Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp844998ybi; Tue, 16 Jul 2019 06:07:49 -0700 (PDT) X-Google-Smtp-Source: APXvYqxvgbltw5tQC2AGOJE+4bID8AYvuTb4dznaEON4R4TVImFUsBLbhnabnL/3zI83VM20X01y X-Received: by 2002:a17:90a:7d09:: with SMTP id g9mr35498212pjl.38.1563282469333; Tue, 16 Jul 2019 06:07:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563282469; cv=none; d=google.com; s=arc-20160816; b=QA9iKnhqqHYKGECYMmXoFgnQWOg0zQA1ST9RfYk6qeyCnFPllCVX4Qh5p8M0XZ/a+9 ud+SnDQBMQDfF58i6s9tWIYEYLZSLnDYdwwt4z491fUMta9z9YDFMLrF6ibIXlDJ1vVB PcrOdPzo3XLbieOCTS12BMgXFOxSzTbEAfhKIjH5zGAW6txxoYJgUtfRDZcuVjpUtFDy T1Fx2bMuZMHo68dzj7jGbOzXhNdG39W1rEJ90pWxMoENTNz0w6v7ZjCqET0nke2Xpr6c /AU/JMDBn9VvsUahqKCmwlGPjro3lJXYkFxfMYndtz440LGw+tu70GRiSL5K0i8iHZtX zX7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=HndzIrwk0eloZ/VKZJ3ivaH1s8315qlKpsro16xZw70=; b=rk1O24xvrP3fybcdJ93HTBvuoMRcWk9Nzyhq1uqXERpdqScXE93B7DPBeJXD67O+MQ Db2oWEmHkFRrNgDrqLz99/BUWkSYoyKV4F8NV08HyAypUrHhJDFx4irUY6wYZRZEk7rU trG1ux0xYGqmgFFL0xjjJBjZCXT1crZY3BgXmvZpjhDtnruum8BOV3ZqgFWCJPAWJwU8 13f/A2i32+l3z0ReLe65kzNq+OFbot8JmAB6ZRbuV7PSZxnAc3nLxoHc2CZBaPu8RzS7 7i1JmUqjCnfYjFjQRtMV5fKRl9u7u+HqGV0274yMFhboi8jOOwMDJlAQjsR0VQ3DgR8c PLNA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@brauner.io header.s=google header.b=b8dhUBZS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f8si20063355pfn.43.2019.07.16.06.07.08; Tue, 16 Jul 2019 06:07:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@brauner.io header.s=google header.b=b8dhUBZS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727849AbfGPNGr (ORCPT + 99 others); Tue, 16 Jul 2019 09:06:47 -0400 Received: from mail-pg1-f194.google.com ([209.85.215.194]:38562 "EHLO mail-pg1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726997AbfGPNGq (ORCPT ); Tue, 16 Jul 2019 09:06:46 -0400 Received: by mail-pg1-f194.google.com with SMTP id f5so593996pgu.5 for ; Tue, 16 Jul 2019 06:06:45 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=brauner.io; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=HndzIrwk0eloZ/VKZJ3ivaH1s8315qlKpsro16xZw70=; b=b8dhUBZSz3RGMnHXa2eQUBcpb0Fr1c6vhDDwn4sy14RwoF3LeMqo4GwVei/eUCKLfN 2ysAKK0S6zo65plaT8Lmyu1cdKbX5vv5C3GPTJPIInad+mBHinkOAREnbCNuxmpL9VDG fvZUIwNFnzQNqEmzHkL0RRQ1MQkDpVZLaNNcaAVC/zAYUxremZf5+M3FMQbomiyN3wH4 zc2zC/xff3jM5dpplZUlTKdEFImIprhxsju27ez6MU1i0OsgFNq72UzfzJW9Togr4CqO YkkRxSa2wlAwsL/E0oFuYOap/7lvKcKnsDSBvmk5MITFO2BYwQSiCBv4/QcWtaXdxpFP 2++g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=HndzIrwk0eloZ/VKZJ3ivaH1s8315qlKpsro16xZw70=; b=qL7J3eYNcLJm9/okvW/l1f4r665DCVc0QP5HN52g3jMJSTQTc9AU5Uj8tDT5fQSiAc OWio8B4VdStpbhXrTCdEMBwtYgziS5PBrWBviyft9wWxEpOcDKJOLwYPBD4AEOqqxt1g D6M00J6pvlDp2yAE0654IgmhVrO+5GWxAdJafL5PEVJ81Z2uhcP9dpOP21VX9mfscMyO lIG8oe1LMfJytjkXWBNfEdTg1g8lMozhgF3JhUYoYCWj77eo97fX7NItUfzoal6QEac4 mulu4nUrW36tjESFjykW0jqy4hYnvASTjerHnmqzqPvVtlbET+D/+iY0AkucUz/5kb/B wRRg== X-Gm-Message-State: APjAAAX0kYm8t0CIGoKtYAg+ZKBSYHRzb/8M9qWBkCInspc5woso54GX M0gdAyFVCzMMClcH4fGAziE= X-Received: by 2002:a63:b1d:: with SMTP id 