Dave Hansen <dave.hansen@intel.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Michael Ellermen <mpe@ellerman.id.au>
Cc: Peter Zijlstra <peterz@infradead.org>
Cc: Ram Pai <linuxram@us.ibm.com>
Cc: Shuah Khan <shuah@kernel.org>
Cc: Thomas Gleixner <tglx@linutronix.de>
Cc: linux-mm@kvack.org
Link: http://lkml.kernel.org/r/20180509171352.9BE09819@viggo.jf.intel.com
Signed-off-by: Ingo Molnar <mingo@kernel.org>
-rw-r--r-- | tools/testing/selftests/x86/protection_keys.c | 14 |
1 files changed, 7 insertions, 7 deletions
diff --git a/tools/testing/selftests/x86/protection_keys.c b/tools/testing/selftests/x86/protection_keys.c index 55a4e349a45e..ee8176358d12 100644 --- a/tools/testing/selftests/x86/protection_keys.c +++ b/tools/testing/selftests/x86/protection_keys.c | |||
@@ -303,13 +303,6 @@ void signal_handler(int signum, siginfo_t *si, void *vucontext) | |||
303 | dump_mem(pkru_ptr - 128, 256); | 303 | dump_mem(pkru_ptr - 128, 256); |
304 | pkey_assert(*pkru_ptr); | 304 | pkey_assert(*pkru_ptr); |
305 | 305 | ||
306 | si_pkey_ptr = (u32 *)(((u8 *)si) + si_pkey_offset); | ||
307 | dprintf1("si_pkey_ptr: %p\n", si_pkey_ptr); | ||
308 | dump_mem(si_pkey_ptr - 8, 24); | ||
309 | siginfo_pkey = *si_pkey_ptr; | ||
310 | pkey_assert(siginfo_pkey < NR_PKEYS); | ||
311 | last_si_pkey = siginfo_pkey; | ||
312 | |||
313 | if ((si->si_code == SEGV_MAPERR) || | 306 | if ((si->si_code == SEGV_MAPERR) || |
314 | (si->si_code == SEGV_ACCERR) || | 307 | (si->si_code == SEGV_ACCERR) || |
315 | (si->si_code == SEGV_BNDERR)) { | 308 | (si->si_code == SEGV_BNDERR)) { |
@@ -317,6 +310,13 @@ void signal_handler(int signum, siginfo_t *si, void *vucontext) | |||
317 | exit(4); | 310 | exit(4); |
318 | } | 311 | } |
319 | 312 | ||
313 | si_pkey_ptr = (u32 *)(((u8 *)si) + si_pkey_offset); | ||
314 | dprintf1("si_pkey_ptr: %p\n", si_pkey_ptr); | ||
315 | dump_mem((u8 *)si_pkey_ptr - 8, 24); | ||
316 | siginfo_pkey = *si_pkey_ptr; | ||
317 | pkey_assert(siginfo_pkey < NR_PKEYS); | ||
318 | last_si_pkey = siginfo_pkey; | ||
319 | |||
320 | dprintf1("signal pkru from xsave: %08x\n", *pkru_ptr); | 320 | dprintf1("signal pkru from xsave: %08x\n", *pkru_ptr); |
321 | /* need __rdpkru() version so we do not do shadow_pkru checking */ | 321 | /* need __rdpkru() version so we do not do shadow_pkru checking */ |
322 | dprintf1("signal pkru from pkru: %08x\n", __rdpkru()); | 322 | dprintf1("signal pkru from pkru: %08x\n", __rdpkru()); |