public inbox for libc-alpha@sourceware.org
 help / color / mirror / Atom feed
* [PATCH v7 0/3] Add an internal wrapper for clone, clone2 and clone3
@ 2021-05-26 12:39 H.J. Lu
  2021-05-26 12:39 ` [PATCH v7 1/3] " H.J. Lu
                   ` (2 more replies)
  0 siblings, 3 replies; 23+ messages in thread
From: H.J. Lu @ 2021-05-26 12:39 UTC (permalink / raw)
  To: libc-alpha; +Cc: Florian Weimer, Noah Goldstein

The clone3 system call provides a superset of the functionality of clone
and clone2.  It also provides a number of API improvements, including
the ability to specify the size of the child's stack area which can be
used by kernel to compute the shadow stack size when allocating the
shadow stack.  Add:

extern int __clone_internal (struct clone_args *__cl_args,
			     int (*__func) (void *__arg), void *__arg);

to provide an abstract interface for clone, clone2 and clone3.

1. Simplify stack management for thread creation by passing both stack
base and size to create_thread.
2. Consolidate clone vs clone2 differences into a single file.
3. Call __clone3 if HAVE_CLONE3_WAPPER is defined.  If __clone3 returns
-1 with ENOSYS, fall back to clone or clone2.
4. Use only __clone_internal to clone a thread.  Since the stack size
argument for create_thread is now unconditional, always pass stack size
to create_thread.
5. Enable the public clone3 wrapper in the future after it has been
added to all targets.

Tested with build-many-glibcs.py.

H.J. Lu (3):
  Add an internal wrapper for clone, clone2 and clone3
  x86-64: Add the clone3 wrapper
  Add static tests for __clone_internal

 include/clone_internal.h                      |  16 ++
 nptl/allocatestack.c                          |  59 +-------
 nptl/createthread.c                           |   3 +-
 nptl/pthread_create.c                         |  17 ++-
 sysdeps/unix/sysv/linux/Makefile              |  11 +-
 sysdeps/unix/sysv/linux/clone-internal.c      |  91 ++++++++++++
 sysdeps/unix/sysv/linux/clone3.c              |   1 +
 sysdeps/unix/sysv/linux/clone3.h              |  60 ++++++++
 sysdeps/unix/sysv/linux/createthread.c        |  25 ++--
 sysdeps/unix/sysv/linux/spawni.c              |  26 ++--
 .../sysv/linux/tst-align-clone-internal.c     |  87 +++++++++++
 sysdeps/unix/sysv/linux/tst-clone2-internal.c | 137 ++++++++++++++++++
 sysdeps/unix/sysv/linux/tst-clone3-internal.c |  99 +++++++++++++
 .../unix/sysv/linux/tst-getpid1-internal.c    | 133 +++++++++++++++++
 .../sysv/linux/tst-misalign-clone-internal.c  |  86 +++++++++++
 sysdeps/unix/sysv/linux/x86_64/clone3.S       |  92 ++++++++++++
 sysdeps/unix/sysv/linux/x86_64/sysdep.h       |   2 +
 17 files changed, 854 insertions(+), 91 deletions(-)
 create mode 100644 include/clone_internal.h
 create mode 100644 sysdeps/unix/sysv/linux/clone-internal.c
 create mode 100644 sysdeps/unix/sysv/linux/clone3.c
 create mode 100644 sysdeps/unix/sysv/linux/clone3.h
 create mode 100644 sysdeps/unix/sysv/linux/tst-align-clone-internal.c
 create mode 100644 sysdeps/unix/sysv/linux/tst-clone2-internal.c
 create mode 100644 sysdeps/unix/sysv/linux/tst-clone3-internal.c
 create mode 100644 sysdeps/unix/sysv/linux/tst-getpid1-internal.c
 create mode 100644 sysdeps/unix/sysv/linux/tst-misalign-clone-internal.c
 create mode 100644 sysdeps/unix/sysv/linux/x86_64/clone3.S

-- 
2.31.1


^ permalink raw reply	[flat|nested] 23+ messages in thread

* [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-26 12:39 [PATCH v7 0/3] Add an internal wrapper for clone, clone2 and clone3 H.J. Lu
@ 2021-05-26 12:39 ` H.J. Lu
  2021-05-26 13:05   ` Florian Weimer
  2021-05-26 12:39 ` [PATCH v7 2/3] x86-64: Add the clone3 wrapper H.J. Lu
  2021-05-26 12:39 ` [PATCH v7 3/3] Add static tests for __clone_internal H.J. Lu
  2 siblings, 1 reply; 23+ messages in thread
From: H.J. Lu @ 2021-05-26 12:39 UTC (permalink / raw)
  To: libc-alpha; +Cc: Florian Weimer, Noah Goldstein

The clone3 system call provides a superset of the functionality of clone
and clone2.  It also provides a number of API improvements, including
the ability to specify the size of the child's stack area which can be
used by kernel to compute the shadow stack size when allocating the
shadow stack.  Add:

extern int __clone_internal (struct clone_args *__cl_args,
			     int (*__func) (void *__arg), void *__arg);

to provide an abstract interface for clone, clone2 and clone3.

1. Simplify stack management for thread creation by passing both stack
base and size to create_thread.
2. Consolidate clone vs clone2 differences into a single file.
3. Call __clone3 if HAVE_CLONE3_WAPPER is defined.  If __clone3 returns
-1 with ENOSYS, fall back to clone or clone2.
4. Use only __clone_internal to clone a thread.  Since the stack size
argument for create_thread is now unconditional, always pass stack size
to create_thread.
5. Enable the public clone3 wrapper in the future after it has been
added to all targets.
---
 include/clone_internal.h                 | 16 +++++
 nptl/allocatestack.c                     | 59 ++-------------
 nptl/createthread.c                      |  3 +-
 nptl/pthread_create.c                    | 17 ++---
 sysdeps/unix/sysv/linux/Makefile         |  2 +-
 sysdeps/unix/sysv/linux/clone-internal.c | 91 ++++++++++++++++++++++++
 sysdeps/unix/sysv/linux/clone3.c         |  1 +
 sysdeps/unix/sysv/linux/clone3.h         | 60 ++++++++++++++++
 sysdeps/unix/sysv/linux/createthread.c   | 25 ++++---
 sysdeps/unix/sysv/linux/spawni.c         | 26 +++----
 10 files changed, 209 insertions(+), 91 deletions(-)
 create mode 100644 include/clone_internal.h
 create mode 100644 sysdeps/unix/sysv/linux/clone-internal.c
 create mode 100644 sysdeps/unix/sysv/linux/clone3.c
 create mode 100644 sysdeps/unix/sysv/linux/clone3.h

diff --git a/include/clone_internal.h b/include/clone_internal.h
new file mode 100644
index 0000000000..4b23ef33ce
--- /dev/null
+++ b/include/clone_internal.h
@@ -0,0 +1,16 @@
+#ifndef _CLONE3_H
+#include_next <clone3.h>
+
+extern __typeof (clone3) __clone3;
+
+/* The internal wrapper of clone/clone2 and clone3.  If __clone3 returns
+   -1 with ENOSYS, fall back to clone or clone2.  */
+extern int __clone_internal (struct clone_args *__cl_args,
+			     int (*__func) (void *__arg), void *__arg);
+
+#ifndef _ISOMAC
+libc_hidden_proto (__clone3)
+libc_hidden_proto (__clone_internal)
+#endif
+
+#endif
diff --git a/nptl/allocatestack.c b/nptl/allocatestack.c
index dc81a2ca73..eebf9c2c3c 100644
--- a/nptl/allocatestack.c
+++ b/nptl/allocatestack.c
@@ -33,47 +33,6 @@
 #include <kernel-features.h>
 #include <nptl-stack.h>
 
-#ifndef NEED_SEPARATE_REGISTER_STACK
-
-/* Most architectures have exactly one stack pointer.  Some have more.  */
-# define STACK_VARIABLES void *stackaddr = NULL
-
-/* How to pass the values to the 'create_thread' function.  */
-# define STACK_VARIABLES_ARGS stackaddr
-
-/* How to declare function which gets there parameters.  */
-# define STACK_VARIABLES_PARMS void *stackaddr
-
-/* How to declare allocate_stack.  */
-# define ALLOCATE_STACK_PARMS void **stack
-
-/* This is how the function is called.  We do it this way to allow
-   other variants of the function to have more parameters.  */
-# define ALLOCATE_STACK(attr, pd) allocate_stack (attr, pd, &stackaddr)
-
-#else
-
-/* We need two stacks.  The kernel will place them but we have to tell
-   the kernel about the size of the reserved address space.  */
-# define STACK_VARIABLES void *stackaddr = NULL; size_t stacksize = 0
-
-/* How to pass the values to the 'create_thread' function.  */
-# define STACK_VARIABLES_ARGS stackaddr, stacksize
-
-/* How to declare function which gets there parameters.  */
-# define STACK_VARIABLES_PARMS void *stackaddr, size_t stacksize
-
-/* How to declare allocate_stack.  */
-# define ALLOCATE_STACK_PARMS void **stack, size_t *stacksize
-
-/* This is how the function is called.  We do it this way to allow
-   other variants of the function to have more parameters.  */
-# define ALLOCATE_STACK(attr, pd) \
-  allocate_stack (attr, pd, &stackaddr, &stacksize)
-
-#endif
-
-
 /* Default alignment of stack.  */
 #ifndef STACK_ALIGN
 # define STACK_ALIGN __alignof__ (long double)
@@ -249,7 +208,7 @@ advise_stack_range (void *mem, size_t size, uintptr_t pd, size_t guardsize)
    PDP must be non-NULL.  */
 static int
 allocate_stack (const struct pthread_attr *attr, struct pthread **pdp,
-		ALLOCATE_STACK_PARMS)
+		void **stack, size_t *stacksize)
 {
   struct pthread *pd;
   size_t size;
@@ -600,25 +559,17 @@ allocate_stack (const struct pthread_attr *attr, struct pthread **pdp,
   /* We place the thread descriptor at the end of the stack.  */
   *pdp = pd;
 
-#if _STACK_GROWS_DOWN
   void *stacktop;
 
-# if TLS_TCB_AT_TP
+#if TLS_TCB_AT_TP
   /* The stack begins before the TCB and the static TLS block.  */
   stacktop = ((char *) (pd + 1) - tls_static_size_for_stack);
-# elif TLS_DTV_AT_TP
+#elif TLS_DTV_AT_TP
   stacktop = (char *) (pd - 1);
-# endif
+#endif
 
