Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp1037080ybe; Wed, 11 Sep 2019 08:25:42 -0700 (PDT) X-Google-Smtp-Source: APXvYqyzxhJntYrh/X9H+AOrSJv+syXQRjdenoxZToRF/UweD/jC+t1QPHFj8B6JRQ3YcOGb6S73 X-Received: by 2002:a17:906:a851:: with SMTP id dx17mr30644450ejb.116.1568215542388; Wed, 11 Sep 2019 08:25:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568215542; cv=none; d=google.com; s=arc-20160816; b=YQlIXfrd0i3t7m16sToWcZ1Hj4KEkXIQRhPh7Ot0tkisjjtEMzKrT/5YTj6D3Th+1x RhSIis6DZZeUVe80k1ESq4Tw9ZxSCdmN7pmFkqsdyj5K1Oz+66y/WSALWTKsBevBZC6q grhs5Hj/DShAdOduy/7bO/+90b49QmqRz9CkTKLtDDatV9XA1zdJKOY1aWNp4wYuzTCy VjVWk3n1IUNDQPMV1ZAGJ+/wiekYP9DSvLeL4P8CvCl/NP9S9tJJ/fXLqO9KMDwtAltB 7X78KF5Ih30BHCztSfDHGVTcrvczFR5aJklOvBHBOBRnRNz6exzns8+HNH+ZNE2PdMT1 pdRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=ZCCnnMvAd9xC1JhqfZt/VjvkgmrKEiYJZzVtY5jt/4w=; b=El5LMvh/4xWOiBAuXtTqjF3r0nRDecvpDyTHeN74BwAB4S/0ep3S0j1LSKYNtmaBjx W3bV6AqFEOtckXZvfnCUZaojQHl4KhofvDx/d5KrjKktWFcNMjD81MZ7C69PEXwHXN95 tctftqfulKMduFzrakQ0KXM08hvZiUCGGsHf34hO6nW60OXKwjZhOBumXUVvtr0x/E80 xggsnxRX0TkzRYaEWsHr5FBbjCOPOnUectJbyuaVzHbVwUrnGpGtKtVCszLI5Z2J9HZS B/tv6fFzdhyYsh5AipRFPjgR5ucJLOpvC1p7MT+4vWS2HSRn14L7Sz2MzZDWsXIYqKvg 4TdA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id s56si14909383edd.159.2019.09.11.08.25.18; Wed, 11 Sep 2019 08:25:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728387AbfIKPVY (ORCPT + 99 others); Wed, 11 Sep 2019 11:21:24 -0400 Received: from mx1.redhat.com ([209.132.183.28]:3702 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726149AbfIKPVY (ORCPT ); Wed, 11 Sep 2019 11:21:24 -0400 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 7C4BD3066F49; Wed, 11 Sep 2019 15:21:23 +0000 (UTC) Received: from asgard.redhat.com (ovpn-112-72.ams2.redhat.com [10.36.112.72]) by smtp.corp.redhat.com (Postfix) with ESMTPS id D4564601A3; Wed, 11 Sep 2019 15:21:16 +0000 (UTC) Date: Wed, 11 Sep 2019 16:20:48 +0100 From: Eugene Syromiatnikov To: Christian Brauner Cc: Andrew Morton , linux-kernel@vger.kernel.org, Oleg Nesterov , "Peter Zijlstra (Intel)" , Ingo Molnar , "Dmitry V. Levin" , Eric Biederman Subject: Re: [PATCH v2] fork: check exit_signal passed in clone3() call Message-ID: <20190911152048.GD21600@asgard.redhat.com> References: <20190910175852.GA15572@asgard.redhat.com> <20190911064852.9f236d4c201b50e14d717c14@linux-foundation.org> <20190911135236.73l6icwxqff7fkw5@wittgenstein> <20190911141635.lafrcjwvbhjm3ezy@wittgenstein> <20190911143213.GB21600@asgard.redhat.com> <20190911145446.vkcqy2shldi5ibb5@wittgenstein> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190911145446.vkcqy2shldi5ibb5@wittgenstein> User-Agent: Mutt/1.5.23 (2014-03-12) X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.42]); Wed, 11 Sep 2019 15:21:23 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Sep 11, 2019 at 04:54:47PM +0200, Christian Brauner wrote: > On Wed, Sep 11, 2019 at 03:32:13PM +0100, Eugene Syromiatnikov wrote: > > On Wed, Sep 11, 2019 at 04:16:36PM +0200, Christian Brauner wrote: > > > On Wed, Sep 11, 2019 at 03:52:36PM +0200, Christian Brauner wrote: > > > > On Wed, Sep 11, 2019 at 06:48:52AM -0700, Andrew Morton wrote: > > > > > What are the user-visible runtime effects of this bug? > > > > The userspace can set -1 as an exit_signal, and that will break process > > signalling and reaping. > > > > > > > Relatedly, should this fix be backported into -stable kernels? If so, why? > > > > > > > > No, as I said in my other mail clone3() is not in any released kernel > > > > yet. clone3() is going to be released in v5.3. > > > > > > Sigh, I spoke to soon... Hm, this is placed in _do_fork(). There's a > > > chance that this might be visible in legacy clone if anyone passes in an > > > invalid signal greater than NSIG right now somehow, they'd now get > > > EINVAL if I'm seeing this right. > > > > > > So an alternative might be to only fix this in clone3() only right now > > > and get this patch into 5.3 to not release clone3() with this bug from > > > legacy clone duplicated. > > > And we defer the actual legacy clone fix until after next merge window > > > having it stew in linux-next for a couple of rcs. Distros often pull in > > > rcs so if anyone notices a regression for legacy clone we'll know about > > > it... valid_signal() checks at process exit time when the parent is > > > supposed to be notifed will catch faulty signals anyway so it's not that > > > big of a deal. > > > > As the patch is written, only copy_clone_args_from_user is touched (which > > is used only by clone3 and not legacy clone), and the check added > > Great! > > > replicates legacy clone behaviour: userspace can set 0..CSIGNAL > > as an exit_signal. Having ability to set exit_signal in NSIG..CSIGNAL > > Hm. The way I see it for clone3() it would make sense to only have < > NSIG right away. valid_signal() won't let through anything else > anyway... Since clone3() isn't out yet it doesn't make sense to > replicate the (buggy) behavior of legacy clone, right? I was thinking about that and in the end decided to go with CSIGNAL; the only issue I see here is that it prevents for libc to easily switch clone() library call implementation to clone3(), in case there are some applications that rely on this kind of behaviour; if there's no such userspace users, then switch to valid_signal() check for both legacy and clone3 should be fine (along with possible switching to u64 for kernel_clone_args's exit_signal, so the check can done in one place), but I'm agree with your hesitance to do it right now. > Christian