Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp711790imj; Wed, 13 Feb 2019 16:17:25 -0800 (PST) X-Google-Smtp-Source: AHgI3IYe+0TpQoBOSXfwoAh5yncLXAcPVGmzyfSarAlWAewV2FID+fAEeNTIUmCnNykxHg41WY87 X-Received: by 2002:a63:d842:: with SMTP id k2mr901181pgj.8.1550103445009; Wed, 13 Feb 2019 16:17:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550103445; cv=none; d=google.com; s=arc-20160816; b=hQqTvQb1G8X+vrYHXsAQxr3j/PLaE3AC/CY8rQa+vhpdpayDWhRMM06xONAFE5MuOU Tm2dj1bmhhQTHS4ECVkJan+/4MzYvH45tLBw8uGeT3YwOV9qmdzD6TmZEbKX8KTdzdm1 J0OSw4vFoxHmbIU9/v7QmUUSpREJdKZWBDQaw2UXP5v/jpXx0fgwymxT4WwYgduW/x6a Bz57S88V9dtBp6NTN5+HUnSmBlYPLEtTBRKKMd1tfHxFDgEDXuIe5hTnlerStTcSP8hC bnJRZAEWw1t+kUwBpoPd4vIfv0J2BnZEUw+d7eCDZMlP3j5417TbQ+VnNhrmMU8q5ZFp Eq+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=WO27QPqQIZwxFH6O2Dc/WNBTP/ibhl73e9eB6ptLBUY=; b=AWSSQgXcuZ6tMYI1q6NvZ04NKvLuncIYW5+6ZZx9ucLkjwEWPWeQwK2teMoqQ59hCQ 2EY0XkulWi7yBhCOcGcrPYlwPCKURPQLNC0OBIjPTP7B8363JIAQGYA6L25N0RYYQeTo 9LLGKiSfcOfEDk54Aiiu+sSspVIcWsYCxC+R/wczgAMOnfKppi9nZFkQr5eXAsWI/q7s N3/CO2s8UzUdVuL7Vm99tA+pO/8fixC2Ts1h+NTZCOVa4tmieMubbPS135RR0SfcE9EV quUX7WWMNBnKOUZT+bhq9aTAWpxIiLTl4JncJc9taKXVHrTzQogZTwYhKeT/3JJmbaUk +Y8Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IlLUpUFt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v6si700537pgs.206.2019.02.13.16.17.08; Wed, 13 Feb 2019 16:17:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=IlLUpUFt; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2394022AbfBMSo4 (ORCPT + 99 others); Wed, 13 Feb 2019 13:44:56 -0500 Received: from mail.kernel.org ([198.145.29.99]:43564 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388313AbfBMSoy (ORCPT ); Wed, 13 Feb 2019 13:44:54 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 431A4222D3; Wed, 13 Feb 2019 18:44:53 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550083493; bh=xVJBuDf6p754DYRJtacnpKR/3TIEEvUQtRdhtVGejdc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=IlLUpUFtI8iMYHF8/LhQnyTJHQHWPwpHTMGQNCk24SnDrwPwfP5DgceD8q622nPWU OKmW5qzWGwOWR5MHvudIP3l8Alb2FVMS2uMIVnvS200kQxEIo5DQ9OK7VWF/5tnypr nYJAkKamIejP3yS7Vr0cuXdKiVa8w4auhbRWk/VQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dmitry Vyukov , "Eric W. Biederman" Subject: [PATCH 4.20 11/50] signal: Always notice exiting tasks Date: Wed, 13 Feb 2019 19:38:16 +0100 Message-Id: <20190213183656.733725215@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190213183655.747168774@linuxfoundation.org> References: <20190213183655.747168774@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ From: Eric W. Biederman commit 35634ffa1751b6efd8cf75010b509dcb0263e29b upstream. Recently syzkaller was able to create unkillablle processes by creating a timer that is delivered as a thread local signal on SIGHUP, and receiving SIGHUP SA_NODEFERER. Ultimately causing a loop failing to deliver SIGHUP but always trying. Upon examination it turns out part of the problem is actually most of the solution. Since 2.5 signal delivery has found all fatal signals, marked the signal group for death, and queued SIGKILL in every threads thread queue relying on signal->group_exit_code to preserve the information of which was the actual fatal signal. The conversion of all fatal signals to SIGKILL results in the synchronous signal heuristic in next_signal kicking in and preferring SIGHUP to SIGKILL. Which is especially problematic as all fatal signals have already been transformed into SIGKILL. Instead of dequeueing signals and depending upon SIGKILL to be the first signal dequeued, first test if the signal group has already been marked for death. This guarantees that nothing in the signal queue can prevent a process that needs to exit from exiting. Cc: stable@vger.kernel.org Tested-by: Dmitry Vyukov Reported-by: Dmitry Vyukov Ref: ebf5ebe31d2c ("[PATCH] signal-fixes-2.5.59-A4") History Tree: https://git.kernel.org/pub/scm/linux/kernel/git/tglx/history.git Signed-off-by: "Eric W. Biederman" Signed-off-by: Greg Kroah-Hartman --- kernel/signal.c | 6 ++++++ 1 file changed, 6 insertions(+) --- a/kernel/signal.c +++ b/kernel/signal.c @@ -2393,6 +2393,11 @@ relock: goto relock; } + /* Has this task already been marked for death? */ + ksig->info.si_signo = signr = SIGKILL; + if (signal_group_exit(signal)) + goto fatal; + for (;;) { struct k_sigaction *ka; @@ -2488,6 +2493,7 @@ relock: continue; } + fatal: spin_unlock_irq(&sighand->siglock); /*