-# ifdef NEED_SEPARATE_REGISTER_STACK
+  *stacksize = stacktop - pd->stackblock;
   *stack = pd->stackblock;
-  *stacksize = stacktop - *stack;
-# else
-  *stack = stacktop;
-# endif
-#else
-  *stack = pd->stackblock;
-#endif
 
   return 0;
 }
diff --git a/nptl/createthread.c b/nptl/createthread.c
index 46943b33fe..2ac83111ec 100644
--- a/nptl/createthread.c
+++ b/nptl/createthread.c
@@ -25,7 +25,8 @@
 
 static int
 create_thread (struct pthread *pd, const struct pthread_attr *attr,
-	       bool *stopped_start, STACK_VARIABLES_PARMS, bool *thread_ran)
+	       bool *stopped_start, void *stackaddr, size_t stacksize,
+	       bool *thread_ran)
 {
   /* If the implementation needs to do some tweaks to the thread after
      it has been created at the OS level, it can set STOPPED_START here.  */
diff --git a/nptl/pthread_create.c b/nptl/pthread_create.c
index 5680687efe..5faf1654e0 100644
--- a/nptl/pthread_create.c
+++ b/nptl/pthread_create.c
@@ -243,8 +243,8 @@ late_init (void)
    be set to true iff the thread actually started up and then got
    canceled before calling user code (*PD->start_routine).  */
 static int create_thread (struct pthread *pd, const struct pthread_attr *attr,
-			  bool *stopped_start, STACK_VARIABLES_PARMS,
-			  bool *thread_ran);
+			  bool *stopped_start, void *stackaddr,
+			  size_t stacksize, bool *thread_ran);
 
 #include <createthread.c>
 
@@ -498,7 +498,8 @@ int
 __pthread_create_2_1 (pthread_t *newthread, const pthread_attr_t *attr,
 		      void *(*start_routine) (void *), void *arg)
 {
-  STACK_VARIABLES;
+  void *stackaddr = NULL;
+  size_t stacksize = 0;
 
   /* Avoid a data race in the multi-threaded case, and call the
      deferred initialization only once.  */
@@ -522,7 +523,7 @@ __pthread_create_2_1 (pthread_t *newthread, const pthread_attr_t *attr,
     }
 
   struct pthread *pd = NULL;
-  int err = ALLOCATE_STACK (iattr, &pd);
+  int err = allocate_stack (iattr, &pd, &stackaddr, &stacksize);
   int retval = 0;
 
   if (__glibc_unlikely (err != 0))
@@ -667,8 +668,8 @@ __pthread_create_2_1 (pthread_t *newthread, const pthread_attr_t *attr,
 
       /* We always create the thread stopped at startup so we can
 	 notify the debugger.  */
-      retval = create_thread (pd, iattr, &stopped_start,
-			      STACK_VARIABLES_ARGS, &thread_ran);
+      retval = create_thread (pd, iattr, &stopped_start, stackaddr,
+			      stacksize, &thread_ran);
       if (retval == 0)
 	{
 	  /* We retain ownership of PD until (a) (see CONCURRENCY NOTES
@@ -699,8 +700,8 @@ __pthread_create_2_1 (pthread_t *newthread, const pthread_attr_t *attr,
 	}
     }
   else
-    retval = create_thread (pd, iattr, &stopped_start,
-			    STACK_VARIABLES_ARGS, &thread_ran);
+    retval = create_thread (pd, iattr, &stopped_start, stackaddr,
+			    stacksize, &thread_ran);
 
   /* Return to the previous signal mask, after creating the new
      thread.  */
diff --git a/sysdeps/unix/sysv/linux/Makefile b/sysdeps/unix/sysv/linux/Makefile
index e9566e028a..fcc52763cd 100644
--- a/sysdeps/unix/sysv/linux/Makefile
+++ b/sysdeps/unix/sysv/linux/Makefile
@@ -64,7 +64,7 @@ sysdep_routines += adjtimex clone umount umount2 readahead sysctl \
 		   time64-support pselect32 \
 		   xstat fxstat lxstat xstat64 fxstat64 lxstat64 \
 		   fxstatat fxstatat64 \
-		   xmknod xmknodat
+		   xmknod xmknodat clone3 clone-internal
 
 CFLAGS-gethostid.c = -fexceptions
 CFLAGS-tee.c = -fexceptions -fasynchronous-unwind-tables
diff --git a/sysdeps/unix/sysv/linux/clone-internal.c b/sysdeps/unix/sysv/linux/clone-internal.c
new file mode 100644
index 0000000000..1e7a8f6b35
--- /dev/null
+++ b/sysdeps/unix/sysv/linux/clone-internal.c
@@ -0,0 +1,91 @@
+/* The internal wrapper of clone and clone3.
+   Copyright (C) 2021 Free Software Foundation, Inc.
+   This file is part of the GNU C Library.
+
+   The GNU C Library is free software; you can redistribute it and/or
+   modify it under the terms of the GNU Lesser General Public
+   License as published by the Free Software Foundation; either
+   version 2.1 of the License, or (at your option) any later version.
+
+   The GNU C Library is distributed in the hope that it will be useful,
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+   Lesser General Public License for more details.
+
+   You should have received a copy of the GNU Lesser General Public
+   License along with the GNU C Library.  If not, see
+   <https://www.gnu.org/licenses/>.  */
+
+#include <sysdep.h>
+#include <stddef.h>
+#include <errno.h>
+#include <sched.h>
+#include <clone_internal.h>
+#include <libc-pointer-arith.h>	/* For cast_to_pointer.  */
+#include <stackinfo.h>		/* For _STACK_GROWS_{UP,DOWN}.  */
+
+#define CLONE_ARGS_SIZE_VER0 64 /* sizeof first published struct */
+#define CLONE_ARGS_SIZE_VER1 80 /* sizeof second published struct */
+#define CLONE_ARGS_SIZE_VER2 88 /* sizeof third published struct */
+
+#define sizeof_field(TYPE, MEMBER) sizeof ((((TYPE *)0)->MEMBER))
+#define offsetofend(TYPE, MEMBER) \
+  (offsetof (TYPE, MEMBER) + sizeof_field (TYPE, MEMBER))
+
+_Static_assert (__alignof (struct clone_args) == 8,
+		"__alignof (struct clone_args) != 8");
+_Static_assert (offsetofend (struct clone_args, tls) == CLONE_ARGS_SIZE_VER0,
+		"offsetofend (struct clone_args, tls) != CLONE_ARGS_SIZE_VER0");
+_Static_assert (offsetofend (struct clone_args, set_tid_size) == CLONE_ARGS_SIZE_VER1,
+		"offsetofend (struct clone_args, set_tid_size) != CLONE_ARGS_SIZE_VER1");
+_Static_assert (offsetofend (struct clone_args, cgroup) == CLONE_ARGS_SIZE_VER2,
+		"offsetofend (struct clone_args, cgroup) != CLONE_ARGS_SIZE_VER2");
+_Static_assert (sizeof (struct clone_args) == CLONE_ARGS_SIZE_VER2,
+		"sizeof (struct clone_args) != CLONE_ARGS_SIZE_VER2");
+
+int
+__clone_internal (struct clone_args *cl_args,
+		  int (*func) (void *arg), void *arg)
+{
+  int ret;
+#ifdef HAVE_CLONE3_WAPPER
+  /* Try clone3 first.  */
+  int saved_errno = errno;
+  ret = __clone3 (cl_args, sizeof (*cl_args), func, arg);
+  if (ret != -1 || errno != ENOSYS)
+    return ret;
+
+  /* NB: Restore errno since errno may be checked against non-zero
+     return value.  */
+  __set_errno (saved_errno);
+#endif
+
+  /* Map clone3 arguments to clone arguments.  NB: No need to check
+     invalid clone3 specific bits in flags nor exit_signal since this
+     is an internal function.  */
+  int flags = cl_args->flags | cl_args->exit_signal;
+  void *stack = cast_to_pointer (cl_args->stack);
+
+#ifdef __ia64__
+  ret = __clone2 (func, stack, cl_args->stack_size,
+		  flags, arg,
+		  cast_to_pointer (cl_args->parent_tid),
+		  cast_to_pointer (cl_args->tls),
+		  cast_to_pointer (cl_args->child_tid));
+#else
+# if !_STACK_GROWS_DOWN && !_STACK_GROWS_UP
+#  error "Define either _STACK_GROWS_DOWN or _STACK_GROWS_UP"
+# endif
+
+# if _STACK_GROWS_DOWN
+  stack += cl_args->stack_size;
+# endif
+  ret = __clone (func, stack, flags, arg,
+		 cast_to_pointer (cl_args->parent_tid),
+		 cast_to_pointer (cl_args->tls),
+		 cast_to_pointer (cl_args->child_tid));
+#endif
+  return ret;
+}
+
+libc_hidden_def (__clone_internal)
diff --git a/sysdeps/unix/sysv/linux/clone3.c b/sysdeps/unix/sysv/linux/clone3.c
new file mode 100644
index 0000000000..de963ef89d
--- /dev/null
+++ b/sysdeps/unix/sysv/linux/clone3.c
@@ -0,0 +1 @@
+/* An empty placeholder.  */
diff --git a/sysdeps/unix/sysv/linux/clone3.h b/sysdeps/unix/sysv/linux/clone3.h
new file mode 100644
index 0000000000..0488884d59
--- /dev/null
+++ b/sysdeps/unix/sysv/linux/clone3.h
@@ -0,0 +1,60 @@
+/* The wrapper of clone3.
+   Copyright (C) 2021 Free Software Foundation, Inc.
+   This file is part of the GNU C Library.
+
+   The GNU C Library is free software; you can redistribute it and/or
+   modify it under the terms of the GNU Lesser General Public
+   License as published by the Free Software Foundation; either
+   version 2.1 of the License, or (at your option) any later version.
+
+   The GNU C Library is distributed in the hope that it will be useful,
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+   Lesser General Public License for more details.
+
+   You should have received a copy of the GNU Lesser General Public
+   License along with the GNU C Library.  If not, see
+   <https://www.gnu.org/licenses/>.  */
+
+#ifndef _CLONE3_H
+#define _CLONE3_H	1
+
+#include <features.h>
+#include <stdint.h>
+#include <stddef.h>
+
+__BEGIN_DECLS
+
+/* This struct should only be used in an argument to the clone3 system
+   call (along with its size argument).  It may be extended with new
+   fields in the future.  */
+
+struct clone_args
+{
+  uint64_t flags;	 /* Flags bit mask.  */
+  uint64_t pidfd;	 /* Where to store PID file descriptor
+			    (pid_t *).  */
+  uint64_t child_tid;	 /* Where to store child TID, in child's memory
+			    (pid_t *).  */
+  uint64_t parent_tid;	 /* Where to store child TID, in parent's memory
+			    (int *). */
+  uint64_t exit_signal;	 /* Signal to deliver to parent on child
+			    termination */
+  uint64_t stack;	 /* The lowest address of stack.  */
+  uint64_t stack_size;	 /* Size of stack.  */
+  uint64_t tls;		 /* Location of new TLS.  */
+  uint64_t set_tid;	 /* Pointer to a pid_t array
+			    (since Linux 5.5).  */
+  uint64_t set_tid_size; /* Number of elements in set_tid
+			    (since Linux 5.5). */
+  uint64_t cgroup;	 /* File descriptor for target cgroup
+			    of child (since Linux 5.7).  */
+} __attribute__ ((aligned (8)));
+
+/* The wrapper of clone3.  */
+extern int clone3 (struct clone_args *__cl_args, size_t __size,
+		   int (*__func) (void *__arg), void *__arg);
+
+__END_DECLS
+
+#endif /* clone3.h */
diff --git a/sysdeps/unix/sysv/linux/createthread.c b/sysdeps/unix/sysv/linux/createthread.c
index bc3409b326..406c73ba00 100644
--- a/sysdeps/unix/sysv/linux/createthread.c
+++ b/sysdeps/unix/sysv/linux/createthread.c
@@ -25,15 +25,10 @@
 #include <ldsodefs.h>
 #include <tls.h>
 #include <stdint.h>
+#include <clone_internal.h>
 
