sigtrap.c 7.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289
  1. // SPDX-License-Identifier: GPL-2.0
  2. /*
  3. * Basic test for sigtrap support.
  4. *
  5. * Copyright (C) 2021, Google LLC.
  6. */
  7. #include <errno.h>
  8. #include <stdint.h>
  9. #include <stdlib.h>
  10. #include <linux/hw_breakpoint.h>
  11. #include <linux/string.h>
  12. #include <pthread.h>
  13. #include <signal.h>
  14. #include <sys/ioctl.h>
  15. #include <sys/syscall.h>
  16. #include <unistd.h>
  17. #include "cloexec.h"
  18. #include "debug.h"
  19. #include "event.h"
  20. #include "tests.h"
  21. #include "../perf-sys.h"
  22. #define NUM_THREADS 5
  23. static struct {
  24. int tids_want_signal; /* Which threads still want a signal. */
  25. int signal_count; /* Sanity check number of signals received. */
  26. volatile int iterate_on; /* Variable to set breakpoint on. */
  27. siginfo_t first_siginfo; /* First observed siginfo_t. */
  28. } ctx;
  29. #define TEST_SIG_DATA (~(unsigned long)(&ctx.iterate_on))
  30. static struct perf_event_attr make_event_attr(void)
  31. {
  32. struct perf_event_attr attr = {
  33. .type = PERF_TYPE_BREAKPOINT,
  34. .size = sizeof(attr),
  35. .sample_period = 1,
  36. .disabled = 1,
  37. .bp_addr = (unsigned long)&ctx.iterate_on,
  38. .bp_type = HW_BREAKPOINT_RW,
  39. .bp_len = HW_BREAKPOINT_LEN_1,
  40. .inherit = 1, /* Children inherit events ... */
  41. .inherit_thread = 1, /* ... but only cloned with CLONE_THREAD. */
  42. .remove_on_exec = 1, /* Required by sigtrap. */
  43. .sigtrap = 1, /* Request synchronous SIGTRAP on event. */
  44. .sig_data = TEST_SIG_DATA,
  45. .exclude_kernel = 1, /* To allow */
  46. .exclude_hv = 1, /* running as !root */
  47. };
  48. return attr;
  49. }
  50. #ifdef HAVE_BPF_SKEL
  51. #include <bpf/btf.h>
  52. static struct btf *btf;
  53. static bool btf__available(void)
  54. {
  55. if (btf == NULL)
  56. btf = btf__load_vmlinux_btf();
  57. return btf != NULL;
  58. }
  59. static void btf__exit(void)
  60. {
  61. btf__free(btf);
  62. btf = NULL;
  63. }
  64. static const struct btf_member *__btf_type__find_member_by_name(int type_id, const char *member_name)
  65. {
  66. const struct btf_type *t = btf__type_by_id(btf, type_id);
  67. const struct btf_member *m;
  68. int i;
  69. for (i = 0, m = btf_members(t); i < btf_vlen(t); i++, m++) {
  70. const char *current_member_name = btf__name_by_offset(btf, m->name_off);
  71. if (!strcmp(current_member_name, member_name))
  72. return m;
  73. }
  74. return NULL;
  75. }
  76. static bool attr_has_sigtrap(void)
  77. {
  78. int id;
  79. if (!btf__available()) {
  80. /* should be an old kernel */
  81. return false;
  82. }
  83. id = btf__find_by_name_kind(btf, "perf_event_attr", BTF_KIND_STRUCT);
  84. if (id < 0)
  85. return false;
  86. return __btf_type__find_member_by_name(id, "sigtrap") != NULL;
  87. }
  88. static bool kernel_with_sleepable_spinlocks(void)
  89. {
  90. const struct btf_member *member;
  91. const struct btf_type *type;
  92. const char *type_name;
  93. int id;
  94. if (!btf__available())
  95. return false;
  96. id = btf__find_by_name_kind(btf, "spinlock", BTF_KIND_STRUCT);
  97. if (id < 0)
  98. return false;
  99. // Only RT has a "lock" member for "struct spinlock"
  100. member = __btf_type__find_member_by_name(id, "lock");
  101. if (member == NULL)
  102. return false;
  103. // But check its type as well
  104. type = btf__type_by_id(btf, member->type);
  105. if (!type || !btf_is_struct(type))
  106. return false;
  107. type_name = btf__name_by_offset(btf, type->name_off);
  108. return type_name && !strcmp(type_name, "rt_mutex_base");
  109. }
  110. #else /* !HAVE_BPF_SKEL */
  111. static bool attr_has_sigtrap(void)
  112. {
  113. struct perf_event_attr attr = {
  114. .type = PERF_TYPE_SOFTWARE,
  115. .config = PERF_COUNT_SW_DUMMY,
  116. .size = sizeof(attr),
  117. .remove_on_exec = 1, /* Required by sigtrap. */
  118. .sigtrap = 1, /* Request synchronous SIGTRAP on event. */
  119. };
  120. int fd;
  121. bool ret = false;
  122. fd = sys_perf_event_open(&attr, 0, -1, -1, perf_event_open_cloexec_flag());
  123. if (fd >= 0) {
  124. ret = true;
  125. close(fd);
  126. }
  127. return ret;
  128. }
  129. static bool kernel_with_sleepable_spinlocks(void)
  130. {
  131. return false;
  132. }
  133. static void btf__exit(void)
  134. {
  135. }
