Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp862443ybl; Fri, 24 Jan 2020 10:54:53 -0800 (PST) X-Google-Smtp-Source: APXvYqzGb+ZzKAUGS5hpb9cr20ZobMMO/e9hJZf1pyaKM7t90lgx9fx435WdJgDr4CCJyR/Hjq9R X-Received: by 2002:aca:b504:: with SMTP id e4mr195330oif.28.1579892093763; Fri, 24 Jan 2020 10:54:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579892093; cv=none; d=google.com; s=arc-20160816; b=z51JuLeWHqGsG0ci4YDEvyuReIDl/XdxPQ93Jh5Oe2AhWKDVJOoV3i8ZNUsTz/+0YI Yya3eeP7+w9gDPr61Vc8SAJwtHD6uLeexiZrLeywUp3bn43oxXiE+3a7pI/cnpwiavAf FU5XXmvEj1MNPCulWP1RceW5oYSO4E4jBU28neOXX4FZUMwBZ8iKPnIr3uQNM7CQA8X4 BhGBhSmiS0tNxek4R0/wPkb33MeiVOuLaq/MnMEf+2TAJsdtRjIlmAGnsCEVTDoYRWKm 63RQheQ17iOSZ4T9kdKW0zqmapaAqKXipi5tX3as4eHkp3Mj06nLfhlknOeK4B8/M5Gx yxOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=JU55hE5HSmkjmky01ujpXA//PDXSvqFv4MsA+pXJj0E=; b=JLAdkMNOupywCvcUxmZdxwhg7zaVNwhz5ijK8uDGt0JQhAk0r1USCTkhnSLfdIFeXV uzZsoqi9yF27u6AoftVU+N5eOg3N7iZi8/ONGLcDTkYeArdr0MWNl+PJUD1zaeQLbKnC ezUA2uuKtxwjIyJGBoL11mDK4yu6nC7GNRX0AbwPHX75pw1UKiukbLLMa3kdBYkAr5Ao q7x+ebSUkjyHoG5MaoFBWuacQ6CnZMUCJrQDxINSUYnmPpMS0Fq3SWXMk+2xqYK+kgt+ NVIkIRX+j7a0+Qa/mHOePgWyAmNSZ/Uz5v1cIhYjmg7eYJ1HjRkkFA5Z99ZCfdbIROyR px0Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="b9mV/zwD"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b145si179825oii.67.2020.01.24.10.54.41; Fri, 24 Jan 2020 10:54:53 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="b9mV/zwD"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2391793AbgAXL3Y (ORCPT + 99 others); Fri, 24 Jan 2020 06:29:24 -0500 Received: from mail.kernel.org ([198.145.29.99]:46122 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2391782AbgAXL3W (ORCPT ); Fri, 24 Jan 2020 06:29:22 -0500 Received: from localhost (ip-213-127-102-57.ip.prioritytelecom.net [213.127.102.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id F08EE20704; Fri, 24 Jan 2020 11:29:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1579865361; bh=9mJTFhYXrEZ/LGgFyxWlpc6b0i8kWtPtJUtFU9aLHjQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=b9mV/zwDypIvwmjG6EOgHBkzaS9rSRrsZP7uOwB0z1B1X6T7VZfwZKSm+54hfSOUH oQG1fOnIno4ZxwYtiLi4kzHwaEuHXH6UTXcn7KVvAtuqPxuAVKzOniF0vG4fovZsDp 3XeS6ozLR9GwhgzAPADewRkeSSuuJVzBtSWNaO40= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, ronnie sahlberg , =?UTF-8?q?Christoph=20B=C3=B6hmwalder?= , Steve French , Philipp Reisner , David Laight , "Eric W. Biederman" , Sasha Levin Subject: [PATCH 4.19 512/639] signal: Allow cifs and drbd to receive their terminating signals Date: Fri, 24 Jan 2020 10:31:22 +0100 Message-Id: <20200124093152.952887591@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200124093047.008739095@linuxfoundation.org> References: <20200124093047.008739095@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Eric W. Biederman [ Upstream commit 33da8e7c814f77310250bb54a9db36a44c5de784 ] My recent to change to only use force_sig for a synchronous events wound up breaking signal reception cifs and drbd. I had overlooked the fact that by default kthreads start out with all signals set to SIG_IGN. So a change I thought was safe turned out to have made it impossible for those kernel thread to catch their signals. Reverting the work on force_sig is a bad idea because what the code was doing was very much a misuse of force_sig. As the way force_sig ultimately allowed the signal to happen was to change the signal handler to SIG_DFL. Which after the first signal will allow userspace to send signals to these kernel threads. At least for wake_ack_receiver in drbd that does not appear actively wrong. So correct this problem by adding allow_kernel_signal that will allow signals