 #include <arch-fork.h>
 
-#ifdef __NR_clone2
-# define ARCH_CLONE __clone2
-#else
-# define ARCH_CLONE __clone
-#endif
-
 /* See the comments in pthread_create.c for the requirements for these
    two macros and the create_thread function.  */
 
@@ -47,7 +42,8 @@ static int start_thread (void *arg) __attribute__ ((noreturn));
 
 static int
 create_thread (struct pthread *pd, const struct pthread_attr *attr,
-	       bool *stopped_start, STACK_VARIABLES_PARMS, bool *thread_ran)
+	       bool *stopped_start, void *stackaddr, size_t stacksize,
+	       bool *thread_ran)
 {
   /* Determine whether the newly created threads has to be started
      stopped since we have to set the scheduling parameters or set the
@@ -100,9 +96,18 @@ create_thread (struct pthread *pd, const struct pthread_attr *attr,
 
   TLS_DEFINE_INIT_TP (tp, pd);
 
-  if (__glibc_unlikely (ARCH_CLONE (&start_thread, STACK_VARIABLES_ARGS,
-				    clone_flags, pd, &pd->tid, tp, &pd->tid)
-			== -1))
+  struct clone_args args =
+    {
+      .flags = clone_flags,
+      .pidfd = (uintptr_t) &pd->tid,
+      .parent_tid = (uintptr_t) &pd->tid,
+      .child_tid = (uintptr_t) &pd->tid,
+      .stack = (uintptr_t) stackaddr,
+      .stack_size = stacksize,
+      .tls = (uintptr_t) tp,
+    };
+  int ret = __clone_internal (&args, &start_thread, pd);
+  if (__glibc_unlikely (ret == -1))
     return errno;
 
   /* It's started now, so if we fail below, we'll have to cancel it
diff --git a/sysdeps/unix/sysv/linux/spawni.c b/sysdeps/unix/sysv/linux/spawni.c
index 501f8fbccd..fd29858cf5 100644
--- a/sysdeps/unix/sysv/linux/spawni.c
+++ b/sysdeps/unix/sysv/linux/spawni.c
@@ -31,6 +31,7 @@
 #include <dl-sysdep.h>
 #include <libc-pointer-arith.h>
 #include <ldsodefs.h>
+#include <clone_internal.h>
 #include "spawn_int.h"
 
 /* The Linux implementation of posix_spawn{p} uses the clone syscall directly
@@ -59,21 +60,6 @@
    normal program exit with the exit code 127.  */
 #define SPAWN_ERROR	127
 
-#ifdef __ia64__
-# define CLONE(__fn, __stackbase, __stacksize, __flags, __args) \
-  __clone2 (__fn, __stackbase, __stacksize, __flags, __args, 0, 0, 0)
-#else
-# define CLONE(__fn, __stack, __stacksize, __flags, __args) \
-  __clone (__fn, __stack, __flags, __args)
-#endif
-
-/* Since ia64 wants the stackbase w/clone2, re-use the grows-up macro.  */
-#if _STACK_GROWS_UP || defined (__ia64__)
-# define STACK(__stack, __stack_size) (__stack)
-#elif _STACK_GROWS_DOWN
-# define STACK(__stack, __stack_size) (__stack + __stack_size)
-#endif
-
 
 struct posix_spawn_args
 {
@@ -378,8 +364,14 @@ __spawnix (pid_t * pid, const char *file,
      need for CLONE_SETTLS.  Although parent and child share the same TLS
      namespace, there will be no concurrent access for TLS variables (errno
      for instance).  */
-  new_pid = CLONE (__spawni_child, STACK (stack, stack_size), stack_size,
-		   CLONE_VM | CLONE_VFORK | SIGCHLD, &args);
+  struct clone_args clone_args =
+    {
+      .flags = CLONE_VM | CLONE_VFORK,
+      .exit_signal = SIGCHLD,
+      .stack = (uintptr_t) stack,
+      .stack_size = stack_size,
+    };
+  new_pid = __clone_internal (&clone_args, __spawni_child, &args);
 
   /* It needs to collect the case where the auxiliary process was created
      but failed to execute the file (due either any preparation step or
-- 
2.31.1


^ permalink raw reply	[flat|nested] 23+ messages in thread

* [PATCH v7 2/3] x86-64: Add the clone3 wrapper
  2021-05-26 12:39 [PATCH v7 0/3] Add an internal wrapper for clone, clone2 and clone3 H.J. Lu
  2021-05-26 12:39 ` [PATCH v7 1/3] " H.J. Lu
@ 2021-05-26 12:39 ` H.J. Lu
  2021-05-26 12:39 ` [PATCH v7 3/3] Add static tests for __clone_internal H.J. Lu
  2 siblings, 0 replies; 23+ messages in thread
From: H.J. Lu @ 2021-05-26 12:39 UTC (permalink / raw)
  To: libc-alpha; +Cc: Florian Weimer, Noah Goldstein

extern int clone3 (struct clone_args *__cl_args, size_t __size,
		   int (*__func) (void *__arg), void *__arg);
---
 sysdeps/unix/sysv/linux/x86_64/clone3.S | 92 +++++++++++++++++++++++++
 sysdeps/unix/sysv/linux/x86_64/sysdep.h |  2 +
 2 files changed, 94 insertions(+)
 create mode 100644 sysdeps/unix/sysv/linux/x86_64/clone3.S

diff --git a/sysdeps/unix/sysv/linux/x86_64/clone3.S b/sysdeps/unix/sysv/linux/x86_64/clone3.S
new file mode 100644
index 0000000000..71caaecc29
--- /dev/null
+++ b/sysdeps/unix/sysv/linux/x86_64/clone3.S
@@ -0,0 +1,92 @@
+/* The clone3 syscall wrapper.  Linux/x86-64 version.
+   Copyright (C) 2021 Free Software Foundation, Inc.
+   This file is part of the GNU C Library.
+
+   The GNU C Library is free software; you can redistribute it and/or
+   modify it under the terms of the GNU Lesser General Public
+   License as published by the Free Software Foundation; either
+   version 2.1 of the License, or (at your option) any later version.
+
+   The GNU C Library is distributed in the hope that it will be useful,
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+   Lesser General Public License for more details.
+
+   You should have received a copy of the GNU Lesser General Public
+   License along with the GNU C Library; if not, see
+   <https://www.gnu.org/licenses/>.  */
+
+/* clone3() is even more special than fork() as it mucks with stacks
+   and invokes a function in the right context after its all over.  */
+
+#include <sysdep.h>
+
+/* The userland implementation is:
+   int clone3 (struct clone_args *cl_args, size_t size,
+	       int (*func)(void *arg), void *arg);
+   the kernel entry is:
+   int clone3 (struct clone_args *cl_args, size_t size);
+
+   The parameters are passed in registers from userland:
+   rdi: cl_args
+   rsi: size
+   rdx: func
+   rcx: arg
+
+   The kernel expects:
+   rax: system call number
+   rdi: cl_args
+   rsi: size  */
+
+        .text
+ENTRY (__clone3)
+	/* Sanity check arguments.  */
+	movl	$-EINVAL, %eax
+	test	%RDI_LP, %RDI_LP	/* No NULL cl_args pointer.  */
+	jz	SYSCALL_ERROR_LABEL
+	test	%RDX_LP, %RDX_LP	/* No NULL function pointer.  */
+	jz	SYSCALL_ERROR_LABEL
+
+	/* Save the cl_args pointer in R8 which is preserved by the
+	   syscall.  */
+	mov	%RCX_LP, %R8_LP
+
+	/* Do the system call.  */
+	movl	$SYS_ify(clone3), %eax
+
+	/* End FDE now, because in the child the unwind info will be
+	   wrong.  */
+	cfi_endproc
+	syscall
+
+	test	%RAX_LP, %RAX_LP
+	jl	SYSCALL_ERROR_LABEL
+	jz	L(thread_start)
+
+	ret
+
+L(thread_start):
+	cfi_startproc
+	/* Clearing frame pointer is insufficient, use CFI.  */
+	cfi_undefined (rip)
+	/* Clear the frame pointer.  The ABI suggests this be done, to mark
+	   the outermost frame obviously.  */
+	xorl	%ebp, %ebp
+
+	/* Align stack to 16 bytes per the x86-64 psABI.  */
+	and	$-16, %RSP_LP
+
+	/* Set up arguments for the function call.  */
+	mov	%R8_LP, %RDI_LP	/* Argument.  */
+	call	*%rdx		/* Call function.  */
+	/* Call exit with return value from function call. */
+	movq	%rax, %rdi
+	movl	$SYS_ify(exit), %eax
+	syscall
+	cfi_endproc
+
+	cfi_startproc
+PSEUDO_END (__clone3)
+
+libc_hidden_def (__clone3)
+weak_alias (__clone3, clone3)
diff --git a/sysdeps/unix/sysv/linux/x86_64/sysdep.h b/sysdeps/unix/sysv/linux/x86_64/sysdep.h
index dbad2c788a..f26ffc68ae 100644
--- a/sysdeps/unix/sysv/linux/x86_64/sysdep.h
+++ b/sysdeps/unix/sysv/linux/x86_64/sysdep.h
@@ -377,6 +377,8 @@
 # define HAVE_GETCPU_VSYSCALL		"__vdso_getcpu"
 # define HAVE_CLOCK_GETRES64_VSYSCALL   "__vdso_clock_getres"
 
+# define HAVE_CLONE3_WAPPER			1
+
 # define SINGLE_THREAD_BY_GLOBAL		1
 
 #endif	/* __ASSEMBLER__ */
-- 
2.31.1


^ permalink raw reply	[flat|nested] 23+ messages in thread

* [PATCH v7 3/3] Add static tests for __clone_internal
  2021-05-26 12:39 [PATCH v7 0/3] Add an internal wrapper for clone, clone2 and clone3 H.J. Lu
  2021-05-26 12:39 ` [PATCH v7 1/3] " H.J. Lu
  2021-05-26 12:39 ` [PATCH v7 2/3] x86-64: Add the clone3 wrapper H.J. Lu
@ 2021-05-26 12:39 ` H.J. Lu
  2021-06-01  8:03   ` Szabolcs Nagy
  2 siblings, 1 reply; 23+ messages in thread
From: H.J. Lu @ 2021-05-26 12:39 UTC (permalink / raw)
  To: libc-alpha; +Cc: Florian Weimer, Noah Goldstein

