From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=-3.3 required=5.0 tests=MAILING_LIST_MULTI, RCVD_IN_DNSWL_MED,RCVD_IN_MSPIKE_H3,RCVD_IN_MSPIKE_WL autolearn=ham autolearn_force=no version=3.4.4 Received: (qmail 16371 invoked from network); 19 Jan 2021 21:17:09 -0000 Received: from mother.openwall.net (195.42.179.200) by inbox.vuxu.org with ESMTPUTF8; 19 Jan 2021 21:17:09 -0000 Received: (qmail 32387 invoked by uid 550); 19 Jan 2021 21:17:07 -0000 Mailing-List: contact musl-help@lists.openwall.com; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-ID: Reply-To: musl@lists.openwall.com Received: (qmail 32364 invoked from network); 19 Jan 2021 21:17:06 -0000 Date: Tue, 19 Jan 2021 16:16:53 -0500 From: Rich Felker To: Rasmus Andersson Cc: musl@lists.openwall.com Message-ID: <20210119211653.GK23432@brightrain.aerifal.cx> References: <20210119193337.GB2006@voyager> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) Subject: Re: [musl] waitpid (wait4) on Linux 5 returns invalid values On Tue, Jan 19, 2021 at 12:35:26PM -0800, Rasmus Andersson wrote: > Relevant parts from disassembly: (objdump --disassemble --source > --line-numbers a.out) > > 0000000000401f61 <__syscall_cp_c>: > sccp(): > 401f61: 48 89 f8 mov %rdi,%rax > 401f64: 4d 89 c2 mov %r8,%r10 > 401f67: 48 89 f7 mov %rsi,%rdi > 401f6a: 4d 89 c8 mov %r9,%r8 > 401f6d: 48 89 d6 mov %rdx,%rsi > 401f70: 4c 8b 4c 24 08 mov 0x8(%rsp),%r9 > 401f75: 48 89 ca mov %rcx,%rdx > 401f78: 0f 05 syscall > 401f7a: c3 retq > > 0000000000401f7b <__syscall_cp>: > __syscall_cp(): > 401f7b: e9 e1 ff ff ff jmpq 401f61 <__syscall_cp_c> > > 00000000004004fd : > waitpid(): > ... > 40051a: e8 5c 1a 00 00 callq 401f7b <__syscall_cp> > 40051f: 48 83 c4 18 add $0x18,%rsp > 400523: c3 retq This disassembly shows a miscompiled (or compiled with wrong patches) waitpid. It should be a tail call to __syscall_ret, not a retq. Rich