Received: by 2002:ab2:6309:0:b0:1fb:d597:ff75 with SMTP id s9csp1003023lqt; Fri, 7 Jun 2024 05:33:49 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCU6S3q7TH5czHo1Cb5VkK4gTqL/ez2mapAMvYhuZT3A+xpNpoCuih0D82ay/LbsKX0fElcrJINEdA5PVZCH+P1yZAj1kIBBTwfEaYQttw== X-Google-Smtp-Source: AGHT+IEYD/ltZlI/zi3eVRLTV8wjbPBRMQTNJIKrwthP5JXBFVP9lr4nqXEreqs+pvPh2yIR2l5k X-Received: by 2002:a17:902:ce85:b0:1f6:a43f:5b38 with SMTP id d9443c01a7336-1f6d02d6523mr28550835ad.4.1717763629256; Fri, 07 Jun 2024 05:33:49 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1717763629; cv=pass; d=google.com; s=arc-20160816; b=zJhGHCnCgWzyyse3mdpIpaqTEb0DSjzmwjsRKcrs7vdizaokVB1qecKSZS/m1mTpog wqy3DVZv2aLHZLojfrOuPbH4NqItULpcHtWIcpe/eUwRPqBEfLL2r8DhnBDmZu1YW4hm avVdEnFhlmpgaPEfUwP+4csZT0L1ENhI/eOBtYDTatAyvAPB+Y4KsuXpoGhMrXQ+ARvb OeCqdtdCUKUEGGd0aWe4aER2qHQn3egNoHTpu1CeA+6ZzAq1jhUD5dNyW07T5s2jLneY AY5Lou+yS2cxCS+BccQJn3+b32XFWqo2OftmxluurgqRRoRlRN0D2vrmzEWq2lC6KxlW e+2A== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from; bh=oTzjlrOaR9WRdLKaqgwNm2zh02eFgFXXhwUM0b4vnK0=; fh=KsNH1AQ9ZoAuCAPBKsivkA9+TAl2XIT+wY07MoKO8EA=; b=VFUBGeTlysHoJm6TUntQ1336LC1kOTSyHJVRn3KbF5VVifDqDmY8wwc1cYhxMN1n5R I9vYIJFQwkOinaCxg+GJDQt7R71akxm9kWg96CdgxbYiEEMWZstgSHBDnuhTw28Jiqi9 1S5BPrj10VFuXvwTerw1+bNQ9tZFk10GQsat0xj4AEoLNBUCigzT88sxDp8QEOROnt/Q 5SizUvI1QqvhHAOeylrtj1FySQjSsuaAwxOwrTsM2h6v0uvCAoidi0hYcZ5qs6YpUlWc dUtFAzyO7IIgT1M0Q0679giP7a10+VsrPOx43XX9Kvb5ci0kkzpz2UaCuP6lx2JHP5Lc 5kDg==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-206023-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-206023-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from sy.mirrors.kernel.org (sy.mirrors.kernel.org. [2604:1380:40f1:3f00::1]) by mx.google.com with ESMTPS id d9443c01a7336-1f6bd7e5a6asi12370225ad.431.2024.06.07.05.33.48 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 07 Jun 2024 05:33:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-206023-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) client-ip=2604:1380:40f1:3f00::1; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=arm.com dmarc=pass fromdomain=arm.com); spf=pass (google.com: domain of linux-kernel+bounces-206023-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:40f1:3f00::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-206023-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sy.mirrors.kernel.org (Postfix) with ESMTPS id 05140B273DF for ; Fri, 7 Jun 2024 12:25:43 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 97405194C71; Fri, 7 Jun 2024 12:24:15 +0000 (UTC) Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by smtp.subspace.kernel.org (Postfix) with ESMTP id D4A1319413F; Fri, 7 Jun 2024 12:24:12 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.140.110.172 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717763055; cv=none; b=cH5BnirD5AMOAxNcAP2hW7ps5TZQFPhYTipkC4mf2zrisnwzAvOX1acDEbQNg6T2fcggWI0Qm6sjBdwqYiQyS8b8NHkBIPy/4gQcCLwIawTixKAS5JxvN3yywaQnxxZLBkX7+Z9GdZh0v0CJM1OaHUNZC8OT4fHEkuQTunZ9Ycg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1717763055; c=relaxed/simple; bh=7HSjd2l1CjzZySTcEULEOBYUlMeZ80EC0xjCH/SAcJw=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=upeQaUIO82EU6iuvN+vDNkwkq/Tl8/pDa37jGINEezQteKFnGaSX8M5N50tzOfOmMwJByFH4uuVUH7+qIxHdNEqN8Gb4fQtTKjM7LHsovHUO1caosAk+BAcyETYJeYD6ZW4pCaRUZkC4FvqbpDUENkV1j4cTTf1QOt8QOeAf678= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com; spf=pass smtp.mailfrom=arm.com; arc=none smtp.client-ip=217.140.110.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=arm.com Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9DBF02F4; Fri, 7 Jun 2024 05:24:36 -0700 (PDT) Received: from e116581.blr.arm.com (e116581.arm.com [10.162.42.8]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 3FE6D3F64C; Fri, 7 Jun 2024 05:24:07 -0700 (PDT) From: Dev Jain To: shuah@kernel.org, oleg@redhat.com, stsp2@yandex.ru Cc: mingo@kernel.org, tglx@linutronix.de, mark.rutland@arm.com, ryan.roberts@arm.com, broonie@kernel.org, suzuki.poulose@arm.com, Anshuman.Khandual@arm.com, DeepakKumar.Mishra@arm.com, AneeshKumar.KizhakeVeetil@arm.com, linux-kselftest@vger.kernel.org, linux-kernel@vger.kernel.org, Dev Jain Subject: [PATCH 0/2] Add test to distinguish between thread's signal mask and ucontext_t Date: Fri, 7 Jun 2024 17:53:17 +0530 Message-Id: <20240607122319.768640-1-dev.jain@arm.com> X-Mailer: git-send-email 2.34.