---
 sysdeps/unix/sysv/linux/Makefile              |   9 ++
 .../sysv/linux/tst-align-clone-internal.c     |  87 +++++++++++
 sysdeps/unix/sysv/linux/tst-clone2-internal.c | 137 ++++++++++++++++++
 sysdeps/unix/sysv/linux/tst-clone3-internal.c |  99 +++++++++++++
 .../unix/sysv/linux/tst-getpid1-internal.c    | 133 +++++++++++++++++
 .../sysv/linux/tst-misalign-clone-internal.c  |  86 +++++++++++
 6 files changed, 551 insertions(+)
 create mode 100644 sysdeps/unix/sysv/linux/tst-align-clone-internal.c
 create mode 100644 sysdeps/unix/sysv/linux/tst-clone2-internal.c
 create mode 100644 sysdeps/unix/sysv/linux/tst-clone3-internal.c
 create mode 100644 sysdeps/unix/sysv/linux/tst-getpid1-internal.c
 create mode 100644 sysdeps/unix/sysv/linux/tst-misalign-clone-internal.c

diff --git a/sysdeps/unix/sysv/linux/Makefile b/sysdeps/unix/sysv/linux/Makefile
index fcc52763cd..e61ff0524d 100644
--- a/sysdeps/unix/sysv/linux/Makefile
+++ b/sysdeps/unix/sysv/linux/Makefile
@@ -118,6 +118,15 @@ endif
 
 tests-internal += tst-sigcontext-get_pc
 
+tests-clone-internal = \
+  tst-align-clone-internal \
+  tst-clone2-internal \
+  tst-clone3-internal \
+  tst-getpid1-internal \
+  tst-misalign-clone-internal
+tests-internal += $(tests-clone-internal)
+tests-static += $(tests-clone-internal)
+
 CFLAGS-tst-sigcontext-get_pc.c = -fasynchronous-unwind-tables
 
 # Generate the list of SYS_* macros for the system calls (__NR_*
diff --git a/sysdeps/unix/sysv/linux/tst-align-clone-internal.c b/sysdeps/unix/sysv/linux/tst-align-clone-internal.c
new file mode 100644
index 0000000000..6c3631f3db
--- /dev/null
+++ b/sysdeps/unix/sysv/linux/tst-align-clone-internal.c
@@ -0,0 +1,87 @@
+/* Verify that the clone child stack is properly aligned.
+   Copyright (C) 2021 Free Software Foundation, Inc.
+   This file is part of the GNU C Library.
+
+   The GNU C Library is free software; you can redistribute it and/or
+   modify it under the terms of the GNU Lesser General Public
+   License as published by the Free Software Foundation; either
+   version 2.1 of the License, or (at your option) any later version.
+
+   The GNU C Library is distributed in the hope that it will be useful,
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+   Lesser General Public License for more details.
+
+   You should have received a copy of the GNU Lesser General Public
+   License along with the GNU C Library; if not, see
+   <https://www.gnu.org/licenses/>.  */
+
+#include <sched.h>
+#include <stdbool.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <string.h>
+#include <sys/wait.h>
+#include <unistd.h>
+#include <tst-stack-align.h>
+#include <clone_internal.h>
+#include <support/xunistd.h>
+
+static int
+f (void *arg)
+{
+  bool ok = true;
+
+  puts ("in f");
+
+  if (TEST_STACK_ALIGN ())
+    ok = false;
+
+  return ok ? 0 : 1;
+}
+
+static int
+do_test (void)
+{
+  bool ok = true;
+
+  puts ("in main");
+
+  if (TEST_STACK_ALIGN ())
+    ok = false;
+
+#ifdef __ia64__
+# define STACK_SIZE 256 * 1024
+#else
+# define STACK_SIZE 128 * 1024
+#endif
+  char st[STACK_SIZE] __attribute__ ((aligned));
+  struct clone_args clone_args =
+    {
+      .stack = (uintptr_t) st,
+      .stack_size = sizeof (st),
+    };
+  pid_t p = __clone_internal (&clone_args, f, 0);
+  if (p == -1)
+    {
+      printf("clone failed: %m\n");
+      return 1;
+    }
+
+  int e;
+  xwaitpid (p, &e, __WCLONE);
+  if (!WIFEXITED (e))
+    {
+      if (WIFSIGNALED (e))
+	printf ("died from signal %s\n", strsignal (WTERMSIG (e)));
+      else
+	puts ("did not terminate correctly");
+      return 1;
+    }
+  if (WEXITSTATUS (e) != 0)
+    ok = false;
+
+  return ok ? 0 : 1;
+}
+
+#include <support/test-driver.c>
diff --git a/sysdeps/unix/sysv/linux/tst-clone2-internal.c b/sysdeps/unix/sysv/linux/tst-clone2-internal.c
new file mode 100644
index 0000000000..b8917fe713
--- /dev/null
+++ b/sysdeps/unix/sysv/linux/tst-clone2-internal.c
@@ -0,0 +1,137 @@
+/* Test if CLONE_VM does not change pthread pid/tid field (BZ #19957)
+   Copyright (C) 2021 Free Software Foundation, Inc.
+   This file is part of the GNU C Library.
+
+   The GNU C Library is free software; you can redistribute it and/or
+   modify it under the terms of the GNU Lesser General Public
+   License as published by the Free Software Foundation; either
+   version 2.1 of the License, or (at your option) any later version.
+
+   The GNU C Library is distributed in the hope that it will be useful,
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+   Lesser General Public License for more details.
+
+   You should have received a copy of the GNU Lesser General Public
+   License along with the GNU C Library; if not, see
+   <https://www.gnu.org/licenses/>.  */
+
+#include <sched.h>
+#include <signal.h>
+#include <string.h>
+#include <stdio.h>
+#include <fcntl.h>
+#include <unistd.h>
+#include <stddef.h>
+#include <stdbool.h>
+#include <stdint.h>
+#include <stdlib.h>
+#include <errno.h>
+#include <sys/types.h>
+#include <sys/wait.h>
+#include <sys/syscall.h>
+#include <clone_internal.h>
+#include <support/xunistd.h>
+#include <support/check.h>
+
+static int sig;
+static int pipefd[2];
+
+static int
+f (void *a)
+{
+  close (pipefd[0]);
+
+  pid_t ppid = getppid ();
+  pid_t pid = getpid ();
+  pid_t tid = gettid ();
+
+  if (write (pipefd[1], &ppid, sizeof ppid) != sizeof (ppid))
+    FAIL_EXIT1 ("write ppid failed\n");
+  if (write (pipefd[1], &pid, sizeof pid) != sizeof (pid))
+    FAIL_EXIT1 ("write pid failed\n");
+  if (write (pipefd[1], &tid, sizeof tid) != sizeof (tid))
+    FAIL_EXIT1 ("write tid failed\n");
+
+  return 0;
+}
+
+
+static int
+do_test (void)
+{
+  sig = SIGRTMIN;
+  sigset_t ss;
+  sigemptyset (&ss);
+  sigaddset (&ss, sig);
+  if (sigprocmask (SIG_BLOCK, &ss, NULL) != 0)
+    FAIL_EXIT1 ("sigprocmask failed: %m");
+
+  if (pipe2 (pipefd, O_CLOEXEC))
+    FAIL_EXIT1 ("pipe failed: %m");
+
+#ifdef __ia64__
+# define STACK_SIZE 256 * 1024
+#else
+# define STACK_SIZE 128 * 1024
+#endif
+  char st[STACK_SIZE] __attribute__ ((aligned));
+  struct clone_args clone_args =
+    {
+      .stack = (uintptr_t) st,
+      .stack_size = sizeof (st),
+    };
+  pid_t p = __clone_internal (&clone_args, f, 0);
+
+  close (pipefd[1]);
+
+  if (p == -1)
+    FAIL_EXIT1("clone failed: %m");
+
+  pid_t ppid, pid, tid;
+  if (read (pipefd[0], &ppid, sizeof pid) != sizeof pid)
+    {
+      kill (p, SIGKILL);
+      FAIL_EXIT1 ("read ppid failed: %m");
+    }
+  if (read (pipefd[0], &pid, sizeof pid) != sizeof pid)
+    {
+      kill (p, SIGKILL);
+      FAIL_EXIT1 ("read pid failed: %m");
+    }
+  if (read (pipefd[0], &tid, sizeof tid) != sizeof tid)
+    {
+      kill (p, SIGKILL);
+      FAIL_EXIT1 ("read tid failed: %m");
+    }
+
+  close (pipefd[0]);
+
+  int ret = 0;
+
+  pid_t own_pid = getpid ();
+  pid_t own_tid = syscall (__NR_gettid);
+
+  /* Some sanity checks for clone syscall: returned ppid should be current
+     pid and both returned tid/pid should be different from current one.  */
+  if ((ppid != own_pid) || (pid == own_pid) || (tid == own_tid))
+    FAIL_RET ("ppid=%i pid=%i tid=%i | own_pid=%i own_tid=%i",
+	      (int)ppid, (int)pid, (int)tid, (int)own_pid, (int)own_tid);
+
+  int e;
+  xwaitpid (p, &e, __WCLONE);
+  if (!WIFEXITED (e))
+    {
+      if (WIFSIGNALED (e))
+	printf ("died from signal %s\n", strsignal (WTERMSIG (e)));
+      else
+	puts ("did not terminate correctly");
+      exit (EXIT_FAILURE);
+    }
+  if (WEXITSTATUS (e) != 0)
+    FAIL_EXIT1 ("exit code %d", WEXITSTATUS (e));
+
+  return ret;
+}
+
+#include <support/test-driver.c>
diff --git a/sysdeps/unix/sysv/linux/tst-clone3-internal.c b/sysdeps/unix/sysv/linux/tst-clone3-internal.c
new file mode 100644
index 0000000000..2bdbc571e6
--- /dev/null
+++ b/sysdeps/unix/sysv/linux/tst-clone3-internal.c
@@ -0,0 +1,99 @@
+/* Check if clone (CLONE_THREAD) does not call exit_group (BZ #21512)
+   Copyright (C) 2021 Free Software Foundation, Inc.
+   This file is part of the GNU C Library.
+
+   The GNU C Library is free software; you can redistribute it and/or
+   modify it under the terms of the GNU Lesser General Public
+   License as published by the Free Software Foundation; either
+   version 2.1 of the License, or (at your option) any later version.
+
+   The GNU C Library is distributed in the hope that it will be useful,
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+   Lesser General Public License for more details.