whose siginfo reports they were sent by the kernel through, but will not allow userspace generated signals, and update cifs and drbd to call allow_kernel_signal in an appropriate place so that their thread can receive this signal. Fixing things this way ensures that userspace won't be able to send signals and cause problems, that it is clear which signals the threads are expecting to receive, and it guarantees that nothing else in the system will be affected. This change was partly inspired by similar cifs and drbd patches that added allow_signal. Reported-by: ronnie sahlberg Reported-by: Christoph Böhmwalder Tested-by: Christoph Böhmwalder Cc: Steve French Cc: Philipp Reisner Cc: David Laight Fixes: 247bc9470b1e ("cifs: fix rmmod regression in cifs.ko caused by force_sig changes") Fixes: 72abe3bcf091 ("signal/cifs: Fix cifs_put_tcp_session to call send_sig instead of force_sig") Fixes: fee109901f39 ("signal/drbd: Use send_sig not force_sig") Fixes: 3cf5d076fb4d ("signal: Remove task parameter from force_sig") Signed-off-by: "Eric W. Biederman" Signed-off-by: Sasha Levin --- drivers/block/drbd/drbd_main.c | 2 ++ fs/cifs/connect.c | 2 +- include/linux/signal.h | 15 ++++++++++++++- kernel/signal.c | 5 +++++ 4 files changed, 22 insertions(+), 2 deletions(-) diff --git a/drivers/block/drbd/drbd_main.c b/drivers/block/drbd/drbd_main.c index a49a8d91a5990..5e3885f5729b0 100644 --- a/drivers/block/drbd/drbd_main.c +++ b/drivers/block/drbd/drbd_main.c @@ -334,6 +334,8 @@ static int drbd_thread_setup(void *arg) thi->name[0], resource->name); + allow_kernel_signal(DRBD_SIGKILL); + allow_kernel_signal(SIGXCPU); restart: retval = thi->function(thi); diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c index a8790bf04e95d..576cf71576da1 100644 --- a/fs/cifs/connect.c +++ b/fs/cifs/connect.c @@ -970,7 +970,7 @@ cifs_demultiplex_thread(void *p) mempool_resize(cifs_req_poolp, length + cifs_min_rcv); set_freezable(); - allow_signal(SIGKILL); + allow_kernel_signal(SIGKILL); while (server->tcpStatus != CifsExiting) { if (try_to_freeze()) continue; diff --git a/include/linux/signal.h b/include/linux/signal.h index e4d01469ed60c..0be5ce2375cb9 100644 --- a/include/linux/signal.h +++ b/include/linux/signal.h @@ -272,6 +272,9 @@ extern void signal_setup_done(int failed, struct ksignal *ksig, int stepping); extern void exit_signals(struct task_struct *tsk); extern void kernel_sigaction(int, __sighandler_t); +#define SIG_KTHREAD ((__force __sighandler_t)2) +#define SIG_KTHREAD_KERNEL ((__force __sighandler_t)3) + static inline void allow_signal(int sig) { /* @@ -279,7 +282,17 @@ static inline void allow_signal(int sig) * know it'll be handled, so that they don't get converted to * SIGKILL or just silently dropped. */ - kernel_sigaction(sig, (__force __sighandler_t)2); + kernel_sigaction(sig, SIG_KTHREAD); +} + +static inline void allow_kernel_signal(int sig) +{ + /* + * Kernel threads handle their own signals. Let the signal code + * know signals sent by the kernel will be handled, so that they + * don't get silently dropped. + */ + kernel_sigaction(sig, SIG_KTHREAD_KERNEL); } static inline void disallow_signal(int sig) diff --git a/kernel/signal.c b/kernel/signal.c index 7278302e34850..08911bb6fe9ab 100644 --- a/kernel/signal.c +++ b/kernel/signal.c @@ -86,6 +86,11 @@ static bool sig_task_ignored(struct task_struct *t, int sig, bool force) handler == SIG_DFL && !(force && sig_kernel_only(sig))) return true; + /* Only allow kernel generated signals to this kthread */ + if (unlikely((t->flags & PF_KTHREAD) && + (handler == SIG_KTHREAD_KERNEL) && !force)) + return true; + return sig_handler_ignored(handler, sig); } -- 2.20.1