Received: by 2002:a25:c593:0:0:0:0:0 with SMTP id v141csp640747ybe; Fri, 13 Sep 2019 03:57:47 -0700 (PDT) X-Google-Smtp-Source: APXvYqzNhiyHp01VzmXnU121dtDkJKltzssoVCzryVo/ki7Y+h0wz2aeXwlvBGvCRY8V0TJmHKIA X-Received: by 2002:a05:6402:1447:: with SMTP id d7mr46767548edx.146.1568372267115; Fri, 13 Sep 2019 03:57:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568372267; cv=none; d=google.com; s=arc-20160816; b=WGgu4y8dlNd2o/Gyvx+UggN2vpRjtpbmfvjFPqKyXHW22yLmNXg2HT61yoTtIHn6dx XoB2RAw5GIetKyRAmncrLKKIC8v3wpcxo+R4UseKwyKIb8SkpRi343Orw91lO6vjLqVu roik8C3FE8vptBWhlcC3IkiiUVzEez/j6JwpteSqxsW9yXnAMEk7FbbpiNxQ/CfovDi5 2wjSGaems+mHU4PHK5dLuqHGbi+iayO3firfar95TZkPhtAjGiPdOPq7z3xzg4ws4pzc WhMR6s+NTfW+QP6+RRlqDpYVhmYIsPLZ5l/ovG43a38ZpTX80wIrxA+QSmtkmlTYWbvY 37mA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=coejejKOEsV2YtDPiVwQ1Tgao/h4VPAtxSuCsta1/O4=; b=hH9kjRwak4hdBNpTqNSQTeuoWNEB8lfHpyfFH8LDznPKRV2c7JvlhDzdpzbrbxNCP9 7y6XVYKEMJVGIYAIi+JrVGDUMwKozW0IiazTJG8ogWmldmSXZaPdG2+Z3BxKwyrhsd/p zTfsz21k9gmTjXLO9tdgBD6otvXKk0uMsBt61P7iukDVAUVo6rISTDyUGAGVt/L5dz1X 47qxiotijifznuN6yOOpzmWLU/QvwftQ4HdcteV9ctAYxXRit2RQkfqeTwDm26o+sDD4 7Z9fYMH/k5s9xEL2bZ+Q0HbnhRsYLvYNgLP/9feN6JV2qktyZuEosxahIi65FmSf3JAL ceXA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d13si6044438edo.290.2019.09.13.03.57.22; Fri, 13 Sep 2019 03:57:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2387890AbfIMJHi (ORCPT + 99 others); Fri, 13 Sep 2019 05:07:38 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:49831 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2387765AbfIMJHh (ORCPT ); Fri, 13 Sep 2019 05:07:37 -0400 Received: from [213.220.153.21] (helo=wittgenstein) by youngberry.canonical.com with esmtpsa (TLS1.2:ECDHE_RSA_AES_128_GCM_SHA256:128) (Exim 4.86_2) (envelope-from ) id 1i8hYE-000208-4E; Fri, 13 Sep 2019 09:07:34 +0000 Date: Fri, 13 Sep 2019 11:07:33 +0200 From: Christian Brauner To: Andrew Morton Cc: Eugene Syromiatnikov , linux-kernel@vger.kernel.org, Oleg Nesterov , "Peter Zijlstra (Intel)" , Ingo Molnar , "Dmitry V. Levin" , Eric Biederman Subject: Re: [PATCH v2] fork: check exit_signal passed in clone3() call Message-ID: <20190913090732.lzw4dpfj5j72ivy2@wittgenstein> References: <20190910175852.GA15572@asgard.redhat.com> <20190911064852.9f236d4c201b50e14d717c14@linux-foundation.org> <20190911135236.73l6icwxqff7fkw5@wittgenstein> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20190911135236.73l6icwxqff7fkw5@wittgenstein> User-Agent: NeoMutt/20180716 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Sep 11, 2019 at 03:52:36PM +0200, Christian Brauner wrote: > On Wed, Sep 11, 2019 at 06:48:52AM -0700, Andrew Morton wrote: > > On Tue, 10 Sep 2019 18:58:52 +0100 Eugene Syromiatnikov wrote: > > > > > Previously, higher 32 bits of exit_signal fields were lost when > > > copied to the kernel args structure (that uses int as a type for the > > > respective field). Moreover, as Oleg has noted[1], exit_signal is used > > > unchecked, so it has to be checked for sanity before use; for the legacy > > > syscalls, applying CSIGNAL mask guarantees that it is at least non-negative; > > > however, there's no such thing is done in clone3() code path, and that can > > > break at least thread_group_leader. > > > > > > Checking user-passed exit_signal against ~CSIGNAL mask solves both > > > of these problems. > > > > > > [1] https://lkml.org/lkml/2019/9/10/467 > > > > > > * kernel/fork.c (copy_clone_args_from_user): Fail with -EINVAL if > > > args.exit_signal has bits set outside CSIGNAL mask. > > > (_do_fork): Note that exit_signal is expected to be checked for the > > > sanity by the caller. > > > > > > Fixes: 7f192e3cd316 ("fork: add clone3") > > > > What are the user-visible runtime effects of this bug? > > > > Relatedly, should this fix be backported into -stable kernels? If so, why? > > No, as I said in my other mail clone3() is not in any released kernel > yet. clone3() is going to be released in v5.3. Applied yesteday. This is now fixed and included in mainline. Thanks! Christian