+
+   You should have received a copy of the GNU Lesser General Public
+   License along with the GNU C Library; if not, see
+   <https://www.gnu.org/licenses/>.  */
+
+#include <string.h>
+#include <sched.h>
+#include <signal.h>
+#include <unistd.h>
+#include <errno.h>
+#include <sys/syscall.h>
+#include <sys/wait.h>
+#include <sys/types.h>
+#include <linux/futex.h>
+#include <support/check.h>
+#include <stdatomic.h>
+#include <clone_internal.h>
+
+/* Test if clone call with CLONE_THREAD does not call exit_group.  The 'f'
+   function returns '1', which will be used by clone thread to call the
+   'exit' syscall directly.  If _exit is used instead, exit_group will be
+   used and thus the thread group will finish with return value of '1'
+   (where '2' from main thread is expected.).  */
+
+static int
+f (void *a)
+{
+  return 1;
+}
+
+/* Futex wait for TID argument, similar to pthread_join internal
+   implementation.  */
+#define wait_tid(ctid_ptr, ctid_val)					\
+  do {									\
+    __typeof (*(ctid_ptr)) __tid;					\
+    /* We need acquire MO here so that we synchronize with the		\
+       kernel's store to 0 when the clone terminates.  */		\
+    while ((__tid = atomic_load_explicit (ctid_ptr,			\
+					  memory_order_acquire)) != 0)	\
+      futex_wait (ctid_ptr, ctid_val);					\
+  } while (0)
+
+static inline int
+futex_wait (int *futexp, int val)
+{
+#ifdef __NR_futex
+  return syscall (__NR_futex, futexp, FUTEX_WAIT, val);
+#else
+  return syscall (__NR_futex_time64, futexp, FUTEX_WAIT, val);
+#endif
+}
+
+static int
+do_test (void)
+{
+  char st[1024] __attribute__ ((aligned));
+  int clone_flags = CLONE_THREAD;
+  /* Minimum required flags to used along with CLONE_THREAD.  */
+  clone_flags |= CLONE_VM | CLONE_SIGHAND;
+  /* We will used ctid to call on futex to wait for thread exit.  */
+  clone_flags |= CLONE_CHILD_CLEARTID;
+  /* Initialize with a known value.  ctid is set to zero by the kernel after the
+     cloned thread has exited.  */
+#define CTID_INIT_VAL 1
+  pid_t ctid = CTID_INIT_VAL;
+  pid_t tid;
+
+  struct clone_args clone_args =
+    {
+      .flags = clone_flags & ~CSIGNAL,
+      .exit_signal = clone_flags & CSIGNAL,
+      .stack = (uintptr_t) st,
+      .stack_size = sizeof (st),
+      .child_tid = (uintptr_t) &ctid,
+    };
+  tid = __clone_internal (&clone_args, f, NULL);
+  if (tid == -1)
+    FAIL_EXIT1 ("clone failed: %m");
+
+  wait_tid (&ctid, CTID_INIT_VAL);
+
+  return 2;
+}
+
+#define EXPECTED_STATUS 2
+#include <support/test-driver.c>
diff --git a/sysdeps/unix/sysv/linux/tst-getpid1-internal.c b/sysdeps/unix/sysv/linux/tst-getpid1-internal.c
new file mode 100644
index 0000000000..ee69e52401
--- /dev/null
+++ b/sysdeps/unix/sysv/linux/tst-getpid1-internal.c
@@ -0,0 +1,133 @@
+/* Verify that the parent pid is unchanged by __clone_internal.
+   Copyright (C) 2021 Free Software Foundation, Inc.
+   This file is part of the GNU C Library.
+
+   The GNU C Library is free software; you can redistribute it and/or
+   modify it under the terms of the GNU Lesser General Public
+   License as published by the Free Software Foundation; either
+   version 2.1 of the License, or (at your option) any later version.
+
+   The GNU C Library is distributed in the hope that it will be useful,
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+   Lesser General Public License for more details.
+
+   You should have received a copy of the GNU Lesser General Public
+   License along with the GNU C Library; if not, see
+   <https://www.gnu.org/licenses/>.  */
+
+#include <sched.h>
+#include <signal.h>
+#include <string.h>
+#include <stdio.h>
+#include <unistd.h>
+#include <sys/types.h>
+#include <sys/wait.h>
+#include <clone_internal.h>
+#include <support/xunistd.h>
+
+#ifndef TEST_CLONE_FLAGS
+#define TEST_CLONE_FLAGS 0
+#endif
+
+static int sig;
+
+static int
+f (void *a)
+{
+  puts ("in f");
+  union sigval sival;
+  sival.sival_int = getpid ();
+  printf ("pid = %d\n", sival.sival_int);
+  if (sigqueue (getppid (), sig, sival) != 0)
+    return 1;
+  return 0;
+}
+
+
+static int
+do_test (void)
+{
+  int mypid = getpid ();
+
+  sig = SIGRTMIN;
+  sigset_t ss;
+  sigemptyset (&ss);
+  sigaddset (&ss, sig);
+  if (sigprocmask (SIG_BLOCK, &ss, NULL) != 0)
+    {
+      printf ("sigprocmask failed: %m\n");
+      return 1;
+    }
+
+#ifdef __ia64__
+# define STACK_SIZE 256 * 1024
+#else
+# define STACK_SIZE 128 * 1024
+#endif
+  char st[STACK_SIZE] __attribute__ ((aligned));
+  struct clone_args clone_args =
+    {
+      .flags = TEST_CLONE_FLAGS & ~CSIGNAL,
+      .exit_signal = TEST_CLONE_FLAGS & CSIGNAL,
+      .stack = (uintptr_t) st,
+      .stack_size = sizeof (st),
+    };
+  pid_t p = __clone_internal (&clone_args, f, 0);
+  if (p == -1)
+    {
+      printf("clone failed: %m\n");
+      return 1;
+    }
+  printf ("new thread: %d\n", (int) p);
+
+  siginfo_t si;
+  do
+    if (sigwaitinfo (&ss, &si) < 0)
+      {
+	printf("sigwaitinfo failed: %m\n");
+	kill (p, SIGKILL);
+	return 1;
+      }
+  while  (si.si_signo != sig || si.si_code != SI_QUEUE);
+
+  int e;
+  xwaitpid (p, &e, __WCLONE);
+  if (!WIFEXITED (e))
+    {
+      if (WIFSIGNALED (e))
+	printf ("died from signal %s\n", strsignal (WTERMSIG (e)));
+      else
+	puts ("did not terminate correctly");
+      return 1;
+    }
+  if (WEXITSTATUS (e) != 0)
+    {
+      printf ("exit code %d\n", WEXITSTATUS (e));
+      return 1;
+    }
+
+  if (si.si_int != (int) p)
+    {
+      printf ("expected PID %d, got si_int %d\n", (int) p, si.si_int);
+      kill (p, SIGKILL);
+      return 1;
+    }
+
+  if (si.si_pid != p)
+    {
+      printf ("expected PID %d, got si_pid %d\n", (int) p, (int) si.si_pid);
+      kill (p, SIGKILL);
+      return 1;
+    }
+
+  if (getpid () != mypid)
+    {
+      puts ("my PID changed");
+      return 1;
+    }
+
+  return 0;
+}
+
+#include <support/test-driver.c>
diff --git a/sysdeps/unix/sysv/linux/tst-misalign-clone-internal.c b/sysdeps/unix/sysv/linux/tst-misalign-clone-internal.c
new file mode 100644
index 0000000000..6df5fd2cbc
--- /dev/null
+++ b/sysdeps/unix/sysv/linux/tst-misalign-clone-internal.c
@@ -0,0 +1,86 @@
+/* Verify that __clone_internal properly aligns the child stack.
+   Copyright (C) 2021 Free Software Foundation, Inc.
+   This file is part of the GNU C Library.
+
+   The GNU C Library is free software; you can redistribute it and/or
+   modify it under the terms of the GNU Lesser General Public
+   License as published by the Free Software Foundation; either
+   version 2.1 of the License, or (at your option) any later version.
+
+   The GNU C Library is distributed in the hope that it will be useful,
+   but WITHOUT ANY WARRANTY; without even the implied warranty of
+   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+   Lesser General Public License for more details.
+
+   You should have received a copy of the GNU Lesser General Public
+   License along with the GNU C Library; if not, see
+   <https://www.gnu.org/licenses/>.  */
+
+#include <sched.h>
+#include <stdbool.h>
+#include <stdint.h>
+#include <stdio.h>
+#include <string.h>
+#include <sys/wait.h>
+#include <unistd.h>
+#include <libc-pointer-arith.h>
+#include <tst-stack-align.h>
+#include <clone_internal.h>
+#include <support/xunistd.h>
+#include <support/check.h>
+
+static int
+check_stack_alignment (void *arg)
+{
+  bool ok = true;
+
+  puts ("in f");
+
+  if (TEST_STACK_ALIGN ())
+    ok = false;
+
+  return ok ? 0 : 1;
+}
+
+static int
+do_test (void)
+{
+  puts ("in do_test");
+
+  if (TEST_STACK_ALIGN ())
+    FAIL_EXIT1 ("stack isn't aligned\n");
+
+#ifdef __ia64__
+# define STACK_SIZE (256 * 1024)
+#else
+# define STACK_SIZE (128 * 1024)
+#endif
+  char st[STACK_SIZE + 1];
+  /* NB: Align child stack to 1 byte.  */
+  char *stack = PTR_ALIGN_UP (&st[0], 2) + 1;
+  struct clone_args clone_args =
+    {
+      .stack = (uintptr_t) stack,
+      .stack_size = STACK_SIZE,
+    };
+  pid_t p = __clone_internal (&clone_args, check_stack_alignment, 0);
+
+  /* Clone must not fail.  */
+  TEST_VERIFY_EXIT (p != -1);
+
+  int e;
+  xwaitpid (p, &e, __WCLONE);
+  if (!WIFEXITED (e))
+    {
+      if (WIFSIGNALED (e))
+	printf ("died from signal %s\n", strsignal (WTERMSIG (e)));
+     FAIL_EXIT1 ("process did not terminate correctly");
+    }
+
+  if (WEXITSTATUS (e) != 0)
+    FAIL_EXIT1 ("exit code %d", WEXITSTATUS (e));
+
+  return 0;
+}
+
+#include <support/test-driver.c>
-- 
2.31.1


