Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp4990897rwl; Sun, 8 Jan 2023 06:52:04 -0800 (PST) X-Google-Smtp-Source: AMrXdXtg8PxUEg0ZXaFxrEBuv+jCXpYRaFP04qwztiogsWCPXqscrK4Tl14qswxxha7LKgn/uGYy X-Received: by 2002:a05:6402:2d9:b0:496:3f98:dbb7 with SMTP id b25-20020a05640202d900b004963f98dbb7mr7614846edx.14.1673189524326; Sun, 08 Jan 2023 06:52:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673189524; cv=none; d=google.com; s=arc-20160816; b=ljZi7UYn7tL1uUqXs8CZPbKU4k/0jMFXxLfY8o9ReHRWZDPmKlr6WctZ0ufgayvHZo AcjF2znkn5CYipGxY+8VsuZtxqOB3TAakFMhXpg4I727co5dnS+IDJ6u/n2znsbszlzg mxHNLSosviojMAXlDmkq2jdl83WyaGVQk+cC2Ctytp+kZPZbIdo3DF2aQFVRlUDUDDxX Hi9Kmdq1YCtaxUpL5E4sDNGKsv4dyy6CM4OZR+YFlnmPo+fBxHsf262Bcuu8j6b02Bz/ WyTQWnkpjYC/VU68dApqV95UAGpB2CQh+nUDQP2okzwy3tOcz6erZaOIHBOT9lk9ip0w 1e8w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=CfO1To2UVQGt8wetpYMeg7bJ2vZwP+PSkOIqmmGOVYw=; b=ZUErmGeaTUfCF9/GQZJUScKPLyqbJ4QmJ0/rOEfuQqpcUmLAaMebQ47pmW7Dx+Cvgz O0ceLIskIWfYBbbuYlX14mXSYclRqsUFQEgJJdOctMlmINzaW8WNk/a4Z2modM7xnR7X 6eG4iFDw+wzjEf4yuFb2bHaMjF/T6TwR9kJweQ7XXYj7MTYGT/yBrMIUXSWX9cMEtv83 y38nkBl+jBME5C6ywvAHZjqvUjeCzYvOU5lhOUnzHvXr3FgPMgnWlImwhkNL10xDvJzG LAbF/p0/HkYd+MZgqaDm3jCzCPy4hQIqDlcqXs0uJ3gBPq3/4uKNAaAtMDv/kFsh38X+ viDw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gnuweeb.org header.s=default header.b="UfYI0qI/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gnuweeb.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id em8-20020a056402364800b0048ec063ea63si6907261edb.396.2023.01.08.06.51.52; Sun, 08 Jan 2023 06:52:04 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gnuweeb.org header.s=default header.b="UfYI0qI/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=gnuweeb.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235078AbjAHN74 (ORCPT + 52 others); Sun, 8 Jan 2023 08:59:56 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51444 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235971AbjAHN7c (ORCPT ); Sun, 8 Jan 2023 08:59:32 -0500 Received: from gnuweeb.org (gnuweeb.org [51.81.211.47]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 72E1810041; Sun, 8 Jan 2023 05:59:24 -0800 (PST) Received: from localhost.localdomain (unknown [182.253.183.184]) by gnuweeb.org (Postfix) with ESMTPSA id 61A7E7E6F8; Sun, 8 Jan 2023 13:59:21 +0000 (UTC) X-GW-Data: lPqxHiMPbJw1wb7CM9QUryAGzr0yq5atzVDdxTR0iA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=gnuweeb.org; s=default; t=1673186364; bh=yxkyMaZ1H0PrseRu3i+/9FKOB8Exis+80uQ6H0Fm5qg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=UfYI0qI/Hv6/rzfnBOPQbObnn0svGsHTjPGSXcL2MIGo8vz0dFd1mvQHTjLQY/ern v0Mmua/RMr9WNJPy8f284BKO8bNbHXgbXB7TWqzAWJP02aBOel5qagXaYONwJi1YiN uqfFj4PN2Qm9tP4NbzCdI5rPQafvO90gJHDBECn2qBmVlBYHNaD5WwcKiJCxCZmQsh F1ei5RX26v09CwUVHuP1+/UiHLC6MN0zct5PJ7fhz4v7wYZOy+hnLVOxcOlnjQeM9h nS5zyVw7sj5l/Q9IK/3s+pXj98y4viMXTes7Zjfimw7UxFX6p0Wp8BaceDPmkZH6Ys OBVfhCJxpVwzA== From: Ammar Faizi To: Willy Tarreau Cc: Ammar Faizi , Shuah Khan , "Paul E. McKenney" , Gilang Fachrezy , Alviro Iskandar Setiawan , GNU/Weeb Mailing List , Linux Kernel Mailing List , Linux Kselftest Mailing List Subject: [PATCH v3 4/5] selftests/nolibc: Add `sigaction(2)` selftest Date: Sun, 8 