  136. #endif /* HAVE_BPF_SKEL */
  137. static void
  138. sigtrap_handler(int signum __maybe_unused, siginfo_t *info, void *ucontext __maybe_unused)
  139. {
  140. if (!__atomic_fetch_add(&ctx.signal_count, 1, __ATOMIC_RELAXED))
  141. ctx.first_siginfo = *info;
  142. __atomic_fetch_sub(&ctx.tids_want_signal, syscall(SYS_gettid), __ATOMIC_RELAXED);
  143. }
  144. static void *test_thread(void *arg)
  145. {
  146. pthread_barrier_t *barrier = (pthread_barrier_t *)arg;
  147. pid_t tid = syscall(SYS_gettid);
  148. int i;
  149. pthread_barrier_wait(barrier);
  150. __atomic_fetch_add(&ctx.tids_want_signal, tid, __ATOMIC_RELAXED);
  151. for (i = 0; i < ctx.iterate_on - 1; i++)
  152. __atomic_fetch_add(&ctx.tids_want_signal, tid, __ATOMIC_RELAXED);
  153. return NULL;
  154. }
  155. static int run_test_threads(pthread_t *threads, pthread_barrier_t *barrier)
  156. {
  157. int i;
  158. pthread_barrier_wait(barrier);
  159. for (i = 0; i < NUM_THREADS; i++)
  160. TEST_ASSERT_EQUAL("pthread_join() failed", pthread_join(threads[i], NULL), 0);
  161. return TEST_OK;
  162. }
  163. static int run_stress_test(int fd, pthread_t *threads, pthread_barrier_t *barrier)
  164. {
  165. int ret, expected_sigtraps;
  166. ctx.iterate_on = 3000;
  167. TEST_ASSERT_EQUAL("misfired signal?", ctx.signal_count, 0);
  168. TEST_ASSERT_EQUAL("enable failed", ioctl(fd, PERF_EVENT_IOC_ENABLE, 0), 0);
  169. ret = run_test_threads(threads, barrier);
  170. TEST_ASSERT_EQUAL("disable failed", ioctl(fd, PERF_EVENT_IOC_DISABLE, 0), 0);
  171. expected_sigtraps = NUM_THREADS * ctx.iterate_on;
  172. if (ctx.signal_count < expected_sigtraps && kernel_with_sleepable_spinlocks()) {
  173. pr_debug("Expected %d sigtraps, got %d, running on a kernel with sleepable spinlocks.\n",
  174. expected_sigtraps, ctx.signal_count);
  175. pr_debug("See https://lore.kernel.org/all/e368f2c848d77fbc8d259f44e2055fe469c219cf.camel@gmx.de/\n");
  176. return TEST_SKIP;
  177. } else
  178. TEST_ASSERT_EQUAL("unexpected sigtraps", ctx.signal_count, expected_sigtraps);
  179. TEST_ASSERT_EQUAL("missing signals or incorrectly delivered", ctx.tids_want_signal, 0);
  180. TEST_ASSERT_VAL("unexpected si_addr", ctx.first_siginfo.si_addr == &ctx.iterate_on);
  181. #if 0 /* FIXME: enable when libc's signal.h has si_perf_{type,data} */
  182. TEST_ASSERT_EQUAL("unexpected si_perf_type", ctx.first_siginfo.si_perf_type,
  183. PERF_TYPE_BREAKPOINT);
  184. TEST_ASSERT_EQUAL("unexpected si_perf_data", ctx.first_siginfo.si_perf_data,
  185. TEST_SIG_DATA);
  186. #endif
  187. return ret;
  188. }
  189. static int test__sigtrap(struct test_suite *test __maybe_unused, int subtest __maybe_unused)
  190. {
  191. struct perf_event_attr attr = make_event_attr();
  192. struct sigaction action = {};
  193. struct sigaction oldact;
  194. pthread_t threads[NUM_THREADS];
  195. pthread_barrier_t barrier;
  196. char sbuf[STRERR_BUFSIZE];
  197. int i, fd, ret = TEST_FAIL;
  198. if (!BP_SIGNAL_IS_SUPPORTED) {
  199. pr_debug("Test not supported on this architecture");
  200. return TEST_SKIP;
  201. }
  202. pthread_barrier_init(&barrier, NULL, NUM_THREADS + 1);
  203. action.sa_flags = SA_SIGINFO | SA_NODEFER;
  204. action.sa_sigaction = sigtrap_handler;
  205. sigemptyset(&action.sa_mask);
  206. if (sigaction(SIGTRAP, &action, &oldact)) {
  207. pr_debug("FAILED sigaction(): %s\n", str_error_r(errno, sbuf, sizeof(sbuf)));
  208. goto out;
  209. }
  210. fd = sys_perf_event_open(&attr, 0, -1, -1, perf_event_open_cloexec_flag());
  211. if (fd < 0) {
  212. if (attr_has_sigtrap()) {
  213. pr_debug("FAILED sys_perf_event_open(): %s\n",
  214. str_error_r(errno, sbuf, sizeof(sbuf)));
  215. } else {
  216. pr_debug("perf_event_attr doesn't have sigtrap\n");
  217. ret = TEST_SKIP;
  218. }
  219. goto out_restore_sigaction;
  220. }
  221. for (i = 0; i < NUM_THREADS; i++) {
  222. if (pthread_create(&threads[i], NULL, test_thread, &barrier)) {
  223. pr_debug("FAILED pthread_create(): %s\n", str_error_r(errno, sbuf, sizeof(sbuf)));
  224. goto out_close_perf_event;
  225. }
  226. }
  227. ret = run_stress_test(fd, threads, &barrier);
  228. out_close_perf_event:
  229. close(fd);
  230. out_restore_sigaction:
  231. sigaction(SIGTRAP, &oldact, NULL);
  232. out:
  233. pthread_barrier_destroy(&barrier);
  234. btf__exit();
  235. return ret;
  236. }
  237. DEFINE_SUITE("Sigtrap", sigtrap);