Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp549931imm; Fri, 3 Aug 2018 07:43:17 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcJZn4Bredkoz7hhUh41VxWk+rbMGxdYi7k1aajI4lMWAfDvJB8ItbIgwJMVDbbCjwOp4I2 X-Received: by 2002:a63:41c6:: with SMTP id o189-v6mr4184235pga.323.1533307397189; Fri, 03 Aug 2018 07:43:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1533307397; cv=none; d=google.com; s=arc-20160816; b=MX56iuW5I/sRJ5CF1Y6Anln84oyWTNx0CnvHIoML90EWM4MEI0TvqeW5hq7FR97QGg BQ9o1Yz9SuSBXzX+Tai7djmOWBVazLSNLhGvDLelsLuii3C2BlXthn4CyOZmF0ZcR+3k GP7ASd7LzQqRJ1nIjaMsVxnLO4jcE5XpLvVyZZ8yerPbk13fQmiCb0fYIt4Dx0tNO3pf UQIpK5KH/Jj9rBeur3l9RMVYOjrVtAvE0Ukz7O3VCDl05xOdwMoI2NNY1c3AyjzOMB8I vHMkT52eHOWBtbVQ+mfS6SzEBOIOHlPl1LY98TaIeFeXgfZZ9+A8WOvpg8HDF5ZIG0RI jzFA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :arc-authentication-results; bh=3MnTwVQyScX+qE2sxse5zbMuOyytqf8fLAgGiVkxJVE=; b=aVvbHrAoh0bS65qhOEVoYF+IH7QuywmRorO51/JMDgb3UTaVl96KVBojDJ+LjcnZI6 lTMf3y0XHfnlSEZu6nCHOtXyvSQG8yjrkg31edXlg2ZBCCJ4/2aS8xuR+YPR4n1skp+y 4LQTnO20Rh9dxzdbSgsARFyuXocy3oDu9tqs/9Y+4wxheGVe1ZYpOtKhNrmmo/DFxT6x 53RZpbAbx0YLiv66c742NZxavBQGq7ooS/70xhN/Thq28wmbPbONTuc8gSX9MH74yqQK GNbQrBaYMjLXg+c9b7Hu1yQgcjpGVXa0NtToJpD23so1VpawtybPr2ujezwAaLd4eqM+ DpkQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r191-v6si5827399pfr.152.2018.08.03.07.43.02; Fri, 03 Aug 2018 07:43:17 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732373AbeHCQiZ (ORCPT + 99 others); Fri, 3 Aug 2018 12:38:25 -0400 Received: from nov-007-i651.relay.mailchannels.net ([46.232.183.205]:46715 "EHLO nov-007-i651.relay.mailchannels.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732090AbeHCQiY (ORCPT ); Fri, 3 Aug 2018 12:38:24 -0400 X-Sender-Id: novatrend|x-authuser|juerg@bitron.ch Received: from relay.mailchannels.net (localhost [127.0.0.1]) by relay.mailchannels.net (Postfix) with ESMTP id A0FB7BE0444; Fri, 3 Aug 2018 14:41:42 +0000 (UTC) Received: from srv17.tophost.ch (swiss-ingress-3.mailchannels.ch [46.232.178.210]) by relay.mailchannels.net (Postfix) with ESMTPA id 98593BE03B0; Fri, 3 Aug 2018 14:41:39 +0000 (UTC) X-Sender-Id: novatrend|x-authuser|juerg@bitron.ch Received: from srv17.tophost.ch (srv17.tophost.ch [193.33.128.141]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384) by 0.0.0.0:2500 (trex/5.15.2); Fri, 03 Aug 2018 14:41:42 +0000 X-MC-Relay: Neutral X-MailChannels-SenderId: novatrend|x-authuser|juerg@bitron.ch X-MailChannels-Auth-Id: novatrend X-Attack-Chief: 504c628a055719f1_1533307302193_2210798741 X-MC-Loop-Signature: 1533307302193:4221698340 X-MC-Ingress-Time: 1533307302192 Received: from [80.219.231.201] (port=55868 helo=jzen.bitron.ch) by srv17.tophost.ch with esmtpsa (TLSv1.2:ECDHE-RSA-AES128-SHA256:128) (Exim 4.91) (envelope-from ) id 1flbGq-004ETW-Vo; Fri, 03 Aug 2018 16:41:37 +0200 From: =?UTF-8?q?J=C3=BCrg=20Billeter?= To: Andrew Morton Cc: Oleg Nesterov , Thomas Gleixner , Eric Biederman , linux-api@vger.kernel.org, linux-kernel@vger.kernel.org, =?UTF-8?q?J=C3=BCrg=20Billeter?