Jan 2023 20:59:03 +0700 Message-Id: <20230108135904.851762-5-ammar.faizi@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20230108135904.851762-1-ammar.faizi@intel.com> References: <20230108135904.851762-1-ammar.faizi@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,SPF_HELO_PASS,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Ammar Faizi Test the sigaction() function implementation. Test steps: - Set a signal handler. - Then send a signal to itself using the kill() syscall. - The program has to survive and store the caught signal number in a volatile global variable. - Validate the volatile global variable value. - Restore the original signal handler. Signed-off-by: Ammar Faizi --- tools/testing/selftests/nolibc/nolibc-test.c | 73 ++++++++++++++++++++ 1 file changed, 73 insertions(+) diff --git a/tools/testing/selftests/nolibc/nolibc-test.c b/tools/testing/selftests/nolibc/nolibc-test.c index cb6ec9f71aae..c348c92d26f6 100644 --- a/tools/testing/selftests/nolibc/nolibc-test.c +++ b/tools/testing/selftests/nolibc/nolibc-test.c @@ -515,6 +515,78 @@ static int test_fork(void) return 0; } +static volatile int g_test_sig; + +static void test_signal_handler(int sig) +{ + g_test_sig = sig; +} + +static int test_sigaction_sig(int sig) +{ + const struct sigaction new = { + .sa_handler = test_signal_handler + }; + struct sigaction old; + int ret; + + /* + * Set the signal handler. + */ + ret = sigaction(sig, &new, &old); + if (ret) { + printf("test_sigaction_sig(%d): Failed to set a signal handler\n", sig); + return ret; + } + + /* + * Test the signal handler. + */ + g_test_sig = 0; + kill(getpid(), sig); + + /* + * test_signal_handler() must set @g_test_sig to @sig. + */ + if (g_test_sig != sig) { + printf("test_sigaction_sig(%d): Invalid g_test_sig value (%d != %d)\n", sig, g_test_sig, sig); + return -1; + } + + /* + * Restore the original signal handler. + */ + ret = sigaction(sig, &old, NULL); + if (ret) { + printf("test_sigaction_sig(%d): Failed to restore the signal handler\n", sig); + return ret; + } + + return 0; +} + +static const int g_sig_to_test[] = { + SIGINT, + SIGHUP, + SIGTERM, + SIGQUIT, + SIGSEGV +}; + +static int test_sigaction(void) +{ + size_t i; + int ret; + + for (i = 0; i < (sizeof(g_sig_to_test) / sizeof(g_sig_to_test[0])); i++) { + ret = test_sigaction_sig(g_sig_to_test[i]); + if (ret) + return ret; + } + + return 0; +} + /* Run syscall tests between IDs and . * Return 0 on success, non-zero on failure. */ @@ -596,6 +668,7 @@ int run_syscall(int min, int max) CASE_TEST(select_null); EXPECT_SYSZR(1, ({ struct timeval tv = { 0 }; select(0, NULL, NULL, NULL, &tv); })); break; CASE_TEST(select_stdout); EXPECT_SYSNE(1, ({ fd_set fds; FD_ZERO(&fds); FD_SET(1, &fds); select(2, NULL, &fds, NULL, NULL); }), -1); break; CASE_TEST(select_fault); EXPECT_SYSER(1, select(1, (void *)1, NULL, NULL, 0), -1, EFAULT); break; + CASE_TEST(sigaction); EXPECT_SYSZR(1, test_sigaction()); break; CASE_TEST(stat_blah); EXPECT_SYSER(1, stat("/proc/self/blah", &stat_buf), -1, ENOENT); break; CASE_TEST(stat_fault); EXPECT_SYSER(1, stat(NULL, &stat_buf), -1, EFAULT); break; CASE_TEST(symlink_root); EXPECT_SYSER(1, symlink("/", "/"), -1, EEXIST); break; -- Ammar Faizi