29mr33615344pgl.103.1563282405436; Tue, 16 Jul 2019 06:06:45 -0700 (PDT) Received: from brauner.io ([172.58.30.188]) by smtp.gmail.com with ESMTPSA id a12sm42618252pje.3.2019.07.16.06.06.37 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Tue, 16 Jul 2019 06:06:44 -0700 (PDT) Date: Tue, 16 Jul 2019 15:06:33 +0200 From: Christian Brauner To: Christian Borntraeger Cc: linux-kernel@vger.kernel.org, arnd@arndb.de, linux-arch@vger.kernel.org, linux-alpha@vger.kernel.org, linux-ia64@vger.kernel.org, linux-m68k@lists.linux-m68k.org, linux-mips@vger.kernel.org, linux-parisc@vger.kernel.org, linuxppc-dev@lists.ozlabs.org, linux-s390@vger.kernel.org, linux-sh@vger.kernel.org, sparclinux@vger.kernel.org, Vasily Gorbik , Heiko Carstens , mpe@ellerman.id.au Subject: Re: [PATCH 1/2] arch: mark syscall number 435 reserved for clone3 Message-ID: <20190716130631.tohj4ub54md25dys@brauner.io> References: <20190714192205.27190-1-christian@brauner.io> <20190714192205.27190-2-christian@brauner.io> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Jul 15, 2019 at 03:56:04PM +0200, Christian Borntraeger wrote: > I think Vasily already has a clone3 patch for s390x with 435. A quick follow-up on this. Helge and Michael have asked whether there are any tests for clone3. Yes, there will be and I try to have them ready by the end of the this or next week for review. In the meantime I hope the following minimalistic test program that just verifies very very basic functionality (It's not pretty.) will help you test: #define _GNU_SOURCE #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #include #ifndef CLONE_PIDFD #define CLONE_PIDFD 0x00001000 #endif #ifndef __NR_clone3 #define __NR_clone3 -1 #endif static pid_t sys_clone3(struct clone_args *args) { return syscall(__NR_clone3, args, sizeof(struct clone_args)); } static int wait_for_pid(pid_t pid) { int status, ret; again: ret = waitpid(pid, &status, 0); if (ret == -1) { if (errno == EINTR) goto again; return -1; } if (ret != pid) goto again; if (!WIFEXITED(status) || WEXITSTATUS(status) != 0) return -1; return 0; } #define ptr_to_u64(ptr) ((__u64)((uintptr_t)(ptr))) int main(int argc, char *argv[]) { int pidfd = -1; pid_t parent_tid = -1, pid = -1; struct clone_args args = {0}; args.parent_tid = ptr_to_u64(&parent_tid); /* CLONE_PARENT_SETTID */ args.pidfd = ptr_to_u64(&pidfd); /* CLONE_PIDFD */ args.flags = CLONE_PIDFD | CLONE_PARENT_SETTID; args.exit_signal = SIGCHLD; pid = sys_clone3(&args); if (pid < 0) { fprintf(stderr, "%s - Failed to create new process\n", strerror(errno)); exit(EXIT_FAILURE); } if (pid == 0) { printf("Child process with pid %d\n", getpid()); exit(EXIT_SUCCESS); } printf("Parent process received child's pid %d as return value\n", pid); printf("Parent process received child's pidfd %d\n", *(int *)args.pidfd); printf("Parent process received child's pid %d as return argument\n", *(pid_t *)args.parent_tid); if (wait_for_pid(pid)) exit(EXIT_FAILURE); if (pid != *(pid_t *)args.parent_tid) exit(EXIT_FAILURE); close(pidfd); return 0; }