^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-26 12:39 ` [PATCH v7 1/3] " H.J. Lu
@ 2021-05-26 13:05   ` Florian Weimer
  2021-05-26 13:08     ` Adhemerval Zanella
  2021-05-26 13:19     ` H.J. Lu
  0 siblings, 2 replies; 23+ messages in thread
From: Florian Weimer @ 2021-05-26 13:05 UTC (permalink / raw)
  To: H.J. Lu; +Cc: libc-alpha, Noah Goldstein

* H. J. Lu:

> +int
> +__clone_internal (struct clone_args *cl_args,
> +		  int (*func) (void *arg), void *arg)
> +{
> +  int ret;
> +#ifdef HAVE_CLONE3_WAPPER
> +  /* Try clone3 first.  */
> +  int saved_errno = errno;
> +  ret = __clone3 (cl_args, sizeof (*cl_args), func, arg);
> +  if (ret != -1 || errno != ENOSYS)
> +    return ret;

How much breakage is this causing once there is a __clone3
implementation that can return errors that aren't ENOSYS?

Do Firefox and Chromium work after this change?  What about
Docker/Kubernetes?

Thanks,
Florian


^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-26 13:05   ` Florian Weimer
@ 2021-05-26 13:08     ` Adhemerval Zanella
  2021-05-26 13:19     ` H.J. Lu
  1 sibling, 0 replies; 23+ messages in thread
From: Adhemerval Zanella @ 2021-05-26 13:08 UTC (permalink / raw)
  To: Florian Weimer, H.J. Lu; +Cc: libc-alpha



On 26/05/2021 10:05, Florian Weimer via Libc-alpha wrote:
> * H. J. Lu:
> 
>> +int
>> +__clone_internal (struct clone_args *cl_args,
>> +		  int (*func) (void *arg), void *arg)
>> +{
>> +  int ret;
>> +#ifdef HAVE_CLONE3_WAPPER
>> +  /* Try clone3 first.  */
>> +  int saved_errno = errno;
>> +  ret = __clone3 (cl_args, sizeof (*cl_args), func, arg);
>> +  if (ret != -1 || errno != ENOSYS)
>> +    return ret;
> 
> How much breakage is this causing once there is a __clone3
> implementation that can return errors that aren't ENOSYS?
> 

I think we have discussed before that syscalls filter that do not
return ENOSYS for blocked syscalls are essentially broken and trying
to support it are not really possible for some usages

> Do Firefox and Chromium work after this change?  What about
> Docker/Kubernetes?
> 
> Thanks,
> Florian
> 

^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-26 13:05   ` Florian Weimer
  2021-05-26 13:08     ` Adhemerval Zanella
@ 2021-05-26 13:19     ` H.J. Lu
  2021-05-26 13:42       ` Florian Weimer
  1 sibling, 1 reply; 23+ messages in thread
From: H.J. Lu @ 2021-05-26 13:19 UTC (permalink / raw)
  To: Florian Weimer; +Cc: GNU C Library, Noah Goldstein

On Wed, May 26, 2021 at 6:05 AM Florian Weimer <fweimer@redhat.com> wrote:
>
> * H. J. Lu:
>
> > +int
> > +__clone_internal (struct clone_args *cl_args,
> > +               int (*func) (void *arg), void *arg)
> > +{
> > +  int ret;
> > +#ifdef HAVE_CLONE3_WAPPER
> > +  /* Try clone3 first.  */
> > +  int saved_errno = errno;
> > +  ret = __clone3 (cl_args, sizeof (*cl_args), func, arg);
> > +  if (ret != -1 || errno != ENOSYS)
> > +    return ret;
>
> How much breakage is this causing once there is a __clone3
> implementation that can return errors that aren't ENOSYS?

Isn't that __clone3 implementation broken?

> Do Firefox and Chromium work after this change?  What about

Firefox and Chromium won't work with clone3.

> Docker/Kubernetes?

I don't know.

> Thanks,
> Florian
>


-- 
H.J.

^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-26 13:19     ` H.J. Lu
@ 2021-05-26 13:42       ` Florian Weimer
  2021-05-26 13:58         ` H.J. Lu
  2021-05-26 14:09         ` Adhemerval Zanella
  0 siblings, 2 replies; 23+ messages in thread
From: Florian Weimer @ 2021-05-26 13:42 UTC (permalink / raw)
  To: H.J. Lu; +Cc: GNU C Library, Noah Goldstein

* H. J. Lu:

> On Wed, May 26, 2021 at 6:05 AM Florian Weimer <fweimer@redhat.com> wrote:
>>
>> * H. J. Lu:
>>
>> > +int
>> > +__clone_internal (struct clone_args *cl_args,
>> > +               int (*func) (void *arg), void *arg)
>> > +{
>> > +  int ret;
>> > +#ifdef HAVE_CLONE3_WAPPER
>> > +  /* Try clone3 first.  */
>> > +  int saved_errno = errno;
>> > +  ret = __clone3 (cl_args, sizeof (*cl_args), func, arg);
>> > +  if (ret != -1 || errno != ENOSYS)
>> > +    return ret;
>>
>> How much breakage is this causing once there is a __clone3
>> implementation that can return errors that aren't ENOSYS?
>
> Isn't that __clone3 implementation broken?

I completely agree, but that wasn't my question really.

>> Do Firefox and Chromium work after this change?  What about
>
> Firefox and Chromium won't work with clone3.

Could we please engage with their developers *before* putting this into
glibc?

I think Chromium is a priority because the sandbox is one of the
Chromium components that Firefox inherits, or something like that.  I
don't see a clone3 bug for Chromium yet.

For Chromium speficially, making glibc changes and requesting them to
fix their broken sandbox does not work:

  most chromium text rendering broken when built with glibc 2.32.9000 (Fedora Rawhide)
  <https://bugs.chromium.org/p/chromium/issues/detail?id=1164975>

The pointer argument indirection that affects fstatat also affects
clone3.  So maybe Chromium developers will de-facto refuse to fix the
blug clone3 as well.  But at least we should give them a chance to
comment.

I want a fairly smooth transition to the new glibc in Fedora and CentOS
Stream 9, and this issue looks like it could be a huge obstacle.

Thanks,
Florian


^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-26 13:42       ` Florian Weimer
@ 2021-05-26 13:58         ` H.J. Lu
  2021-05-26 14:09         ` Adhemerval Zanella
  1 sibling, 0 replies; 23+ messages in thread
From: H.J. Lu @ 2021-05-26 13:58 UTC (permalink / raw)
  To: Florian Weimer; +Cc: GNU C Library, Noah Goldstein

On Wed, May 26, 2021 at 6:42 AM Florian Weimer <fweimer@redhat.com> wrote:
>
> * H. J. Lu:
>
> > On Wed, May 26, 2021 at 6:05 AM Florian Weimer <fweimer@redhat.com> wrote:
> >>
> >> * H. J. Lu:
> >>
> >> > +int
> >> > +__clone_internal (struct clone_args *cl_args,
> >> > +               int (*func) (void *arg), void *arg)
> >> > +{
> >> > +  int ret;
> >> > +#ifdef HAVE_CLONE3_WAPPER
> >> > +  /* Try clone3 first.  */
> >> > +  int saved_errno = errno;
> >> > +  ret = __clone3 (cl_args, sizeof (*cl_args), func, arg);
> >> > +  if (ret != -1 || errno != ENOSYS)
> >> > +    return ret;
> >>
> >> How much breakage is this causing once there is a __clone3
> >> implementation that can return errors that aren't ENOSYS?
> >
> > Isn't that __clone3 implementation broken?
>
> I completely agree, but that wasn't my question really.
>
> >> Do Firefox and Chromium work after this change?  What about
> >
> > Firefox and Chromium won't work with clone3.
>
> Could we please engage with their developers *before* putting this into
> glibc?
>
> I think Chromium is a priority because the sandbox is one of the
> Chromium components that Firefox inherits, or something like that.  I
> don't see a clone3 bug for Chromium yet.
>
> For Chromium speficially, making glibc changes and requesting them to
> fix their broken sandbox does not work:
>
>   most chromium text rendering broken when built with glibc 2.32.9000 (Fedora Rawhide)
>   <https://bugs.chromium.org/p/chromium/issues/detail?id=1164975>
>
> The pointer argument indirection that affects fstatat also affects
> clone3.  So maybe Chromium developers will de-facto refuse to fix the
> blug clone3 as well.  But at least we should give them a chance to
> comment.

I opened:

https://bugs.chromium.org/p/chromium/issues/detail?id=1213452

> I want a fairly smooth transition to the new glibc in Fedora and CentOS
> Stream 9, and this issue looks like it could be a huge obstacle.
>
> Thanks,
> Florian
>


-- 
H.J.

^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-26 13:42       ` Florian Weimer
  2021-05-26 13:58         ` H.J. Lu
@ 2021-05-26 14:09         ` Adhemerval Zanella
  2021-05-31 12:14           ` H.J. Lu
  1 sibling, 1 reply; 23+ messages in thread
From: Adhemerval Zanella @ 2021-05-26 14:09 UTC (permalink / raw)
  To: Florian Weimer, H.J. Lu; +Cc: GNU C Library



On 26/05/2021 10:42, Florian Weimer via Libc-alpha wrote:
> * H. J. Lu:
> 
>> On Wed, May 26, 2021 at 6:05 AM Florian Weimer <fweimer@redhat.com> wrote:
>>>
>>> * H. J. Lu:
>>>
>>>> +int
>>>> +__clone_internal (struct clone_args *cl_args,
>>>> +               int (*func) (void *arg), void *arg)
>>>> +{
>>>> +  int ret;
>>>> +#ifdef HAVE_CLONE3_WAPPER
>>>> +  /* Try clone3 first.  */
>>>> +  int saved_errno = errno;
>>>> +  ret = __clone3 (cl_args, sizeof (*cl_args), func, arg);
>>>> +  if (ret != -1 || errno != ENOSYS)
>>>> +    return ret;
>>>
>>> How much breakage is this causing once there is a __clone3
>>> implementation that can return errors that aren't ENOSYS?
>>
>> Isn't that __clone3 implementation broken?
> 
> I completely agree, but that wasn't my question really.
> 
>>> Do Firefox and Chromium work after this change?  What about
>>
>> Firefox and Chromium won't work with clone3.
> 
> Could we please engage with their developers *before* putting this into
> glibc?
> 
> I think Chromium is a priority because the sandbox is one of the
> Chromium components that Firefox inherits, or something like that.  I
> don't see a clone3 bug for Chromium yet.
> 
> For Chromium speficially, making glibc changes and requesting them to
> fix their broken sandbox does not work:
> 
>   most chromium text rendering broken when built with glibc 2.32.9000 (Fedora Rawhide)
>   <https://bugs.chromium.org/p/chromium/issues/detail?id=1164975>
> 
> The pointer argument indirection that affects fstatat also affects
> clone3.  So maybe Chromium developers will de-facto refuse to fix the
> blug clone3 as well.  But at least we should give them a chance to
> comment.
> 
> I want a fairly smooth transition to the new glibc in Fedora and CentOS
> Stream 9, and this issue looks like it could be a huge obstacle.

So basically the current sandbox strategy does not work on any architecture
that only support fstatat (from the bug report it seems they do not really
care about it anyway). The bug report also points to a not accessible bug
that trigger the fix reversion [1].  Any idea what the bug says?

For clone3, I am not sure it would be possible to fix using a similar hack:
from the hack comment it seems that seccomp filter can't dereference 
argument pointers.

