Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp1167545ybi; Fri, 31 May 2019 15:10:04 -0700 (PDT) X-Google-Smtp-Source: APXvYqxvbNwIJHueFJctbBBxsP59rUiMnb/4X+F2NTnI+b1eVlGUT3MTI9JXc4YTHKVLFgXBWsrJ X-Received: by 2002:a17:90a:cf0c:: with SMTP id h12mr12458875pju.72.1559340604470; Fri, 31 May 2019 15:10:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1559340604; cv=none; d=google.com; s=arc-20160816; b=kpQBT7etfmhWEbX70uSQW2kbqPWo1re1apF0e+l3rSWKhPLHhWP3AqPNHGfXBVOYOM hgHZPDzAKvIFo9FadqyJ4DIulCAim7r8qh0fL22bYKXBaIjGZMuA+C3q8t9tnhcj8kVb aQ8qjPt7U/O+eOKXIMaIbYQ7Cqp1XVDyGVFQyoX0iWx+xTLE0fVlb9eTsxBytrldcaN2 m224j34sENcnRuhebhVwksqTuiXzj5zAbp+xv0wpU8MqBwzwQoYoD6y0HGwzo8JKO8j2 lG9cXyyMMylCLBkHcAsT6/VAtqoApJpwClabPNGlaF2z4274o0QiIZcPf6WjP8YqYdbd aqaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-transfer-encoding:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=Ko+Wfyi0i3W9WpJFYljQ2csSgtbI9KzNY6clfhR9vIY=; b=n5XH5w1Zn3AqQVSJp0UalA9A10fLRaezDU9eLyEWVYxbPy5USgRESMpH0W4mUDmqYd kxI8IUnIVl81v2wc95CIUzNeLhgzCrXQTNQsqlw95CA4M7o4nQKC+AYL3qlTzzSZr3vy LvA+HP7MVtWfitJj9cl0OJCKe4bfAyK3aQy5P3DgVkDUu9TXGM+De/von7ttqkY6DBqO RmznKNYJjTGVXQbbiR29DG9JKAa0ywdDCbezZ3ERslvWIzbn//pN0TgaKDA5XT/2VduL DdOZuOvRZ4+X9Nee8AtnrlphStlP/cYE8IKAZR8ynUASpBLeSnOkoWwqH/okvcizgRbQ +nMA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@brauner.io header.s=google header.b=Xkl2M46O; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id n8si7513571plp.33.2019.05.31.15.09.48; Fri, 31 May 2019 15:10:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@brauner.io header.s=google header.b=Xkl2M46O; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726741AbfEaWIU (ORCPT + 99 others); Fri, 31 May 2019 18:08:20 -0400 Received: from mail-wr1-f66.google.com ([209.85.221.66]:37210 "EHLO mail-wr1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725913AbfEaWIU (ORCPT ); Fri, 31 May 2019 18:08:20 -0400 Received: by mail-wr1-f66.google.com with SMTP id h1so7428777wro.4 for ; Fri, 31 May 2019 15:08:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=brauner.io; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:content-transfer-encoding:in-reply-to :user-agent; bh=Ko+Wfyi0i3W9WpJFYljQ2csSgtbI9KzNY6clfhR9vIY=; b=Xkl2M46O4ONXQoKukrh9dDHZI44Fdkjsyy2ix0AyrV4jZZTexqNuY0GkXgSG/30iRD iOWtIkxPnFM0RQTqKRl+cMC5qPNoPscKekDEP9DpSpIApMr+2krumjnPat8cZOX3rYCD 25cI9u4R3ddTTb455a4bxxTbr+kZH/3GL9qKoawUxCRxVZ08atYeitfzLosAQq4QYmOT Ra9TE2EjDPC5KpRYYV9YJaNzWPd4fQvboEveN3PiK8IM7tkZsg0EDwSPeY7vvK429s2J wt4WtbY52JJ7VfHMXO8LDbULlJ6LcEie+x2CcEJMvhz/SufHgqQrqcEwPKVoBtRJgacV TWWg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:content-transfer-encoding :in-reply-to:user-agent; bh=Ko+Wfyi0i3W9WpJFYljQ2csSgtbI9KzNY6clfhR9vIY=; b=o52pqViBb3kLIy1Ox4YfnM/kKheZ4eKYUysg3qiJ6FVw+Lp4RR4lGmG2mMwhNX2ib2 6LRLJBylCxKHs0R6U/MYAUslGtbGahox1QOZ28UOl+MD6SqIkghqLsKeKrs1Kn6VMpXk HdViRDu5ZPlr8RvJSYvULqr2eetYjiMImWSAJSgJK0vQ0dnixxkuTD9PuoQxK08+RlOK p13e3GjeUn6IrfJ3FOxkqsRrlnExqZDZqOh8riXvQdHYpQ918jPF9JOn5NGGM5E6l33S os5YKjFs1VSdc0rlTQ3Zu+VNzjE3PWaV2QsFM1jV22w7XgyhvDrU4fLupIc/iF40OL+J 8sVw== X-Gm-Message-State: APjAAAWuYbU4hWMqVVLUrMuoHFF+5OXm0aXGsrTwn8shY1h4ipgoJqJD QCwhk9L3NpHDIvYtd+FVFsu6FA== X-Received: by 2002:a05:6000:1149:: with SMTP id d9mr2285752wrx.154.1559340498233; Fri, 31 May 2019 15:08:18 -0700 (PDT) Received: from