Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp1553847imm; Wed, 6 Jun 2018 18:46:36 -0700 (PDT) X-Google-Smtp-Source: ADUXVKLXbOA3/2nT/WoeWJNvG3M/Kxf0YUXouHmhbgzQCOSOLt58Bb8t3izhEDrB40scVsKVCYs6 X-Received: by 2002:a17:902:265:: with SMTP id 92-v6mr5433359plc.368.1528335996477; Wed, 06 Jun 2018 18:46:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528335996; cv=none; d=google.com; s=arc-20160816; b=sDdJut3qpyFZgWSxSpoH64LXADazXnoOaNMFhorpkixUzfw32rvpYYouWReWQhbPB5 tp84z08rQstBnqI001tnit5K3Ot+KOMDJFVx9jP3L+tkrNRo5tHLhDQBJj8hlmGtUYau UOtSIFxhkABWJ9fh/QPCNhvW/ZKcauWQAEybDkpyCrTC0smEFeEzPMPuKvG0C8JXebt1 P1BFcd19Tu3I5Iwcsoj0aokcE3K5pV4d7eXN2SAX+0/OPOTopZfIIk/LaaMFRH2Xuizv RYKWp0tLF2Kzi35RnQnyWb/q6RPLD0oFnU4RQ2DmBCyV9OF0JpvnXHNr2znrDz3z/LwN kNOA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:cc:references:to :subject:arc-authentication-results; bh=GlxobTfvaJ3gfggIqCBm+qdBKHdvZ5j7mO2BIOF4Lz8=; b=obMhQUMCEf4W3h2WWcEMdeIHwQ8r/21KARe79RQF4wkqp/EelQAynLaF1cXuWK1ZZn jlUoKFhcVWv0yU6ShOdbmCtC1ChGSZntulilXhQKFIGP0yBA+tSx6wP3seb6HfmoBRLp XBdoEPIR0QjU+SLy11VQqh+XsKY+zwmDXsC8dV2C20uynqGeBiv6I4zAKu9usxzyRJOq TRSoaCiYPW4RYmW2Kir31DqICTXMKEftWissZG9M1XCJXrg3qgyEO5HoEwWRXniOA3Bu PUGY/RMxTqgmBcX+3qQbWRTc38uFYhIHrtNyUt8UypyIIo4bJca2QeAkzygj9d0iwCD0 kxhw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a5-v6si4249687pgu.119.2018.06.06.18.46.22; Wed, 06 Jun 2018 18:46:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752943AbeFGBp5 (ORCPT + 99 others); Wed, 6 Jun 2018 21:45:57 -0400 Received: from szxga06-in.huawei.com ([45.249.212.32]:58974 "EHLO huawei.com" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1752344AbeFGBp4 (ORCPT ); Wed, 6 Jun 2018 21:45:56 -0400 Received: from DGGEMS408-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id 9FCF6B19E18B3; Thu, 7 Jun 2018 09:45:52 +0800 (CST) Received: from [127.0.0.1] (10.177.23.164) by DGGEMS408-HUB.china.huawei.com (10.3.19.208) with Microsoft SMTP Server id 14.3.382.0; Thu, 7 Jun 2018 09:45:45 +0800 Subject: Re: Is this a kernel BUG? ///Re: [Question] Can we use SIGRTMIN when vdso disabled on X86? To: , Thomas Gleixner , Ingo Molnar , x86l , Dominik Brodowski , Andy Lutomirski , linux-kernel References: <5B1672FE.4050705@huawei.com> <5B1792C9.8010203@huawei.com> <5B17A6B6.70300@huawei.com> CC: From: "Leizhen (ThunderTown)" Message-ID: <5B188E2B.7040700@huawei.com> Date: Thu, 7 Jun 2018 09:45:15 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.5.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.177.23.164] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2018/6/7 1:48, hpa@zytor.com wrote: > On June 6, 2018 2:17:42 AM PDT, "Leizhen (ThunderTown)" wrote: >> I found that glibc has already dealt with this case. So this issue must >> have been met before, should it be maintained by libc/user? >> >> if (GLRO(dl_sysinfo_dso) == NULL) >> { >> kact.sa_flags |= SA_RESTORER; >> >> kact.sa_restorer = ((act->sa_flags & SA_SIGINFO) >> ? &restore_rt : &restore); >> } >> >> >> On 2018/6/6 15:52, Leizhen (ThunderTown) wrote: >>> >>> >>> On 2018/6/5 19:24, Leizhen (ThunderTown) wrote: >>>> After I executed "echo 0 > /proc/sys/abi/vsyscall32" to disable >> vdso, the rt_sigaction01 test case from ltp_2015 failed. >>>> The test case source code please refer to the attachment, and the >> output as blow: >>>> >>>> ----------------- >>>> ./rt_sigaction01 >>>> rt_sigaction01 0 TINFO : signal: 34 >>>> rt_sigaction01 1 TPASS : rt_sigaction call succeeded: result = >> 0 >>>> rt_sigaction01 0 TINFO : sa.sa_flags = SA_RESETHAND|SA_SIGINFO >>>> rt_sigaction01 0 TINFO : Signal Handler Called with signal >> number 34 >>>> >>>> Segmentation fault >>>> ------------------ >>>> >>>> >>>> Is this the desired result? In function ia32_setup_rt_frame, I found >> below code: >>>> >>>> if (ksig->ka.sa.sa_flags & SA_RESTORER) >>>> restorer = ksig->ka.sa.sa_restorer; >>>> else >>>> restorer = current->mm->context.vdso + >>>> vdso_image_32.sym___kernel_rt_sigreturn; >>>> put_user_ex(ptr_to_compat(restorer), &frame->pretcode); >>>> >>>> Because the vdso is disabled, so current->mm->context.vdso is NULL, >> which cause the result of frame->pretcode invalid. >>>> >>>> I'm not sure whether this is a kernel bug or just an error of test >> case itself. Can anyone help me? >>>> >>> > > The use of signals without SA_RESTORER is considered obsolete, but it's somewhat surprising that the vdso isn't there; it should be mapped even for static binaries esp. on i386 since it is the preferred way to do system calls (you don't need to parse the ELF for that.) Are you explicitly disabling the VDSO? If so, Don't Do That. Yes, the vdso was explicitly disabled by the tester. Thanks. > -- Thanks! BestRegards