Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1586946ybv; Thu, 20 Feb 2020 23:48:17 -0800 (PST) X-Google-Smtp-Source: APXvYqwsNlgQdq/fd/BYh+4RdNvZPc2YXrdqJ7JbuMKJr6S38rq/wueZDkDsu1jC0BOJSCMnzETr X-Received: by 2002:a05:6830:1014:: with SMTP id a20mr13493958otp.302.1582271297603; Thu, 20 Feb 2020 23:48:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582271297; cv=none; d=google.com; s=arc-20160816; b=wb+V7g+iwMNtCoufqfhGsbN+Z9gbb7+xcJJxmybFhQh125zfkqUUWbbMILwlMwL8zA /WtV7/QJpOY8BfYDaIr041IELjmjp4iePcx1u4wogX3ENMjPO/YRXAJa6dluVFwL8st+ UJSeDzxB2BCn9J7V3JT5Pa93EkyZavKT9bz4zAKlj3pbtXnrQkcmUR6+tiTBpd10YYD5 N28f/4eU/3Aalvn5X9FyZVbPFCisCeqSy7QsJCgFnaxLaFxxc/om9nt9r0U3WK9cFpqu dlTBGEtzTm26OM71RwDVKYy+6gFc5plXwUNj31zf6oeY7U9aHr3tC9OZBN2YVJncvUMe h6BQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Abzvu43iy597KAbtn5QLicSdcah3X4yHENaiqJr3cD4=; b=pP5p5DfuYRP9JXxvsUGaHiY5uKWynk0Iw8mw1FmzKNMLGcUuRg4AzH/qA8khPc5e/H rbwoOxCR98Znny95E/9gmzXOSwHi3AT5eApRX6DLKP+AjX972CtlrHYePPrJmi5oKVPr Xk71J4Nomoi/7lz5At6PVfBZmTgJ8mMRa03nl5NGc0baWD3x9nI+hoOv/XAfLYRkTDnB kf6yh8UqfCx7JFgUnIm89U5sbphc4Bq7pay2mMRfX92yAavWvhAUkifcD20ynjJb4lxV f5TKl9tw+6i1JuyVFw13tlyXKsf1Ih17GIkBlBXYtqkQy9gYon3Ik44+EvFB2f4Uw1YB FCXQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DUFiQYgM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id p25si1034232oto.191.2020.02.20.23.48.05; Thu, 20 Feb 2020 23:48:17 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=DUFiQYgM; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728720AbgBUHqa (ORCPT + 99 others); Fri, 21 Feb 2020 02:46:30 -0500 Received: from mail.kernel.org ([198.145.29.99]:41930 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727966AbgBUHq0 (ORCPT ); Fri, 21 Feb 2020 02:46:26 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id D342B20801; Fri, 21 Feb 2020 07:46:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582271186; bh=ERfQ3eAbohrmh759MhxBh8l+4EKx0sFujaFwkM2jL3g=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DUFiQYgME23YXqWoM7z0YbWA1l2TVWtNkeOlmuZeuEeFw0M4DThA+HkjG3uJNdn20 x0zwCkb8YJY7O8a5czSxuwlbyoNW9tDQKvq4oyXaAUZ0PnTKIm85DUDIlI2SyNFFt7 B40+iGYPUH32IWcPWefNAna+jg/sAhKDF99DmyNM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Siddhesh Poyarekar , Masami Hiramatsu , Tim Bird , Shuah Khan , Sasha Levin Subject: [PATCH 5.5 070/399] kselftest: Minimise dependency of get_size on C library interfaces Date: Fri, 21 Feb 2020 08:36:35 +0100 Message-Id: <20200221072409.158041132@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200221072402.315346745@linuxfoundation.org> References: <20200221072402.315346745@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Siddhesh Poyarekar [ Upstream commit 6b64a650f0b2ae3940698f401732988699eecf7a ] It was observed[1] on arm64 that __builtin_strlen led to an infinite loop in the get_size selftest. This is because __builtin_strlen (and other builtins) may sometimes result in a call to the C library function. The C library implementation of strlen uses an IFUNC resolver to load the most efficient strlen implementation for the underlying machine and hence has a PLT indirection even for static binaries. Because this binary avoids the C library startup routines, the PLT initialization never happens and hence the program gets stuck in an infinite loop. On x86_64 the __builtin_strlen just happens to expand inline and avoid the call but that is not always guaranteed. Further, while testing on x86_64 (Fedora 31), it was observed that the test also failed with a segfault inside write() because the generated code for the write function in glibc seems to access TLS before the syscall (probably due to the cancellation point check) and fails because TLS is not initialised. To mitigate these problems, this patch reduces the interface with the C library to just the syscall function. The syscall function still sets errno on failure, which is undesirable but for now it only affects cases where syscalls fail. [1] https://bugs.linaro.org/show_bug.cgi?id=5479 Signed-off-by: Siddhesh Poyarekar Reported-by: Masami Hiramatsu Tested-by: Masami Hiramatsu Reviewed-by: Tim Bird Signed-off-by: Shuah Khan Signed-off-by: Sasha Levin --- tools/testing/selftests/size/get_size.c | 24 ++++++++++++++++++------ 1 file changed, 18 insertions(+), 6 deletions(-) diff --git a/tools/testing/selftests/size/get_size.c b/tools/testing/selftests/size/get_size.c index 2ad45b9443550..2980b1a63366b 100644 --- a/tools/testing/selftests/size/get_size.c +++ b/tools/testing/selftests/size/get_size.c @@ -11,23 +11,35 @@ * own execution. It also attempts to have as few dependencies * on kernel features as possible. * - * It should be statically linked, with startup libs avoided. - * It uses no library calls, and only the following 3 syscalls: + * It should be statically linked, with startup libs avoided. It uses + * no library calls except the syscall() function for the following 3 + * syscalls: * sysinfo(), write(), and _exit() * * For output, it avoids printf (which in some C libraries * has large external dependencies) by implementing it's own * number output and print routines, and using __builtin_strlen() + * + * The test may crash if any of the above syscalls fails because in some + * libc implementations (e.g. the GNU C Library) errno is saved in + * thread-local storage, which does not get initialized due to avoiding + * startup libs. */ #include #include +#include #define STDOUT_FILENO 1 static int print(const char *s) { - return write(STDOUT_FILENO, s, __builtin_strlen(s)); + size_t len = 0; + + while (s[len] != '\0') + len++; + + return syscall(SYS_write, STDOUT_FILENO, s, len); } static inline char *num_to_str(unsigned long num, char *buf, int len) @@ -79,12 +91,12 @@ void _start(void) print("TAP version 13\n"); print("# Testing system size.\n"); - ccode = sysinfo(&info); + ccode = syscall(SYS_sysinfo, &info); if (ccode < 0) { print("not ok 1"); print(test_name); print(" ---\n reason: \"could not get sysinfo\"\n ...\n"); - _exit(ccode); + syscall(SYS_exit, ccode); } print("ok 1"); print(test_name); @@ -100,5 +112,5 @@ void _start(void) print(" ...\n"); print("1..1\n"); - _exit(0); + syscall(SYS_exit, 0); } -- 2.20.1