Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp1614301ybv; Fri, 21 Feb 2020 00:18:48 -0800 (PST) X-Google-Smtp-Source: APXvYqxV3tkT8NqnKaAMfwrt253eMamLnyMazfRhu46Iae2TcBxWz7Q3epTfR4u+8oAF8CISmPsO X-Received: by 2002:a9d:6212:: with SMTP id g18mr28900808otj.187.1582273128151; Fri, 21 Feb 2020 00:18:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1582273128; cv=none; d=google.com; s=arc-20160816; b=a7wMBPWjVSzeDrGCkzZqxQaUfeOgLQ0JYv8wSMwJDXkjaQk8z/r6pOiLE5EWQSwqzT Zm6hZkq4X15N/PrpNvdTV/GlMY6Z/k+EPF0wDsvlxdj8d5EE+hH4Xiy3T9xFCqdCFaQa n19n38hBPpLPCRBjQpvkKlXIcerrcR9cM3q3SE8BtWgVSPPqyceCzJEKOOJUZ3PxkoN7 Ro6EFyXn7gHuIb9t27s6VsDlZgBPmqZIZNZ428kRvSgCJeIbai7KUO8gpG3aXvai388R uJCMeapMV3Zmh3yFAKOqdxlAfsfQ+1VEfQ3lS7Bft/1AV7UTjqi6OdnrAzv3MzEGoOCV n8EQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Ns60lyjebi4+XHyGwrqVFwLx62FcmIka4r4z7cZmw64=; b=T3db+OdmKM/jJAwH2ofSa9EojeDs+9hS2/rfV5NzdX9zEeVsS4S6BDOeryZkon5FE6 Sy909ssxWGrJFiZ/yyC1aYWX3+uRezRyUHulXbmJjxbqiYEzLwgwYZ+W/2f0yd7owHUo J4PAiuT3h8uU3NBzCxoj2eGHicSCyvHT1uWWKELF+EY/iK1NKl048Fb3Rldlq0EvYooH w7GW9PBA7W+3AopLiuz1XwMcA8sOvtLF7vVi33Q5TU1EMYIYijUdEgrAc7DAK+UgnUjh ngCriAF26RlkFF33YLFlxehHr3xAc61tUnmqaO/oLINfCs2gnecqARYwrcAC/zWGnbXv 6s/A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SNnJh1QI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q25si1200720otg.128.2020.02.21.00.18.36; Fri, 21 Feb 2020 00:18:48 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=SNnJh1QI; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387748AbgBUIRz (ORCPT + 99 others); Fri, 21 Feb 2020 03:17:55 -0500 Received: from mail.kernel.org ([198.145.29.99]:55404 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387725AbgBUIRt (ORCPT ); Fri, 21 Feb 2020 03:17:49 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 0690024682; Fri, 21 Feb 2020 08:17:47 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1582273068; bh=HSfHtUdMFWc6CS5XaUONf1lMrkLQkHO5y1TvGHsvi9A=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=SNnJh1QIVBimDuRFg9IdL22ip7WTF3R3Gs3/jkowUFc3y9rjuHADyXJcH3dDa62B/ hC56MnN/88zfkxhnT2FhAJ3X8cM/AUznA+K9mAuZmfT1NjaOrZdDavSNRH/2r6GHjT fbkcgTnJ0HUfBaSUGVd2xfKq1p/c3KikJGdC7FXQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Siddhesh Poyarekar , Masami Hiramatsu , Tim Bird , Shuah Khan , Sasha Levin Subject: [PATCH 4.19 035/191] kselftest: Minimise dependency of get_size on C library interfaces Date: Fri, 21 Feb 2020 08:40:08 +0100 Message-Id: <20200221072255.747648602@linuxfoundation.org> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20200221072250.732482588@linuxfoundation.org> References: <20200221072250.732482588@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Siddhesh Poyarekar [ Upstream commit 6b64a650f0b2ae3940698f401732988699eecf7a ] It was observed[1] on arm64 that __builtin_strlen led to an infinite loop in the get_size selftest. This is because __builtin_strlen (and other builtins) may sometimes result in a call to the C library function. The C library implementation of strlen uses an IFUNC resolver to load the most efficient strlen implementation for the underlying machine and hence has a PLT indirection even for static binaries. Because this binary avoids the C library startup routines, the PLT initialization never happens and hence the program gets stuck in an infinite loop. On x86_64 the __builtin_strlen just happens to expand inline and avoid the call but that is not always guaranteed. Further, while testing on x86_64 (Fedora 31), it was observed that the test also failed with a segfault inside write() because the generated code for the write function in glibc seems to access TLS before the syscall (probably due to the cancellation point check) and fails because TLS is not initialised. To mitigate these problems, this patch reduces the interface with the C library to just the syscall function. The syscall function still sets errno on failure, which is undesirable but for now it only affects cases where syscalls fail. [1] https://bugs.linaro.org/show_bug.cgi?id=5479 Signed-off-by: Siddhesh Poyarekar Reported-by: Masami Hiramatsu Tested-by: Masami Hiramatsu Reviewed-by: Tim Bird Signed-off-by: Shuah Khan Signed-off-by: Sasha Levin --- tools/testing/selftests/size/get_size.c | 24 ++++++++++++++++++------ 1 file changed, 18 insertions(+), 6 deletions(-) diff --git a/tools/testing/selftests/size/get_size.c b/tools/testing/selftests/size/get_size.c index d4b59ab979a09..f55943b6d1e2a 100644 --- a/tools/testing/selftests/size/get_size.c +++ b/tools/testing/selftests/size/get_size.c @@ -12,23 +12,35 @@ * own execution. It also attempts to have as few dependencies * on kernel features as possible. * - * It should be statically linked, with startup libs avoided. - * It uses no library calls, and only the following 3 syscalls: + * It should be statically linked, with startup libs avoided. It uses + * no library calls except the syscall() function for the following 3 + * syscalls: * sysinfo(), write(), and _exit() * * For output, it avoids printf (which in some C libraries * has large external dependencies) by implementing it's own * number output and print routines, and using __builtin_strlen() + * + * The test may crash if any of the above syscalls fails because in some + * libc implementations (e.g. the GNU C Library) errno is saved in + * thread-local storage, which does not get initialized due to avoiding + * startup libs. */ #include #include +#include #define STDOUT_FILENO 1 static int print(const char *s) { - return write(STDOUT_FILENO, s, __builtin_strlen(s)); + size_t len = 0; + + while (s[len] != '\0') + len++; + + return syscall(SYS_write, STDOUT_FILENO, s, len); } static inline char *num_to_str(unsigned long num, char *buf, int len) @@ -80,12 +92,12 @@ void _start(void) print("TAP version 13\n"); print("# Testing system size.\n"); - ccode = sysinfo(&info); + ccode = syscall(SYS_sysinfo, &info); if (ccode < 0) { print("not ok 1"); print(test_name); print(" ---\n reason: \"could not get sysinfo\"\n ...\n"); - _exit(ccode); + syscall(SYS_exit, ccode); } print("ok 1"); print(test_name); @@ -101,5 +113,5 @@ void _start(void) print(" ...\n"); print("1..1\n"); - _exit(0); + syscall(SYS_exit, 0); } -- 2.20.1