Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp974354pxb; Wed, 6 Apr 2022 05:46:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJydswGN/Ih3yf1OCj97qNlPbLWeF0Vue2tEat/yNkjOsU4oWNOGnHedbGGSOzSSCnA0/soV X-Received: by 2002:a17:902:f64f:b0:156:f1cc:b284 with SMTP id m15-20020a170902f64f00b00156f1ccb284mr1211694plg.147.1649249211059; Wed, 06 Apr 2022 05:46:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649249211; cv=none; d=google.com; s=arc-20160816; b=SBl+qak4T7Qde3qikKkSR5D06WUv4NJ1kHEi/E8P708FelF9L71CRv6nSxZnckOZrZ G1K3d9otMmd+GEiXF2I447P3iQm7kv67oRSxMDtHRsTHu2EoS9EcsKQ6tDwuFbrxXOjT mbTUdcz3yTTAqSkEelZX959lTDyffJ6oK6POWPX3re7oWzQ71Ipgewx9hR3HqgHH2nB7 j0V/e/d8Tjw1JXMCkMlCzHuEAgSSMqaiFvqln9x75M9eHGywLZhG92qK0h/ZPwcV3NTl jeu6KcXURogZVmvJNQfJsjj4uK17gCo8xnlUzrCFT/wakJRc1rKa72zFgQrWiXqXzgxn 1Izw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=9SUjbR6d0Hm/+GiUujjBnx6+L5jTOpdyMzjgCeWVv18=; b=nL3qqnHHBAp4DKgpgG0frVPN+JpD0bAdda93RvT21SGeTY9NjD/YyF5px4GH1CbZI5 k2reNtGdlN5zmTkeVWwapDZF/5AyxGE7qAjflNqAfvVTGPw69gB/gjUo1JiaHvNR3fdr VarEOvgGt43UPUjhac1OCLV9XaIF3r2zexE7jdwzMFgfdTtn7MMuNoiwaM05Z0E1uNMZ m8cjp0DiCRvNRuBUcXDaLAcqPPmyGCjAy2F57OZz3lFI+lQxSYoHZuqSOtgezGHAcvrM HvljE+MasSNaX6b9XJyeOG32IV4WOHxkmV/Asnm4MRKn/aAXKFP0sT6avTHa5CykC84g MDNw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=sY8UN9C1; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id c2-20020a170903234200b00155c657775asi5086509plh.32.2022.04.06.05.46.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 06 Apr 2022 05:46:51 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=sY8UN9C1; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id BFB895CEE16; Wed, 6 Apr 2022 02:31:16 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1388617AbiDEVzU (ORCPT + 99 others); Tue, 5 Apr 2022 17:55:20 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54002 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1384799AbiDEPPG (ORCPT ); Tue, 5 Apr 2022 11:15:06 -0400 Received: from mail-oa1-x29.google.com (mail-oa1-x29.google.com [IPv6:2001:4860:4864:20::29]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0968A41327 for ; Tue, 5 Apr 2022 06:30:38 -0700 (PDT) Received: by mail-oa1-x29.google.com with SMTP id 586e51a60fabf-de3eda6b5dso14441695fac.0 for ; Tue, 05 Apr 2022 06:30:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=9SUjbR6d0Hm/+GiUujjBnx6+L5jTOpdyMzjgCeWVv18=; b=sY8UN9C1PHBoH0LvzHXIFdwX6MKoA35gbLCAShSgRkAbp8iWftwgDax7e93W769u1e 5X9YZGkOkmmAlD6LaJg70ZOrpL2jAQA473qlyP6Cgh+uH5VJpUMbGJtJ0FVxyDL7ARzV lLD6TuoG/w//kxV2eLSYgVy56lG6gwfD696nmdNK0W/nDySoM8GedVz7GrRDUsDDnvoM QeOB6se/YnanV8WDchwRKkwez2IjGwtnsaHcBG/AkXC+luyHDLzKPtuyHgybXQNk+7Ra 1tHz3b53Sn6tZlSfRcftDFTKqdhnbtWU9fwymXdFbZxLoXFdPVx25nY85Wwp9mfOLKq1 +v6Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=9SUjbR6d0Hm/+GiUujjBnx6+L5jTOpdyMzjgCeWVv18=; b=giko5oF0SEnXCiXNtWYY8iSwwm1sWs4nryh5ht7oKLfrMVEeMvs5Wswd8Ei4kvI/iy iV5cQaAsdKnyvEAgm9XTXXEYJiLbvdyJeF45FPTOiKAsFLVi1DbDCwIW+XqHXhBWR9iL K8G3BR0j44D7PUB3aPjSkqPgPOg72j8p8Vgq1TwLDYvm0HEKBIVdhfZFmZwF+h4vhydj lXELqxknSsOBRDO6Gb4k2IX9gilBLi0WS7/6c7rIvPrKbmLyp0SyywkyMYQWZfe395Pk oFan9IVYwseKZ+n9seFZAjke/1APJM4bdvz6aECwigiqG7qchUFL8t6248VVuV0M+uQa FdWw== X-Gm-Message-State: AOAM531iwiogZNSHAVfOa92yOPrMe2mHT/Ik+DUL9Xzt+Q8tzUgDP6+D