Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp711831imj; Wed, 13 Feb 2019 16:17:28 -0800 (PST) X-Google-Smtp-Source: AHgI3IZOSqMkJR3bCFnYCEmdVBhJNe9a0o/lKVMsn7bkH6DRhCF1Lo0vN0T7+HDjAtvYDl8sWu1R X-Received: by 2002:a17:902:bc89:: with SMTP id bb9mr1000065plb.212.1550103448863; Wed, 13 Feb 2019 16:17:28 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550103448; cv=none; d=google.com; s=arc-20160816; b=R+3GWUmmVbsqhzAVwdNYCKEbfXY8qLk7DlfR4sqCc1M8xSMuZ1vA+oAK0PVXhRvHEr 2CbEViHDjf2Z8h/tUs7DpnOuxdbcRyo1zxGfG+nFBlkXSAYQt9UEBdQrDHiRNz+pKm+E Ifa/8ZaJaaa0MW7hjBJw0+PYQ+JYqvU2/HxErdzXHX9umQMJbkpSwZ2qjalWctHeWN9z rJD0LyxHyI9bm7pvlXBb9aAXFVL113ixY3xypQwBX4lG/GuRua0XQYaw8XT6CqsiINc5 tAufSBA5s506aaB4SGqvJdzHIHR4HLI4hrs159QZsvhGrXI4m1zLrQpDoNjd9Eu1e2hm o1AQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=kyuWEQc83RizkdVl0L6iRUba7AdxjJP/L/wKNykNRhk=; b=X2nEUOd0jRinx+gGKoFePCgbveA90h+btsnZUbGV3PQU2Xf/fvwfmNYrgW+Eft6a2+ ypL4+4uevYuJc0t80cl/JUUrCr/1bdEsJZjvHSuDdLpGBHYZWHtNfdehz28sGhbBn5uc IwtepVpjNl2HelESFjXnEtRBouzD+EkqxS4O/NLzaisw3SNws6ol7jWSzCcXuFQdqqOu nJM2Fsy8C7rESguaogdNrRnDdFeb4uYXfNXA+oA9Z3YwoBjbhs58OyxLos+vd601TjHY LTksUtKvF26XN6bz/sIbZX0GQdHT3HDruIQ9B56CgZiCVScr1OnQvfmfaBn+2BAsBQaz oCnw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Z2Q7ZYtS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l2si714050pgq.163.2019.02.13.16.17.13; Wed, 13 Feb 2019 16:17:28 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Z2Q7ZYtS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2394036AbfBMSpB (ORCPT + 99 others); Wed, 13 Feb 2019 13:45:01 -0500 Received: from mail.kernel.org ([198.145.29.99]:43622 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2394028AbfBMSo6 (ORCPT ); Wed, 13 Feb 2019 13:44:58 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AEFDC20811; Wed, 13 Feb 2019 18:44:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550083497; bh=k0jPjLEfnQvddTk74pOKX11kCdYeFj3tidwHDUvTKtc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Z2Q7ZYtSuUmv/6Z3DwDOnYIwhOz60sIBJmZEWQFrNcgsp9TuBqPhvlI9GHWZwS/sb ZmhSJeppFMHn8L7+PJCsm6orkVsVNXhf3oqV5s3wiGXvy2iXDuyEBoIXTY7b0dttiU j4HkXsDurPl7UZvIIqz5o26LJOVhqeUozACVKcKs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dmitry Vyukov , "Eric W. Biederman" Subject: [PATCH 4.20 12/50] signal: Better detection of synchronous signals Date: Wed, 13 Feb 2019 19:38:17 +0100 Message-Id: <20190213183656.812880626@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190213183655.747168774@linuxfoundation.org> References: <20190213183655.747168774@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.20-stable review patch. If anyone has any objections, please let me know. ------------------ From: Eric W. Biederman commit 7146db3317c67b517258cb5e1b08af387da0618b upstream. Recently syzkaller was able to create unkillablle processes by creating a timer that is delivered as a thread local signal on SIGHUP, and receiving SIGHUP SA_NODEFERER. Ultimately causing a loop failing to deliver SIGHUP but always trying. When the stack overflows delivery of SIGHUP fails and force_sigsegv is called. Unfortunately because SIGSEGV is numerically higher than SIGHUP next_signal tries again to deliver a SIGHUP. >From a quality of implementation standpoint attempting to deliver the timer SIGHUP signal is wrong. We should attempt to deliver the synchronous SIGSEGV signal we just forced. We can make that happening in a fairly straight forward manner by instead of just looking at the signal number we also look at the si_code. In particular for exceptions (aka synchronous signals) the si_code is always greater than 0. That still has the potential to pick up a number of asynchronous signals as in a few cases the same si_codes that are used for synchronous signals are also used for asynchronous signals, and SI_KERNEL is also included in the list of possible si_codes. Still the heuristic is much better and timer signals are definitely excluded. Which is enough to prevent all known ways for someone sending a process signals fast enough to cause unexpected and arguably incorrect behavior. Cc: stable@vger.kernel.org Fixes: a27341cd5fcb ("Prioritize synchronous signals over 'normal' signals") Tested-by: Dmitry Vyukov Reported-by: Dmitry Vyukov Signed-off-by: "Eric W. Biederman" Signed-off-by: Greg Kroah-Hartman --- kernel/signal.c | 52 +++++++++++++++++++++++++++++++++++++++++++++++++++- 1 file changed, 51 insertions(+), 1 deletion(-) --- a/kernel/signal.c +++ b/kernel/signal.c @@ -688,6 +688,48 @@ int dequeue_signal(struct task_struct *t } EXPORT_SYMBOL_GPL(dequeue_signal); +static int dequeue_synchronous_signal(kernel_siginfo_t *info) +{ + struct task_struct *tsk = current; + struct sigpending *pending = &tsk->pending; + struct sigqueue *q, *sync = NULL; + + /* + * Might a synchronous signal be in the queue? + */ + if (!((pending->signal.sig[0] & ~tsk->blocked.sig[0]) & SYNCHRONOUS_MASK)) + return 0; + + /* + * Return the first synchronous signal in the queue. + */ + list_for_each_entry(q, &pending->list, list) { + /* Synchronous signals have a postive si_code */ + if ((q->info.si_code > SI_USER) && + (sigmask(q->info.si_signo) & SYNCHRONOUS_MASK)) { + sync = q; + goto next; + } + } + return 0; +next: + /* + * Check if there is another siginfo for the same signal. + */ + list_for_each_entry_continue(q, &pending->list, list) { + if (q->info.si_signo == sync->info.si_signo) + goto still_pending; + } + + sigdelset(&pending->signal, sync->info.si_signo); + recalc_sigpending(); +still_pending: + list_del_init(&sync->list); + copy_siginfo(info, &sync->info); + __sigqueue_free(sync); + return info->si_signo; +} + /* * Tell a process that it has a new active signal.. * @@ -2411,7 +2453,15 @@ relock: goto relock; } - signr = dequeue_signal(current, ¤t->blocked, &ksig->info); + /* + * Signals generated by the execution of an instruction + * need to be delivered before any other pending signals + * so that the instruction pointer in the signal stack + * frame points to the faulting instruction. + */ + signr = dequeue_synchronous_signal(&ksig->info); + if (!signr) + signr = dequeue_signal(current, ¤t->blocked, &ksig->info); if (!signr) break; /* will return 0 */