-
Notifications
You must be signed in to change notification settings - Fork 12.3k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Reapply "[sanitizer_common] AND signals in BlockSignals instead of de…
…leting (#113443)" for non-Android Linux only (#115790) The original patch (25fd366) was reverted in 083a5cd because it broke some buildbots. This revised patch makes two changes: - Reverts to *pre-#98200* behavior for Android. This avoids a build breakage on Android. - Only define KeepUnblocked if SANITIZER_LINUX: this avoids a build breakage on solaris, which does not support internal_sigdelset. N.B. Other buildbot failures were non-sanitizer tests and are therefore unrelated. Original commit message: My earlier patch #98200 caused a regression because it unconditionally unblocked synchronous signals, even if the user program had deliberately blocked them. This patch fixes the issue by checking the current signal mask, as suggested by Vitaly. It also adds tests. Fixes #113385
- Loading branch information
Showing
3 changed files
with
116 additions
and
16 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
76 changes: 76 additions & 0 deletions
76
compiler-rt/lib/sanitizer_common/tests/sanitizer_block_signals.cpp
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,76 @@ | ||
//===-- sanitizer_block_signals.cpp ---------------------------------------===// | ||
// | ||
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. | ||
// See https://llvm.org/LICENSE.txt for license information. | ||
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception | ||
// | ||
//===----------------------------------------------------------------------===// | ||
// | ||
// This file is a part of sanitizer_common unit tests. | ||
// | ||
//===----------------------------------------------------------------------===// | ||
#include <signal.h> | ||
#include <stdio.h> | ||
|
||
#include "gtest/gtest.h" | ||
#include "sanitizer_common/sanitizer_linux.h" | ||
|
||
namespace __sanitizer { | ||
|
||
#if SANITIZER_LINUX && !SANITIZER_ANDROID | ||
volatile int received_sig = -1; | ||
|
||
void signal_handler(int signum) { received_sig = signum; } | ||
|
||
TEST(SanitizerCommon, NoBlockSignals) { | ||
// No signals blocked | ||
signal(SIGUSR1, signal_handler); | ||
raise(SIGUSR1); | ||
EXPECT_EQ(received_sig, SIGUSR1); | ||
|
||
received_sig = -1; | ||
signal(SIGPIPE, signal_handler); | ||
raise(SIGPIPE); | ||
EXPECT_EQ(received_sig, SIGPIPE); | ||
} | ||
|
||
TEST(SanitizerCommon, BlockSignalsPlain) { | ||
// ScopedBlockSignals; SIGUSR1 should be blocked but not SIGPIPE | ||
{ | ||
__sanitizer_sigset_t sigset = {}; | ||
ScopedBlockSignals block(&sigset); | ||
|
||
received_sig = -1; | ||
signal(SIGUSR1, signal_handler); | ||
raise(SIGUSR1); | ||
EXPECT_EQ(received_sig, -1); | ||
|
||
received_sig = -1; | ||
signal(SIGPIPE, signal_handler); | ||
raise(SIGPIPE); | ||
EXPECT_EQ(received_sig, SIGPIPE); | ||
} | ||
EXPECT_EQ(received_sig, SIGUSR1); | ||
} | ||
|
||
TEST(SanitizerCommon, BlockSignalsExceptPipe) { | ||
// Manually block SIGPIPE; ScopedBlockSignals should not unblock this | ||
sigset_t block_sigset; | ||
sigemptyset(&block_sigset); | ||
sigaddset(&block_sigset, SIGPIPE); | ||
sigprocmask(SIG_BLOCK, &block_sigset, NULL); | ||
{ | ||
__sanitizer_sigset_t sigset = {}; | ||
ScopedBlockSignals block(&sigset); | ||
|
||
received_sig = -1; | ||
signal(SIGPIPE, signal_handler); | ||
raise(SIGPIPE); | ||
EXPECT_EQ(received_sig, -1); | ||
} | ||
sigprocmask(SIG_UNBLOCK, &block_sigset, NULL); | ||
EXPECT_EQ(received_sig, SIGPIPE); | ||
} | ||
#endif // SANITIZER_LINUX && !SANITIZER_ANDROID | ||
|
||
} // namespace __sanitizer |