KPfPkJEyijYQdMCSgxqZ4L56Hj6bjmO1Rkihy9BtgdCvBkCV32sz X-Received: by 2002:a05:6870:e0d1:b0:e2:1c3b:cca2 with SMTP id a17-20020a056870e0d100b000e21c3bcca2mr1459916oab.163.1649165437660; Tue, 05 Apr 2022 06:30:37 -0700 (PDT) MIME-Version: 1.0 References: <20220404111204.935357-1-elver@google.com> In-Reply-To: <20220404111204.935357-1-elver@google.com> From: Dmitry Vyukov Date: Tue, 5 Apr 2022 15:30:26 +0200 Message-ID: Subject: Re: [PATCH] signal: Deliver SIGTRAP on perf event asynchronously if blocked To: Marco Elver Cc: Peter Zijlstra , "Eric W. Biederman" , Thomas Gleixner , Ingo Molnar , x86@kernel.org, linux-arm-kernel@lists.infradead.org, linux-m68k@lists.linux-m68k.org, sparclinux@vger.kernel.org, linux-arch@vger.kernel.org, linux-perf-users@vger.kernel.org, kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.5 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE, USER_IN_DEF_DKIM_WL autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 4 Apr 2022 at 13:12, Marco Elver wrote: > > With SIGTRAP on perf events, we have encountered termination of > processes due to user space attempting to block delivery of SIGTRAP. > Consider this case: > > > ... > sigset_t s; > sigemptyset(&s); > sigaddset(&s, SIGTRAP | ); > sigprocmask(SIG_BLOCK, &s, ...); > ... > > > When the perf event triggers, while SIGTRAP is blocked, force_sig_perf() > will force the signal, but revert back to the default handler, thus > terminating the task. > > This makes sense for error conditions, but not so much for explicitly > requested monitoring. However, the expectation is still that signals > generated by perf events are synchronous, which will no longer be the > case if the signal is blocked and delivered later. > > To give user space the ability to clearly distinguish synchronous from > asynchronous signals, introduce siginfo_t::si_perf_flags and > TRAP_PERF_FLAG_ASYNC (opted for flags in case more binary information is > required in future). > > The resolution to the problem is then to (a) no longer force the signal > (avoiding the terminations), but (b) tell user space via si_perf_flags > if the signal was synchronous or not, so that such signals can be > handled differently (e.g. let user space decide to ignore or consider > the data imprecise). > > The alternative of making the kernel ignore SIGTRAP on perf events if > the signal is blocked may work for some usecases, but likely causes > issues in others that then have to revert back to interception of > sigprocmask() (which we want to avoid). [ A concrete example: when using > breakpoint perf events to track data-flow, in a region of code where > signals are blocked, data-flow can no longer be tracked accurately. > When a relevant asynchronous signal is received after unblocking the > signal, the data-flow tracking logic needs to know its state is > imprecise. ] > > Link: https://lore.kernel.org/all/Yjmn%2FkVblV3TdoAq@elver.google.com/ > Fixes: 97ba62b27867 ("perf: Add support for SIGTRAP on perf events") > Reported-by: Dmitry Vyukov > Signed-off-by: Marco Elver Tested-by: Dmitry Vyukov I've tested delivery of SIGTRAPs when it's blocked with sigprocmask, it does not kill the process now. And tested the case where previously I was getting infinite recursion and stack overflow (SIGTRAP handler causes