= Subject: [PATCH v3 2/2] prctl: add PR_[GS]ET_KILLABLE Date: Fri, 3 Aug 2018 16:40:21 +0200 Message-Id: <20180803144021.56920-2-j@bitron.ch> X-Mailer: git-send-email 2.18.0 In-Reply-To: <20180803144021.56920-1-j@bitron.ch> References: <20180730075241.24002-1-j@bitron.ch> <20180803144021.56920-1-j@bitron.ch> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-AuthUser: juerg@bitron.ch Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org PR_SET_KILLABLE clears the SIGNAL_UNKILLABLE flag. This allows CLONE_NEWPID tasks to restore normal signal behavior, opting out of the special signal protection for init processes. This prctl does not allow setting the SIGNAL_UNKILLABLE flag, only clearing. The SIGNAL_UNKILLABLE flag, which is implicitly set for tasks cloned with CLONE_NEWPID, has the effect of ignoring all signals (from userspace) if the corresponding handler is set to SIG_DFL. The only exceptions are SIGKILL and SIGSTOP and they are only accepted if raised from an ancestor namespace. SIGINT, SIGQUIT and SIGTSTP are used in job control for ^C, ^\, ^Z. While a task with the SIGNAL_UNKILLABLE flag could install handlers for these signals, this is not sufficient to implement a shell that uses CLONE_NEWPID for child processes: * As SIGSTOP is ignored when raised from the SIGNAL_UNKILLABLE process itself, it's not possible to implement the stop action in a custom SIGTSTP handler. * Many applications do not install handlers for these signals and thus, job control won't work properly with unmodified applications. There are other scenarios besides job control in a shell where applications rely on the default actions as described in signal(7) and PID isolation may be useful. This new prctl makes the signal protection for "init" processes optional, without breaking backward compatibility. Signed-off-by: Jürg Billeter --- include/uapi/linux/prctl.h | 4 ++++ kernel/sys.c | 13 +++++++++++++ 2 files changed, 17 insertions(+) diff --git a/include/uapi/linux/prctl.h b/include/uapi/linux/prctl.h index c0d7ea0bf5b6..92afb63da727 100644 --- a/include/uapi/linux/prctl.h +++ b/include/uapi/linux/prctl.h @@ -219,4 +219,8 @@ struct prctl_mm_map { # define PR_SPEC_DISABLE (1UL << 2) # define PR_SPEC_FORCE_DISABLE (1UL << 3) +/* Control SIGNAL_UNKILLABLE */ +#define PR_GET_KILLABLE 54 +#define PR_SET_KILLABLE 55 + #endif /* _LINUX_PRCTL_H */ diff --git a/kernel/sys.c b/kernel/sys.c index 38509dc1f77b..92c9322cfb98 100644 --- a/kernel/sys.c +++ b/kernel/sys.c @@ -2484,6 +2484,19 @@ SYSCALL_DEFINE5(prctl, int, option, unsigned long, arg2, unsigned long, arg3, return -EINVAL; error = arch_prctl_spec_ctrl_set(me, arg2, arg3); break; + case PR_GET_KILLABLE: + if (arg3 || arg4 || arg5) + return -EINVAL; + error = put_user(!(me->signal->flags & SIGNAL_UNKILLABLE), + (int __user *)arg2); + break; + case PR_SET_KILLABLE: + if (arg2 != 1 || arg3 || arg4 || arg5) + return -EINVAL; + spin_lock_irq(&me->sighand->siglock); + me->signal->flags &= ~SIGNAL_UNKILLABLE; + spin_unlock_irq(&me->sighand->siglock); + break; default: error = -EINVAL; break; -- 2.18.0