Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp3745734imw; Mon, 11 Jul 2022 15:08:30 -0700 (PDT) X-Google-Smtp-Source: AGRyM1ttx9xUQ5dBKP7W8NS9IbCTzgFdzqNqXqH+Qs0ljyYJQlLLWsdPXnPLvQoz7fIEd/pH/3vy X-Received: by 2002:a17:902:ccc4:b0:16c:5766:51f9 with SMTP id z4-20020a170902ccc400b0016c576651f9mr2135673ple.84.1657577310174; Mon, 11 Jul 2022 15:08:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657577310; cv=none; d=google.com; s=arc-20160816; b=Y6zmtKkRztoUuuPXgVW35waX3o9cK+cBvvjjfl449HIRM4FSnZ+uYpPEB+tpHq+vRe 9ekaRR1+lnqyIwx22dUhN7eddFh6YAxZgZZ5Uf2tLkkuiIC+zArhZdIxG9/cnTCgAfsy XoCqWPKWcazjDXF5UjhTOurRtT6/b7MSB6fC/VYiQ1Inaz2BU0+Lqj+k3lQBfTv/YGWu e+h6mxOgi0K4en9g+RJXTDOl+CODMvIv96zbRV2FxaMmXb+RYpbHxsULpRrz2grRBbi/ Xy05drC/Tk/lEBTTqnxcT565AcvldQF4+9FRdUhl+Hoam/Rn2JmYmGUVkv1C+GSCcgoJ rF3Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:subject:mime-version:user-agent:message-id :in-reply-to:date:references:cc:to:from; bh=Pk3MBw0VuDl9C+sM/GeM9amm4PoE+588wBR3l34dWL8=; b=HHb/IMkGwC43gutV7R8hirvIIyfkvgFiDN2spB8xmLmR3E8uCPWvhTJG+sjju9L8KM MbWocOaAbpvcKXaYqYF2imbbi0N5QXhGwhumh1cM7X1s64I2VRBlznIHxqA0U/N1BDmP 2X2v1LCvHiAMwpLsE9wLcevs4+lIEEcF6BG9S6Z/bSSAxnYLN+CCVNIn/yJvW/9e7+co hQAk1bxPvym9QdX06EToLX8cIUdff6f15qyZRgBGaOKDRo2P3BstFW1/gXr8QmkWa/Ga lxQ48rN1jvJtEcvms8HgrfT19FFO2P+SkAafE/mXp4WiaRWAfMmO1bRQg9rMGoounRKS VTbQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xmission.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h190-20020a6383c7000000b004129a78936fsi11351580pge.1.2022.07.11.15.08.17; Mon, 11 Jul 2022 15:08:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=xmission.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231208AbiGKVhu (ORCPT + 99 others); Mon, 11 Jul 2022 17:37:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51266 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230399AbiGKVhs (ORCPT ); Mon, 11 Jul 2022 17:37:48 -0400 Received: from out03.mta.xmission.com (out03.mta.xmission.com [166.70.13.233]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E810032BB2; Mon, 11 Jul 2022 14:37:46 -0700 (PDT) Received: from in01.mta.xmission.com ([166.70.13.51]:56004) by out03.mta.xmission.com with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1oB169-00Fyyi-KE; Mon, 11 Jul 2022 15:37:45 -0600 Received: from ip68-227-174-4.om.om.cox.net ([68.227.174.4]:45020 helo=email.froward.int.ebiederm.org.xmission.com) by in01.mta.xmission.com with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.93) (envelope-from ) id 1oB168-00GwFM-AH; Mon, 11 Jul 2022 15:37:45 -0600 From: "Eric W. Biederman" To: Tycho Andersen Cc: Miklos Szeredi , Christian Brauner , fuse-devel , linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org References: Date: Mon, 11 Jul 2022 16:37:12 -0500 In-Reply-To: (Tycho Andersen's message of "Mon, 11 Jul 2022 14:25:21 -0600") Message-ID: <877d4jbabb.fsf@email.froward.int.ebiederm.org> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.1 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-XM-SPF: eid=1oB168-00GwFM-AH;;;mid=<877d4jbabb.fsf@email.froward.int.ebiederm.org>;;;hst=in01.mta.xmission.com;;;ip=68.227.174.4;;;frm=ebiederm@xmission.com;;;spf=softfail X-XM-AID: U2FsdGVkX1+BNhhz/q5rz9OSWYm2QD2VMDoDaU2rMNc= X-SA-Exim-Connect-IP: 68.227.174.4 X-SA-Exim-Mail-From: ebiederm@xmission.com X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net X-Spam-Status: No, score=-2.6 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-DCC: XMission; sa06 1397; Body=1 Fuz1=1 Fuz2=1 X-Spam-Combo: *;Tycho Andersen X-Spam-Relay-Country: X-Spam-Timing: total 745 ms - load_scoreonly_sql: 0.10 (0.0%), signal_user_changed: 14 (1.8%), b_tie_ro: 12 (1.6%), parse: 1.03 (0.1%), extract_message_metadata: 16 (2.2%), get_uri_detail_list: 2.3 (0.3%), tests_pri_-1000: 14 (1.9%), tests_pri_-950: 1.32 (0.2%), tests_pri_-900: 1.17 (0.2%), tests_pri_-90: 335 (44.9%), check_bayes: 326 (43.8%), b_tokenize: 9 (1.2%), b_tok_get_all: 184 (24.7%), b_comp_prob: 2.9 (0.4%), b_tok_touch_all: 126 (17.0%), b_finish: 0.85 (0.1%), tests_pri_0: 343 (46.1%), check_dkim_signature: 0.61 (0.1%), check_dkim_adsp: 3.0 (0.4%), poll_dns_idle: 1.10 (0.1%), tests_pri_10: 2.7 (0.4%), tests_pri_500: 13 (1.7%), rewrite_mail: 0.00 (0.0%) Subject: Re: strange interaction between fuse + pidns X-SA-Exim-Version: 4.2.1 (built Sat, 08 Feb 2020 21:53:50 +0000) X-SA-Exim-Scanned: Yes (on in01.mta.xmission.com) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Tycho Andersen writes: > Hi all, > > On Mon, Jul 11, 2022 at 03:59:15PM +0200, Miklos Szeredi wrote: >> On Mon, 11 Jul 2022 at 12:35, Miklos Szeredi wrote: >> > >> > Can you try the attached untested patch? >> >> Updated patch to avoid use after free on req->args. >> >> Still mostly untested. > > Thanks, when I applied your patch, I still ended up with tasks stuck > waiting with a SIGKILL pending. So I looked into that and came up with > the patch below. With both your patch and mine, my testcase exits > cleanly. > > Eric (or Christian, or anyone), can you comment on the patch below? I > have no idea what this will break. Maybe instead a better approach is > some additional special case in __send_signal_locked()? > > Tycho > > From b7ea26adcf3546be5745063cc86658acb5ed37e9 Mon Sep 17 00:00:00 2001 > From: Tycho Andersen > Date: Mon, 11 Jul 2022 11:26:58 -0600 > Subject: [PATCH] sched: __fatal_signal_pending() should also check shared > signals > > The wait_* code uses signal_pending_state() to test whether a thread has > been interrupted, which ultimately uses __fatal_signal_pending() to detect > if there is a fatal signal. > > When a pid ns dies, in zap_pid_ns_processes() it does: > > group_send_sig_info(SIGKILL, SEND_SIG_PRIV, task, PIDTYPE_MAX); > > for all the tasks in the pid ns. That calls through: > > group_send_sig_info() -> > do_send_sig_info() -> > send_signal_locked() -> > __send_signal_locked() > > which does: > > pending = (type != PIDTYPE_PID) ? &t->signal->shared_pending : &t->pending; > > which puts sigkill in the set of shared signals, but not the individual > pending ones. If tasks are stuck in a killable wait (e.g. a fuse flush > operation), they won't see this shared signal, and will hang forever, since > TIF_SIGPENDING is set, but the fatal signal can't be detected. Hmm. That is perplexing. __send_signal_locked calls complete_signal. Then if any of the tasks of the process can receive the signal, complete_signal will loop through all of the tasks of the process and set the per thread SIGKILL. Pretty much by definition tasks can always receive SIGKILL. Is complete_signal not being able to do that? The patch below really should not be necessary, and I have pending work that if I can push over the finish line won't even make sense. As it is currently an abuse to use the per thread SIGKILL to indicate that a fatal signal has been short circuit delivered. That abuse as well as being unclean tends to confuse people reading the code. Eric > Signed-off-by: Tycho Andersen > --- > include/linux/sched/signal.h | 3 ++- > 1 file changed, 2 insertions(+), 1 deletion(-) > > diff --git a/include/linux/sched/signal.h b/include/linux/sched/signal.h > index cafbe03eed01..a033ccb0a729 100644 > --- a/include/linux/sched/signal.h > +++ b/include/linux/sched/signal.h > @@ -402,7 +402,8 @@ static inline int signal_pending(struct task_struct *p) > > static inline int __fatal_signal_pending(struct task_struct *p) > { > - return unlikely(sigismember(&p->pending.signal, SIGKILL)); > + return unlikely(sigismember(&p->pending.signal, SIGKILL) || > + sigismember(&p->signal->shared_pending.signal, SIGKILL)); > } > > static inline int fatal_signal_pending(struct task_struct *p) > > base-commit: 32346491ddf24599decca06190ebca03ff9de7f8