Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp1594867imm; Wed, 6 Jun 2018 19:42:57 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIE6jUy7B4euTmUFrvyQZvEQBrVLJ2eTUTYVHAUEhwjIBjv0KBTifvMPJFg73t+PgGzOOjk X-Received: by 2002:a17:902:8341:: with SMTP id z1-v6mr64646pln.40.1528339377831; Wed, 06 Jun 2018 19:42:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528339377; cv=none; d=google.com; s=arc-20160816; b=FQ36f07swhe5JVuWhqLhw2FpqJnO/Ba3eeKdy8Y1KgZPJZel4NtKp7Z0mKeJsRq80V qpaFWq0RzyYm8MT4qk2RGoTJG4tyZbodgEQjrOTS5c/F5mcE6L/mgF6MnfZIQwCyTf+l LNK0R/X/+qC3eTiClSXnKS3i1NdxZWzUHu6M52tlAQUe659V3b4/NF32DwKhCcN1tIKW fnUsX48xFBJElCAY5Z2168JOxIfMGt1mg6xk+RvNu19MMIZfJPKUB+9imgGE9sDtKG5G WycH5k6udR2al/eugta1Xh8oHWSbCtyIptPmrgu3zDddonrhe0Gc6flUv2/kX1sXw9oZ 41tQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:in-reply-to :mime-version:user-agent:date:message-id:from:cc:references:to :subject:arc-authentication-results; bh=HIZToXyQ8QRhj0Rb57WXh7094+dNco4hOZ3HkZuN3e0=; b=RVgYlsTNLQ4O3DSEX7pWk5I1N8hmwV/2fyl2Ya8TBFkqcK0kI31Rs7f/yIYiN5BW1z 8yVn3KIffEVfqsGqPV3YDQ8zzNk+bdkyznokwbBObvzqtp7dfCS9cU6RltMzUvicEj4I Vi694/j28FazIZPTJkJun1Q2yRhFAOxHBXwm0qb33q9CSjl3NDESPDJ9N1qrot9Jfb69 w/tW8nCp5Wnsgo+qyImDH1LFjWoGb2MdI+9sEkBVzQfwQWiP29jNaRytdWIbxTWWN55C bcn2kOWvAMOJtPSVvCEzt6KdekEK2o732pjdx+bN450ji8fJEsK6JwWDwD8g42LG2Sha lOxA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a11-v6si8822164plp.108.2018.06.06.19.42.43; Wed, 06 Jun 2018 19:42:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932773AbeFGCGM (ORCPT + 99 others); Wed, 6 Jun 2018 22:06:12 -0400 Received: from szxga04-in.huawei.com ([45.249.212.190]:8650 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932444AbeFGCGK (ORCPT ); Wed, 6 Jun 2018 22:06:10 -0400 Received: from DGGEMS407-HUB.china.huawei.com (unknown [172.30.72.59]) by Forcepoint Email with ESMTP id A1DEFE4B839E7; Thu, 7 Jun 2018 10:05:55 +0800 (CST) Received: from [127.0.0.1] (10.177.23.164) by DGGEMS407-HUB.china.huawei.com (10.3.19.207) with Microsoft SMTP Server id 14.3.382.0; Thu, 7 Jun 2018 10:05:51 +0800 Subject: Re: Is this a kernel BUG? ///Re: [Question] Can we use SIGRTMIN when vdso disabled on X86? To: Andy Lutomirski References: <5B1672FE.4050705@huawei.com> <5B1792C9.8010203@huawei.com> <5B17A6B6.70300@huawei.com> CC: Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , X86 ML , Dominik Brodowski , LKML , From: "Leizhen (ThunderTown)" Message-ID: <5B1892F5.9000206@huawei.com> Date: Thu, 7 Jun 2018 10:05:41 +0800 User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:38.0) Gecko/20100101 Thunderbird/38.5.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.177.23.164] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2018/6/7 1:01, Andy Lutomirski wrote: > On Wed, Jun 6, 2018 at 2:18 AM Leizhen (ThunderTown) > wrote: >> >> I found that glibc has already dealt with this case. So this issue must have been met before, should it be maintained by libc/user? >> >> if (GLRO(dl_sysinfo_dso) == NULL) >> { >> kact.sa_flags |= SA_RESTORER; >> >> kact.sa_restorer = ((act->sa_flags & SA_SIGINFO) >> ? &restore_rt : &restore); >> } >> >> >> On 2018/6/6 15:52, Leizhen (ThunderTown) wrote: >>> >>> >>> On 2018/6/5 19:24, Leizhen (ThunderTown) wrote: >>>> After I executed "echo 0 > /proc/sys/abi/vsyscall32" to disable vdso, the rt_sigaction01 test case from ltp_2015 failed. >>>> The test case source code please refer to the attachment, and the output as blow: >>>> >>>> ----------------- >>>> ./rt_sigaction01 >>>> rt_sigaction01 0 TINFO : signal: 34 >>>> rt_sigaction01 1 TPASS : rt_sigaction call succeeded: result = 0 >>>> rt_sigaction01 0 TINFO : sa.sa_flags = SA_RESETHAND|SA_SIGINFO >>>> rt_sigaction01 0 TINFO : Signal Handler Called with signal number 34 >>>> >>>> Segmentation fault >>>> ------------------ >>>> >>>> >>>> Is this the desired result? In function ia32_setup_rt_frame, I found below code: >>>> >>>> if (ksig->ka.sa.sa_flags & SA_RESTORER) >>>> restorer = ksig->ka.sa.sa_restorer; >>>> else >>>> restorer = current->mm->context.vdso + >>>> vdso_image_32.sym___kernel_rt_sigreturn; >>>> put_user_ex(ptr_to_compat(restorer), &frame->pretcode); >>>> >>>> Because the vdso is disabled, so current->mm->context.vdso is NULL, which cause the result of frame->pretcode invalid. >>>> >>>> I'm not sure whether this is a kernel bug or just an error of test case itself. Can anyone help me? >>>> >>> >> >> > > I can't tell from your email what you're testing, what behavior you > expect, and what you saw. A program that sets up a signal handler > without supplying a restorer will not work if the vDSO is off, and > this is by design. OK, so that the user should take care whether the vDSO is disabled by itself or not, and use different strategies to process it appropriately, like glibc. > > (FWIW, there is a very longstanding libc bug that causes this case to > get severely screwed up if the user's SS is not the expected value, > and that bug was just fixed very recently. But I doubt this is what > you're seeing.) > > I suppose we could improve the kernel to at least push NULL instead of > some random address a bit above 0, but it'll still crash. Should we add a warning? Which may help the user to aware this error in time. > > . > -- Thanks! BestRegards