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit This patch series is motivated by the following observation: Raise a signal, jump to signal handler. The ucontext_t structure dumped by kernel to userspace has a uc_sigmask field having the mask of blocked signals. If you run a fresh minimalistic program doing this, this field is empty, even if you block some signals while registering the handler with sigaction(). Here is what the man-pages have to say: sigaction(2): "sa_mask specifies a mask of signals which should be blocked (i.e., added to the signal mask of the thread in which the signal handler is invoked) during execution of the signal handler. In addition, the signal which triggered the handler will be blocked, unless the SA_NODEFER flag is used." signal(7): Under "Execution of signal handlers", (1.3) implies: "The thread's current signal mask is accessible via the ucontext_t object that is pointed to by the third argument of the signal handler." But, (1.4) states: "Any signals specified in act->sa_mask when registering the handler with sigprocmask(2) are added to the thread's signal mask. The signal being delivered is also added to the signal mask, unless SA_NODEFER was specified when registering the handler. These signals are thus blocked while the handler executes." There clearly is no distinction being made in the man pages between "Thread's signal mask" and ucontext_t; this logically should imply that a signal blocked by populating struct sigaction should be visible in ucontext_t. Here is what the kernel code does (for Aarch64): do_signal() -> handle_signal() -> sigmask_to_save(), which returns ¤t->blocked, is passed to setup_rt_frame() -> setup_sigframe() -> __copy_to_user(). Hence, ¤t->blocked is copied to ucontext_t exposed to userspace. Returning back to handle_signal(), signal_setup_done() -> signal_delivered() -> sigorsets() and set_current_blocked() are responsible for using information from struct ksignal ksig, which was populated through the sigaction() system call in kernel/signal.c: copy_from_user(&new_sa.sa, act, sizeof(new_sa.sa)), to update ¤t->blocked; hence, the set of blocked signals for the current thread is updated AFTER the kernel dumps ucontext_t to userspace. Assuming that the above is indeed the intended behaviour, because it semantically makes sense, since the signals blocked using sigaction() remain blocked only till the execution of the handler, and not in the context present before jumping to the handler (but nothing can be confirmed from the man-pages), the series introduces a test for mangling with uc_sigmask. I will send a separate series to fix the man-pages. The proposed selftest has been tested out on Aarch32, Aarch64 and x86_64. Dev Jain (2): selftests: Rename sigaltstack to generic signal selftests: Add a test mangling with uc_sigmask tools/testing/selftests/Makefile | 2 +- .../{sigaltstack => signal}/.gitignore | 3 +- .../{sigaltstack => signal}/Makefile | 3 +- .../current_stack_pointer.h | 0 .../selftests/signal/mangle_uc_sigmask.c | 141 ++++++++++++++++++ .../sas.c => signal/sigaltstack.c} | 0 6 files changed, 146 insertions(+), 3 deletions(-) rename tools/testing/selftests/{sigaltstack => signal}/.gitignore (57%) rename tools/testing/selftests/{sigaltstack => signal}/Makefile (53%) rename tools/testing/selftests/{sigaltstack => signal}/current_stack_pointer.h (100%) create mode 100644 tools/testing/selftests/signal/mangle_uc_sigmask.c rename tools/testing/selftests/{sigaltstack/sas.c => signal/sigaltstack.c} (100%) -- 2.34.1