another SIGTRAP recursively before being able to detect recursion and return). With this patch it can be handled by blocking recursive SIGTRAPs (!SA_NODEFER). > --- > arch/arm/kernel/signal.c | 1 + > arch/arm64/kernel/signal.c | 1 + > arch/arm64/kernel/signal32.c | 1 + > arch/m68k/kernel/signal.c | 1 + > arch/sparc/kernel/signal32.c | 1 + > arch/sparc/kernel/signal_64.c | 1 + > arch/x86/kernel/signal_compat.c | 2 ++ > include/linux/compat.h | 1 + > include/linux/sched/signal.h | 2 +- > include/uapi/asm-generic/siginfo.h | 7 +++++++ > kernel/events/core.c | 4 ++-- > kernel/signal.c | 18 ++++++++++++++++-- > 12 files changed, 35 insertions(+), 5 deletions(-) > > diff --git a/arch/arm/kernel/signal.c b/arch/arm/kernel/signal.c > index 459abc5d1819..ea128e32e8ca 100644 > --- a/arch/arm/kernel/signal.c > +++ b/arch/arm/kernel/signal.c > @@ -708,6 +708,7 @@ static_assert(offsetof(siginfo_t, si_upper) == 0x18); > static_assert(offsetof(siginfo_t, si_pkey) == 0x14); > static_assert(offsetof(siginfo_t, si_perf_data) == 0x10); > static_assert(offsetof(siginfo_t, si_perf_type) == 0x14); > +static_assert(offsetof(siginfo_t, si_perf_flags) == 0x18); > static_assert(offsetof(siginfo_t, si_band) == 0x0c); > static_assert(offsetof(siginfo_t, si_fd) == 0x10); > static_assert(offsetof(siginfo_t, si_call_addr) == 0x0c); > diff --git a/arch/arm64/kernel/signal.c b/arch/arm64/kernel/signal.c > index 4a4122ef6f39..41b5d9d3672a 100644 > --- a/arch/arm64/kernel/signal.c > +++ b/arch/arm64/kernel/signal.c > @@ -1011,6 +1011,7 @@ static_assert(offsetof(siginfo_t, si_upper) == 0x28); > static_assert(offsetof(siginfo_t, si_pkey) == 0x20); > static_assert(offsetof(siginfo_t, si_perf_data) == 0x18); > static_assert(offsetof(siginfo_t, si_perf_type) == 0x20); > +static_assert(offsetof(siginfo_t, si_perf_flags) == 0x24); > static_assert(offsetof(siginfo_t, si_band) == 0x10); > static_assert(offsetof(siginfo_t, si_fd) == 0x18); > static_assert(offsetof(siginfo_t, si_call_addr) == 0x10); > diff --git a/arch/arm64/kernel/signal32.c b/arch/arm64/kernel/signal32.c > index d984282b979f..4700f8522d27 100644 > --- a/arch/arm64/kernel/signal32.c > +++ b/arch/arm64/kernel/signal32.c > @@ -487,6 +487,7 @@ static_assert(offsetof(compat_siginfo_t, si_upper) == 0x18); > static_assert(offsetof(compat_siginfo_t, si_pkey) == 0x14); > static_assert(offsetof(compat_siginfo_t, si_perf_data) == 0x10); > static_assert(offsetof(compat_siginfo_t, si_perf_type) == 0x14); > +static_assert(offsetof(compat_siginfo_t, si_perf_flags) == 0x18); > static_assert(offsetof(compat_siginfo_t, si_band) == 0x0c); > static_assert(offsetof(compat_siginfo_t, si_fd) == 0x10); > static_assert(offsetof(compat_siginfo_t, si_call_addr) == 0x0c); > diff --git a/arch/m68k/kernel/signal.c b/arch/m68k/kernel/signal.c > index 49533f65958a..b9f6908a31bc 100644 > --- a/arch/m68k/kernel/signal.c > +++ b/arch/m68k/kernel/signal.c > @@ -625,6 +625,7 @@ static inline void siginfo_build_tests(void) > /* _sigfault._perf */ > BUILD_BUG_ON(offsetof(siginfo_t, si_perf_data) != 0x10); > BUILD_BUG_ON(offsetof(siginfo_t, si_perf_type) != 0x14); > + BUILD_BUG_ON(offsetof(siginfo_t, si_perf_flags) != 0x18); > > /* _sigpoll */ > BUILD_BUG_ON(offsetof(siginfo_t, si_band) != 0x0c); > diff --git a/arch/sparc/kernel/signal32.c