brauner.io (93-32-55-82.ip32.fastwebnet.it. [93.32.55.82]) by smtp.gmail.com with ESMTPSA id 65sm14341721wro.85.2019.05.31.15.08.16 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Fri, 31 May 2019 15:08:17 -0700 (PDT) Date: Sat, 1 Jun 2019 00:08:16 +0200 From: Christian Brauner To: Yann Droneaud Cc: viro@zeniv.linux.org.uk, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, jannh@google.com, fweimer@redhat.com, oleg@redhat.com, arnd@arndb.de, dhowells@redhat.com, Pavel Emelyanov , Andrew Morton , Adrian Reber , Andrei Vagin , linux-api@vger.kernel.org Subject: Re: [PATCH v1 1/2] fork: add clone3 Message-ID: <20190531220815.owrc5kbbdemmwdhs@brauner.io> References: <20190529152237.10719-1-christian@brauner.io> <1058006e0df4b52b3e53c7b3202c04140899aeb5.camel@opteya.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <1058006e0df4b52b3e53c7b3202c04140899aeb5.camel@opteya.com> User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, May 29, 2019 at 05:42:14PM +0200, Yann Droneaud wrote: > Le mercredi 29 mai 2019 à 17:22 +0200, Christian Brauner a écrit : > > This adds the clone3 system call. > > > > > > diff --git a/kernel/fork.c b/kernel/fork.c > > index b4cba953040a..6bc3e3d17150 100644 > > --- a/kernel/fork.c > > +++ b/kernel/fork.c > > @@ -2472,7 +2475,96 @@ SYSCALL_DEFINE5(clone, unsigned long, clone_flags, unsigned long, newsp, > > unsigned long, tls) > > #endif > > { > > - return _do_fork(clone_flags, newsp, 0, parent_tidptr, child_tidptr, tls); > > + struct kernel_clone_args args = { > > + .flags = clone_flags, > > + .stack = newsp, > > + .pidfd = parent_tidptr, > > + .parent_tidptr = parent_tidptr, > > + .tls = tls, > > + .child_tidptr = child_tidptr, > > + }; > > + > > + /* clone(CLONE_PIDFD) uses parent_tidptr to return a pidfd */ > > + if ((clone_flags & CLONE_PIDFD) && (clone_flags & CLONE_PARENT_SETTID)) > > + return -EINVAL; > > + > > + return _do_fork(&args); > > +} > > + > > +static bool clone3_flags_valid(u64 flags) > > +{ > > + if (flags & CLONE_DETACHED) > > + return false; > > + > > + if (flags & ~CLONE_MAX) > > + return false; > > + > > + return true; > > +} > > + > > +static int copy_clone_args_from_user(struct kernel_clone_args *kargs, > > + struct clone_args __user *uargs, > > + size_t size) > > +{ > > + struct clone_args args; > > + > > + if (unlikely(size > PAGE_SIZE)) > > + return -E2BIG; > > + > > + if (unlikely(size < sizeof(struct clone_args))) > > + return -EINVAL; > > + > > + if (unlikely(!access_ok(uargs, size))) > > + return -EFAULT; > > + > > + if (size > sizeof(struct clone_args)) { > > + unsigned char __user *addr; > > + unsigned char __user *end; > > + unsigned char val; > > + > > + addr = (void __user *)uargs + sizeof(struct clone_args); > > + end = (void __user *)uargs + size; > > + > > + for (; addr < end; addr++) { > > + if (get_user(val, addr)) > > + return -EFAULT; > > + if (val) > > + return -E2BIG; > > Should be -EINVAL: having something after the structure should be > handled just like an invalid flags, while still allowing future > userspace program to probe for support for newer feature. (Traveling until Monday, so sorry for delayed responses.) This copies what: kernel/sched/core.c:sched_copy_attr() kernel/event/core.c:perf_copy_attr() are already doing. Consistency might be good here but, I think. Christian