[1] https://bugs.chromium.org/p/chromium/issues/detail?id=1199431

^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-26 14:09         ` Adhemerval Zanella
@ 2021-05-31 12:14           ` H.J. Lu
  2021-05-31 12:16             ` Florian Weimer
  0 siblings, 1 reply; 23+ messages in thread
From: H.J. Lu @ 2021-05-31 12:14 UTC (permalink / raw)
  To: Adhemerval Zanella; +Cc: Florian Weimer, GNU C Library

On Wed, May 26, 2021 at 7:09 AM Adhemerval Zanella
<adhemerval.zanella@linaro.org> wrote:
>
>
>
> On 26/05/2021 10:42, Florian Weimer via Libc-alpha wrote:
> > * H. J. Lu:
> >
> >> On Wed, May 26, 2021 at 6:05 AM Florian Weimer <fweimer@redhat.com> wrote:
> >>>
> >>> * H. J. Lu:
> >>>
> >>>> +int
> >>>> +__clone_internal (struct clone_args *cl_args,
> >>>> +               int (*func) (void *arg), void *arg)
> >>>> +{
> >>>> +  int ret;
> >>>> +#ifdef HAVE_CLONE3_WAPPER
> >>>> +  /* Try clone3 first.  */
> >>>> +  int saved_errno = errno;
> >>>> +  ret = __clone3 (cl_args, sizeof (*cl_args), func, arg);
> >>>> +  if (ret != -1 || errno != ENOSYS)
> >>>> +    return ret;
> >>>
> >>> How much breakage is this causing once there is a __clone3
> >>> implementation that can return errors that aren't ENOSYS?
> >>
> >> Isn't that __clone3 implementation broken?
> >
> > I completely agree, but that wasn't my question really.
> >
> >>> Do Firefox and Chromium work after this change?  What about
> >>
> >> Firefox and Chromium won't work with clone3.
> >
> > Could we please engage with their developers *before* putting this into
> > glibc?
> >
> > I think Chromium is a priority because the sandbox is one of the
> > Chromium components that Firefox inherits, or something like that.  I
> > don't see a clone3 bug for Chromium yet.
> >
> > For Chromium speficially, making glibc changes and requesting them to
> > fix their broken sandbox does not work:
> >
> >   most chromium text rendering broken when built with glibc 2.32.9000 (Fedora Rawhide)
> >   <https://bugs.chromium.org/p/chromium/issues/detail?id=1164975>
> >
> > The pointer argument indirection that affects fstatat also affects
> > clone3.  So maybe Chromium developers will de-facto refuse to fix the
> > blug clone3 as well.  But at least we should give them a chance to
> > comment.
> >
> > I want a fairly smooth transition to the new glibc in Fedora and CentOS
> > Stream 9, and this issue looks like it could be a huge obstacle.
>
> So basically the current sandbox strategy does not work on any architecture
> that only support fstatat (from the bug report it seems they do not really
> care about it anyway). The bug report also points to a not accessible bug
> that trigger the fix reversion [1].  Any idea what the bug says?
>
> For clone3, I am not sure it would be possible to fix using a similar hack:
> from the hack comment it seems that seccomp filter can't dereference
> argument pointers.
>
> [1] https://bugs.chromium.org/p/chromium/issues/detail?id=1199431

From:

https://bugs.chromium.org/p/chromium/issues/detail?id=1213452#c5

They can modify the sandbox to return ENOSYS on clone3.

-- 
H.J.

^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-31 12:14           ` H.J. Lu
@ 2021-05-31 12:16             ` Florian Weimer
  2021-05-31 12:23               ` H.J. Lu
  0 siblings, 1 reply; 23+ messages in thread
From: Florian Weimer @ 2021-05-31 12:16 UTC (permalink / raw)
  To: H.J. Lu; +Cc: Adhemerval Zanella, GNU C Library

* H. J. Lu:

> From:
>
> https://bugs.chromium.org/p/chromium/issues/detail?id=1213452#c5
>
> They can modify the sandbox to return ENOSYS on clone3.

Is this sufficient if we have detected before that the process supports
CET and should enable it?

I think browsers activate the sandbox *after* process initialization
(unlike containers, where it happens before startup).

Thanks,
Florian


^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-31 12:16             ` Florian Weimer
@ 2021-05-31 12:23               ` H.J. Lu
  2021-05-31 12:28                 ` Florian Weimer
  0 siblings, 1 reply; 23+ messages in thread
From: H.J. Lu @ 2021-05-31 12:23 UTC (permalink / raw)
  To: Florian Weimer; +Cc: Adhemerval Zanella, GNU C Library

On Mon, May 31, 2021 at 5:16 AM Florian Weimer <fweimer@redhat.com> wrote:
>
> * H. J. Lu:
>
> > From:
> >
> > https://bugs.chromium.org/p/chromium/issues/detail?id=1213452#c5
> >
> > They can modify the sandbox to return ENOSYS on clone3.
>
> Is this sufficient if we have detected before that the process supports

Did you mean we could skip the following clone3 calls by caching
the first ENOSYS clone3 result?

> CET and should enable it?
>
> I think browsers activate the sandbox *after* process initialization
> (unlike containers, where it happens before startup).
>
> Thanks,
> Florian
>


-- 
H.J.

^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-31 12:23               ` H.J. Lu
@ 2021-05-31 12:28                 ` Florian Weimer
  2021-05-31 12:40                   ` H.J. Lu
  0 siblings, 1 reply; 23+ messages in thread
From: Florian Weimer @ 2021-05-31 12:28 UTC (permalink / raw)
  To: H.J. Lu; +Cc: Adhemerval Zanella, GNU C Library

* H. J. Lu:

> On Mon, May 31, 2021 at 5:16 AM Florian Weimer <fweimer@redhat.com> wrote:
>>
>> * H. J. Lu:
>>
>> > From:
>> >
>> > https://bugs.chromium.org/p/chromium/issues/detail?id=1213452#c5
>> >
>> > They can modify the sandbox to return ENOSYS on clone3.
>>
>> Is this sufficient if we have detected before that the process supports
>
> Did you mean we could skip the following clone3 calls by caching
> the first ENOSYS clone3 result?

No, I'm worried the clone (not clone3) will fail because the process has
enabled CET for some reason.

Thanks,
Florian


^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-31 12:28                 ` Florian Weimer
@ 2021-05-31 12:40                   ` H.J. Lu
  2021-05-31 13:01                     ` Florian Weimer
  0 siblings, 1 reply; 23+ messages in thread
From: H.J. Lu @ 2021-05-31 12:40 UTC (permalink / raw)
  To: Florian Weimer; +Cc: Adhemerval Zanella, GNU C Library

On Mon, May 31, 2021 at 5:28 AM Florian Weimer <fweimer@redhat.com> wrote:
>
> * H. J. Lu:
>
> > On Mon, May 31, 2021 at 5:16 AM Florian Weimer <fweimer@redhat.com> wrote:
> >>
> >> * H. J. Lu:
> >>
> >> > From:
> >> >
> >> > https://bugs.chromium.org/p/chromium/issues/detail?id=1213452#c5
> >> >
> >> > They can modify the sandbox to return ENOSYS on clone3.
> >>
> >> Is this sufficient if we have detected before that the process supports
> >
> > Did you mean we could skip the following clone3 calls by caching
> > the first ENOSYS clone3 result?
>
> No, I'm worried the clone (not clone3) will fail because the process has
> enabled CET for some reason.
>

In the kernel, clone3 and clone go to the same piece of code.  clone won't
fail just because of CET.

-- 
H.J.

^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-31 12:40                   ` H.J. Lu
@ 2021-05-31 13:01                     ` Florian Weimer
  2021-05-31 13:16                       ` H.J. Lu
  0 siblings, 1 reply; 23+ messages in thread
From: Florian Weimer @ 2021-05-31 13:01 UTC (permalink / raw)
  To: H.J. Lu; +Cc: Adhemerval Zanella, GNU C Library

* H. J. Lu:

> In the kernel, clone3 and clone go to the same piece of code.  clone won't
> fail just because of CET.

But clone won't have access to the stack boundaries.  Won't this create
issues for setting up the shadow stack?

Thanks,
Florian


^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-31 13:01                     ` Florian Weimer
@ 2021-05-31 13:16                       ` H.J. Lu
  2021-05-31 13:53                         ` Adhemerval Zanella
  0 siblings, 1 reply; 23+ messages in thread
From: H.J. Lu @ 2021-05-31 13:16 UTC (permalink / raw)
  To: Florian Weimer; +Cc: Adhemerval Zanella, GNU C Library

On Mon, May 31, 2021 at 6:01 AM Florian Weimer <fweimer@redhat.com> wrote:
>
> * H. J. Lu:
>
> > In the kernel, clone3 and clone go to the same piece of code.  clone won't
> > fail just because of CET.
>
> But clone won't have access to the stack boundaries.  Won't this create
> issues for setting up the shadow stack?
>

No.  There are:

        /* Cap shadow stack size to 4 GB */
        size = min_t(unsigned long long, rlimit(RLIMIT_STACK), SZ_4G);
        size = min(size, stack_size);

where stack_size is passed in clone3.

-- 
H.J.

^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-31 13:16                       ` H.J. Lu
@ 2021-05-31 13:53                         ` Adhemerval Zanella
  2021-05-31 14:01                           ` H.J. Lu
  0 siblings, 1 reply; 23+ messages in thread
From: Adhemerval Zanella @ 2021-05-31 13:53 UTC (permalink / raw)
  To: H.J. Lu, Florian Weimer; +Cc: GNU C Library



On 31/05/2021 10:16, H.J. Lu wrote:
> On Mon, May 31, 2021 at 6:01 AM Florian Weimer <fweimer@redhat.com> wrote:
>>
>> * H. J. Lu:
>>
>>> In the kernel, clone3 and clone go to the same piece of code.  clone won't
>>> fail just because of CET.
>>
>> But clone won't have access to the stack boundaries.  Won't this create
>> issues for setting up the shadow stack?
>>
> 
> No.  There are:
> 
>         /* Cap shadow stack size to 4 GB */
>         size = min_t(unsigned long long, rlimit(RLIMIT_STACK), SZ_4G);
>         size = min(size, stack_size);
> 
> where stack_size is passed in clone3.

Right, so CET support does not really require clone3 to be used internally 
then? Or am I missing something?

^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-31 13:53                         ` Adhemerval Zanella
@ 2021-05-31 14:01                           ` H.J. Lu
  2021-05-31 15:57                             ` Adhemerval Zanella
  0 siblings, 1 reply; 23+ messages in thread
From: H.J. Lu @ 2021-05-31 14:01 UTC (permalink / raw)
  To: Adhemerval Zanella; +Cc: Florian Weimer, GNU C Library

On Mon, May 31, 2021 at 6:53 AM Adhemerval Zanella
<adhemerval.zanella@linaro.org> wrote:
>
>
>
> On 31/05/2021 10:16, H.J. Lu wrote:
> > On Mon, May 31, 2021 at 6:01 AM Florian Weimer <fweimer@redhat.com> wrote:
> >>
> >> * H. J. Lu:
> >>
> >>> In the kernel, clone3 and clone go to the same piece of code.  clone won't
> >>> fail just because of CET.
> >>
> >> But clone won't have access to the stack boundaries.  Won't this create
> >> issues for setting up the shadow stack?
> >>
> >
> > No.  There are:
> >
> >         /* Cap shadow stack size to 4 GB */
> >         size = min_t(unsigned long long, rlimit(RLIMIT_STACK), SZ_4G);
> >         size = min(size, stack_size);
> >
> > where stack_size is passed in clone3.
>
> Right, so CET support does not really require clone3 to be used internally
> then? Or am I missing something?

Shadow stack size shouldn't be more than normal stack size.  The current
CET kernel shadow stack size may not be optimal.  My original code did

if (stack_size != 0)
  size = stack_size;
else
  size = min_t(unsigned long long, rlimit(RLIMIT_STACK), SZ_4G);

But

1. I don't want to disturb it before CET changes are upstreamed.
2. It can be updated AFTER it has been upstreamed.


--
H.J.