b/arch/sparc/kernel/signal32.c > index f9fe502b81c6..dad38960d1a8 100644 > --- a/arch/sparc/kernel/signal32.c > +++ b/arch/sparc/kernel/signal32.c > @@ -779,5 +779,6 @@ static_assert(offsetof(compat_siginfo_t, si_upper) == 0x18); > static_assert(offsetof(compat_siginfo_t, si_pkey) == 0x14); > static_assert(offsetof(compat_siginfo_t, si_perf_data) == 0x10); > static_assert(offsetof(compat_siginfo_t, si_perf_type) == 0x14); > +static_assert(offsetof(compat_siginfo_t, si_perf_flags) == 0x18); > static_assert(offsetof(compat_siginfo_t, si_band) == 0x0c); > static_assert(offsetof(compat_siginfo_t, si_fd) == 0x10); > diff --git a/arch/sparc/kernel/signal_64.c b/arch/sparc/kernel/signal_64.c > index 8b9fc76cd3e0..570e43e6fda5 100644 > --- a/arch/sparc/kernel/signal_64.c > +++ b/arch/sparc/kernel/signal_64.c > @@ -590,5 +590,6 @@ static_assert(offsetof(siginfo_t, si_upper) == 0x28); > static_assert(offsetof(siginfo_t, si_pkey) == 0x20); > static_assert(offsetof(siginfo_t, si_perf_data) == 0x18); > static_assert(offsetof(siginfo_t, si_perf_type) == 0x20); > +static_assert(offsetof(siginfo_t, si_perf_flags) == 0x24); > static_assert(offsetof(siginfo_t, si_band) == 0x10); > static_assert(offsetof(siginfo_t, si_fd) == 0x14); > diff --git a/arch/x86/kernel/signal_compat.c b/arch/x86/kernel/signal_compat.c > index b52407c56000..879ef8c72f5c 100644 > --- a/arch/x86/kernel/signal_compat.c > +++ b/arch/x86/kernel/signal_compat.c > @@ -149,8 +149,10 @@ static inline void signal_compat_build_tests(void) > > BUILD_BUG_ON(offsetof(siginfo_t, si_perf_data) != 0x18); > BUILD_BUG_ON(offsetof(siginfo_t, si_perf_type) != 0x20); > + BUILD_BUG_ON(offsetof(siginfo_t, si_perf_flags) != 0x24); > BUILD_BUG_ON(offsetof(compat_siginfo_t, si_perf_data) != 0x10); > BUILD_BUG_ON(offsetof(compat_siginfo_t, si_perf_type) != 0x14); > + BUILD_BUG_ON(offsetof(compat_siginfo_t, si_perf_flags) != 0x18); > > CHECK_CSI_OFFSET(_sigpoll); > CHECK_CSI_SIZE (_sigpoll, 2*sizeof(int)); > diff --git a/include/linux/compat.h b/include/linux/compat.h > index 1c758b0e0359..01fddf72a81f 100644 > --- a/include/linux/compat.h > +++ b/include/linux/compat.h > @@ -235,6 +235,7 @@ typedef struct compat_siginfo { > struct { > compat_ulong_t _data; > u32 _type; > + u32 _flags; > } _perf; > }; > } _sigfault; > diff --git a/include/linux/sched/signal.h b/include/linux/sched/signal.h > index 3c8b34876744..bab7cc56b13a 100644 > --- a/include/linux/sched/signal.h > +++ b/include/linux/sched/signal.h > @@ -320,7 +320,7 @@ int send_sig_mceerr(int code, void __user *, short, struct task_struct *); > > int force_sig_bnderr(void __user *addr, void __user *lower, void __user *upper); > int force_sig_pkuerr(void __user *addr, u32 pkey); > -int force_sig_perf(void __user *addr, u32 type, u64 sig_data); > +int send_sig_perf(void __user *addr, u32 type, u64 sig_data); > > int force_sig_ptrace_errno_trap(int errno, void __user *addr); > int force_sig_fault_trapno(int sig, int code, void __user *addr, int trapno); > diff --git a/include/uapi/asm-generic/siginfo.h b/include/uapi/asm-generic/siginfo.h > index 3ba180f550d7..ffbe4cec9f32 100644 > --- a/include/uapi/asm-generic/siginfo.h > +++ b/include/uapi/asm-generic/siginfo.h > @@ -99,6 +99,7 @@ union __sifields { > struct { > unsigned long _data; > __u32 _type; > + __u32 _flags; > } _perf; > }; > } _sigfault; > @@ -164,6 +165,7 @@ typedef struct siginfo { > #define si_pkey _sifields._sigfault._addr_pkey._pkey > #define si_perf_data _sifields._sigfault._perf._data > #define si_perf_type _sifields._sigfault._perf._type > +#define si_perf_flags _sifields._sigfault._perf._flags > #define si_band _sifields._sigpoll._band > #define si_fd _sifields._sigpoll._fd > #define si_call_addr _sifields._sigsys._call_addr > @@ -270,6 +272,11 @@ typedef struct siginfo { > * that are of the form: ((PTRACE_EVENT_XXX << 8) | SIGTRAP) > */ > > +/* > + * Flags for si_perf_flags if SIGTRAP si_code is TRAP_PERF. > + */ > +#define TRAP_PERF_FLAG_ASYNC (1u << 0) > + > /* > * SIGCHLD si_codes > */ > diff --git a/kernel/events/core.c b/kernel/events/core.c > index cfde994ce61c..6eafb1b0ad4a 100644 > --- a/kernel/events/core.c > +++ b/kernel/events/core.c > @@ -6533,8 +6533,8 @@ static void perf_sigtrap(struct perf_event *event) > if (current->flags & PF_EXITING) > return; > > - force_sig_perf((void __user *)event->pending_addr, > - event->attr.type, event->attr.sig_data); > + send_sig_perf((void __user *)event->pending_addr, > + event->attr.type, event->attr.sig_data); > } > > static void perf_pending_event_disable(struct perf_event *event) > diff --git a/kernel/signal.c b/kernel/signal.c > index 30cd1ca43bcd..e43bc2a692f5 100644 > --- a/kernel/signal.c > +++ b/kernel/signal.c > @@ -1805,7 +1805,7 @@ int force_sig_pkuerr(void __user *addr, u32 pkey) > } > #endif > > -int force_sig_perf(void __user *addr, u32 type, u64 sig_data) > +int send_sig_perf(void __user *addr, u32 type, u64 sig_data) > { > struct kernel_siginfo info; > > @@ -1817,7 +1817,18 @@ int force_sig_perf(void __user *addr, u32 type, u64 sig_data) > info.si_perf_data = sig_data; > info.si_perf_type = type; > > - return force_sig_info(&info); > + /* > + * Signals generated by perf events should not terminate the whole > + * process if SIGTRAP is blocked, however, delivering the signal > + * asynchronously is better than not delivering at all. But tell user > + * space if the signal was asynchronous, so it can clearly be > + * distinguished from normal synchronous ones. > + */ > + info.si_perf_flags = sigismember(¤t->blocked, info.si_signo) ? > + TRAP_PERF_FLAG_ASYNC : > + 0; > + > + return send_sig_info(info.si_signo, &info, current); > } > > /** > @@ -3432,6 +3443,7 @@ void copy_siginfo_to_external32(struct compat_siginfo *to, > to->si_addr = ptr_to_compat(from->si_addr); > to->si_perf_data = from->si_perf_data; > to->si_perf_type = from->si_perf_type; > + to->si_perf_flags = from->si_perf_flags; > break; > case SIL_CHLD: > to->si_pid = from->si_pid; > @@ -3509,6 +3521,7 @@ static int post_copy_siginfo_from_user32(kernel_siginfo_t *to, > to->si_addr = compat_ptr(from->si_addr); > to->si_perf_data = from->si_perf_data; > to->si_perf_type = from->si_perf_type; > + to->si_perf_flags = from->si_perf_flags; > break; > case SIL_CHLD: > to->si_pid = from->si_pid; > @@ -4722,6 +4735,7 @@ static inline void siginfo_buildtime_checks(void) > CHECK_OFFSET(si_pkey); > CHECK_OFFSET(si_perf_data); > CHECK_OFFSET(si_perf_type); > + CHECK_OFFSET(si_perf_flags); > > /* sigpoll */ > CHECK_OFFSET(si_band); > -- > 2.35.1.1094.g7c7d902a7c-goog >