^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-31 14:01                           ` H.J. Lu
@ 2021-05-31 15:57                             ` Adhemerval Zanella
  2021-05-31 16:00                               ` H.J. Lu
  0 siblings, 1 reply; 23+ messages in thread
From: Adhemerval Zanella @ 2021-05-31 15:57 UTC (permalink / raw)
  To: H.J. Lu; +Cc: Florian Weimer, GNU C Library



On 31/05/2021 11:01, H.J. Lu wrote:
> On Mon, May 31, 2021 at 6:53 AM Adhemerval Zanella
> <adhemerval.zanella@linaro.org> wrote:
>>
>>
>>
>> On 31/05/2021 10:16, H.J. Lu wrote:
>>> On Mon, May 31, 2021 at 6:01 AM Florian Weimer <fweimer@redhat.com> wrote:
>>>>
>>>> * H. J. Lu:
>>>>
>>>>> In the kernel, clone3 and clone go to the same piece of code.  clone won't
>>>>> fail just because of CET.
>>>>
>>>> But clone won't have access to the stack boundaries.  Won't this create
>>>> issues for setting up the shadow stack?
>>>>
>>>
>>> No.  There are:
>>>
>>>         /* Cap shadow stack size to 4 GB */
>>>         size = min_t(unsigned long long, rlimit(RLIMIT_STACK), SZ_4G);
>>>         size = min(size, stack_size);
>>>
>>> where stack_size is passed in clone3.
>>
>> Right, so CET support does not really require clone3 to be used internally
>> then? Or am I missing something?
> 
> Shadow stack size shouldn't be more than normal stack size.  The current
> CET kernel shadow stack size may not be optimal.  My original code did
> 
> if (stack_size != 0)
>   size = stack_size;
> else
>   size = min_t(unsigned long long, rlimit(RLIMIT_STACK), SZ_4G);
> 
> But
> 
> 1. I don't want to disturb it before CET changes are upstreamed.
> 2. It can be updated AFTER it has been upstreamed.

Right, so I take this is just an optimization assuming that the extra
size would unused, right? I still failing to see why clone3 is an
requirement for CET enablement (if I understood this correctly).

I still think supporting clone3 is a nice thing to have, specially
for possible newer architectures and to support newer flags and
functionalities. 

^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 1/3] Add an internal wrapper for clone, clone2 and clone3
  2021-05-31 15:57                             ` Adhemerval Zanella
@ 2021-05-31 16:00                               ` H.J. Lu
  0 siblings, 0 replies; 23+ messages in thread
From: H.J. Lu @ 2021-05-31 16:00 UTC (permalink / raw)
  To: Adhemerval Zanella; +Cc: Florian Weimer, GNU C Library

On Mon, May 31, 2021 at 8:57 AM Adhemerval Zanella
<adhemerval.zanella@linaro.org> wrote:
>
>
>
> On 31/05/2021 11:01, H.J. Lu wrote:
> > On Mon, May 31, 2021 at 6:53 AM Adhemerval Zanella
> > <adhemerval.zanella@linaro.org> wrote:
> >>
> >>
> >>
> >> On 31/05/2021 10:16, H.J. Lu wrote:
> >>> On Mon, May 31, 2021 at 6:01 AM Florian Weimer <fweimer@redhat.com> wrote:
> >>>>
> >>>> * H. J. Lu:
> >>>>
> >>>>> In the kernel, clone3 and clone go to the same piece of code.  clone won't
> >>>>> fail just because of CET.
> >>>>
> >>>> But clone won't have access to the stack boundaries.  Won't this create
> >>>> issues for setting up the shadow stack?
> >>>>
> >>>
> >>> No.  There are:
> >>>
> >>>         /* Cap shadow stack size to 4 GB */
> >>>         size = min_t(unsigned long long, rlimit(RLIMIT_STACK), SZ_4G);
> >>>         size = min(size, stack_size);
> >>>
> >>> where stack_size is passed in clone3.
> >>
> >> Right, so CET support does not really require clone3 to be used internally
> >> then? Or am I missing something?
> >
> > Shadow stack size shouldn't be more than normal stack size.  The current
> > CET kernel shadow stack size may not be optimal.  My original code did
> >
> > if (stack_size != 0)
> >   size = stack_size;
> > else
> >   size = min_t(unsigned long long, rlimit(RLIMIT_STACK), SZ_4G);
> >
> > But
> >
> > 1. I don't want to disturb it before CET changes are upstreamed.
> > 2. It can be updated AFTER it has been upstreamed.
>
> Right, so I take this is just an optimization assuming that the extra
> size would unused, right? I still failing to see why clone3 is an

Correct.

> requirement for CET enablement (if I understood this correctly).

It isn't a MUST have.  It is an improvement for CET.

> I still think supporting clone3 is a nice thing to have, specially
> for possible newer architectures and to support newer flags and
> functionalities.



-- 
H.J.

^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 3/3] Add static tests for __clone_internal
  2021-05-26 12:39 ` [PATCH v7 3/3] Add static tests for __clone_internal H.J. Lu
@ 2021-06-01  8:03   ` Szabolcs Nagy
  2021-06-01  8:07     ` Florian Weimer
  0 siblings, 1 reply; 23+ messages in thread
From: Szabolcs Nagy @ 2021-06-01  8:03 UTC (permalink / raw)
  To: H.J. Lu; +Cc: libc-alpha, Florian Weimer

The 05/26/2021 05:39, H.J. Lu via Libc-alpha wrote:
> +++ b/sysdeps/unix/sysv/linux/tst-misalign-clone-internal.c
> @@ -0,0 +1,86 @@
> +/* Verify that __clone_internal properly aligns the child stack.

on aarch64 i see

FAIL: misc/tst-misalign-clone

with output

in do_test
double:  12 0xffffe525b3e8 8
ldouble: 15 0xffffe525b3f0 16
died from signal Bus error
error: ../sysdeps/unix/sysv/linux/tst-misalign-clone.c:87: process did not terminate correctly
error: 1 test failures

does this mean i need to update the target clone.S
to align sp ?




> +   Copyright (C) 2021 Free Software Foundation, Inc.
> +   This file is part of the GNU C Library.
> +
> +   The GNU C Library is free software; you can redistribute it and/or
> +   modify it under the terms of the GNU Lesser General Public
> +   License as published by the Free Software Foundation; either
> +   version 2.1 of the License, or (at your option) any later version.
> +
> +   The GNU C Library is distributed in the hope that it will be useful,
> +   but WITHOUT ANY WARRANTY; without even the implied warranty of
> +   MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
> +   Lesser General Public License for more details.
> +
> +   You should have received a copy of the GNU Lesser General Public
> +   License along with the GNU C Library; if not, see
> +   <https://www.gnu.org/licenses/>.  */
> +
> +#include <sched.h>
> +#include <stdbool.h>
> +#include <stdint.h>
> +#include <stdio.h>
> +#include <string.h>
> +#include <sys/wait.h>
> +#include <unistd.h>
> +#include <libc-pointer-arith.h>
> +#include <tst-stack-align.h>
> +#include <clone_internal.h>
> +#include <support/xunistd.h>
> +#include <support/check.h>
> +
> +static int
> +check_stack_alignment (void *arg)
> +{
> +  bool ok = true;
> +
> +  puts ("in f");
> +
> +  if (TEST_STACK_ALIGN ())
> +    ok = false;
> +
> +  return ok ? 0 : 1;
> +}
> +
> +static int
> +do_test (void)
> +{
> +  puts ("in do_test");
> +
> +  if (TEST_STACK_ALIGN ())
> +    FAIL_EXIT1 ("stack isn't aligned\n");
> +
> +#ifdef __ia64__
> +# define STACK_SIZE (256 * 1024)
> +#else
> +# define STACK_SIZE (128 * 1024)
> +#endif
> +  char st[STACK_SIZE + 1];
> +  /* NB: Align child stack to 1 byte.  */
> +  char *stack = PTR_ALIGN_UP (&st[0], 2) + 1;
> +  struct clone_args clone_args =
> +    {
> +      .stack = (uintptr_t) stack,
> +      .stack_size = STACK_SIZE,
> +    };
> +  pid_t p = __clone_internal (&clone_args, check_stack_alignment, 0);
> +
> +  /* Clone must not fail.  */
> +  TEST_VERIFY_EXIT (p != -1);
> +
> +  int e;
> +  xwaitpid (p, &e, __WCLONE);
> +  if (!WIFEXITED (e))
> +    {
> +      if (WIFSIGNALED (e))
> +	printf ("died from signal %s\n", strsignal (WTERMSIG (e)));
> +     FAIL_EXIT1 ("process did not terminate correctly");
> +    }
> +
> +  if (WEXITSTATUS (e) != 0)
> +    FAIL_EXIT1 ("exit code %d", WEXITSTATUS (e));
> +
> +  return 0;
> +}
> +
> +#include <support/test-driver.c>
> -- 
> 2.31.1
> 

^ permalink raw reply	[flat|nested] 23+ messages in thread

* Re: [PATCH v7 3/3] Add static tests for __clone_internal
  2021-06-01  8:03   ` Szabolcs Nagy
@ 2021-06-01  8:07     ` Florian Weimer
  0 siblings, 0 replies; 23+ messages in thread
From: Florian Weimer @ 2021-06-01  8:07 UTC (permalink / raw)
  To: Szabolcs Nagy; +Cc: H.J. Lu, libc-alpha

* Szabolcs Nagy:

> The 05/26/2021 05:39, H.J. Lu via Libc-alpha wrote:
>> +++ b/sysdeps/unix/sysv/linux/tst-misalign-clone-internal.c
>> @@ -0,0 +1,86 @@
>> +/* Verify that __clone_internal properly aligns the child stack.
>
> on aarch64 i see
>
> FAIL: misc/tst-misalign-clone
>
> with output
>
> in do_test
> double:  12 0xffffe525b3e8 8
> ldouble: 15 0xffffe525b3f0 16
> died from signal Bus error
> error: ../sysdeps/unix/sysv/linux/tst-misalign-clone.c:87: process did not terminate correctly
> error: 1 test failures
>
> does this mean i need to update the target clone.S
> to align sp ?

Yes, I think so.

Thanks,
Florian


^ permalink raw reply	[flat|nested] 23+ messages in thread

end of thread, other threads:[~2021-06-01  8:08 UTC | newest]

Thread overview: 23+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-05-26 12:39 [PATCH v7 0/3] Add an internal wrapper for clone, clone2 and clone3 H.J. Lu
2021-05-26 12:39 ` [PATCH v7 1/3] " H.J. Lu
2021-05-26 13:05   ` Florian Weimer
2021-05-26 13:08     ` Adhemerval Zanella
2021-05-26 13:19     ` H.J. Lu
2021-05-26 13:42       ` Florian Weimer
2021-05-26 13:58         ` H.J. Lu
2021-05-26 14:09         ` Adhemerval Zanella
2021-05-31 12:14           ` H.J. Lu
2021-05-31 12:16             ` Florian Weimer
2021-05-31 12:23               ` H.J. Lu
2021-05-31 12:28                 ` Florian Weimer
2021-05-31 12:40                   ` H.J. Lu
2021-05-31 13:01                     ` Florian Weimer
2021-05-31 13:16                       ` H.J. Lu
2021-05-31 13:53                         ` Adhemerval Zanella
2021-05-31 14:01                           ` H.J. Lu
2021-05-31 15:57                             ` Adhemerval Zanella
2021-05-31 16:00                               ` H.J. Lu
2021-05-26 12:39 ` [PATCH v7 2/3] x86-64: Add the clone3 wrapper H.J. Lu
2021-05-26 12:39 ` [PATCH v7 3/3] Add static tests for __clone_internal H.J. Lu
2021-06-01  8:03   ` Szabolcs Nagy
2021-06-01  8:07     ` Florian Weimer

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).