Received: by 2002:a05:6358:16cc:b0:ea:6187:17c9 with SMTP id r12csp3003441rwl; Fri, 6 Jan 2023 14:08:18 -0800 (PST) X-Google-Smtp-Source: AMrXdXtElF5DRaOEuMAN1OAxVw2zzKMHiiJ747aaAmUGlagEQ6SL2yTJHvBDo/7+B4fJtWBfkvaB X-Received: by 2002:a05:6a20:2d99:b0:af:c871:c723 with SMTP id bf25-20020a056a202d9900b000afc871c723mr61829862pzb.33.1673042897940; Fri, 06 Jan 2023 14:08:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673042897; cv=none; d=google.com; s=arc-20160816; b=Me89gGxxcOCMVqtW51XNqHEbFv1m8UfMCC8adOscPzt9rL7uvz0FzAH95Bl9mr+nnV OCEzrEoyaZjnn6u7MMjkyoVF0qLTb44Xj9E1jbdfV2bWJGliHPqRuCP0cplAXAhNnqZx keRON+8dbIxrORnUDtpNkIbCyQv9EinVayK7ur2/njxAf4BmLS0GyMEf9gWf11Av81ew z30kuJjraT/hMyC5M+iI67MjRnBHjnNdlss5+B/O0VX02L+DviQdTAWBzlaqc65ioQkp dB9cXjJj0BhA4dgAwWswonCkpFb5/aD0jSVq+55ZMHyvmRIdY9KI/6Ty9dccUCsf+TZG Ih5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=EpBrBO9qCLaemnVJhEnpVmLBwJuUwwRR8sijbnuMntI=; b=iYB7gFSjDhylUXuuYb85TDeneuUOzAWmbpQfOt23JT17XFRoCC8MckHDt4KV3n1pdk kz0aBVEIW2SdxanNWf9l+AQRpHS2hmGTvuykBIgkvz1Gtp71Bu6RmAm+3eS4NKs7h2aG DYA7fkq3PvEskUxwbrfgdUNesI/dUDbcjXLX9yDfzROFRovTPn8i/4FxJAdqasa37LVL /3zSNZSN1yA/6bTJ/gJULOVIA5iwCzYMSDVw0TyGU1KlpcBVaDYL98m3AAIor64vSzd1 EjOfnOKqwGUQpcqLjczw2s0wIlI96FpPzXcROzshoQx3jpFlRpkEZ+ZRB+J5k1DPsymT inFg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id j12-20020a63fc0c000000b0046f63218914si2345237pgi.311.2023.01.06.14.08.10; Fri, 06 Jan 2023 14:08:17 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236389AbjAFVyl (ORCPT + 57 others); Fri, 6 Jan 2023 16:54:41 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:39406 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229698AbjAFVyi (ORCPT ); Fri, 6 Jan 2023 16:54:38 -0500 Received: from www62.your-server.de (www62.your-server.de [213.133.104.62]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 504C52ACC; Fri, 6 Jan 2023 13:54:37 -0800 (PST) Received: from sslproxy04.your-server.de ([78.46.152.42]) by www62.your-server.de with esmtpsa (TLS1.3) tls TLS_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1pDufZ-0006V4-LP; Fri, 06 Jan 2023 22:54:33 +0100 Received: from [85.1.206.226] (helo=linux.home) by sslproxy04.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1pDufZ-000XXS-46; Fri, 06 Jan 2023 22:54:33 +0100 Subject: Re: [PATCH] bpf: skip task with pid=1 in send_signal_common() To: Stanislav Fomichev , Hao Sun Cc: bpf@vger.kernel.org, ast@kernel.org, john.fastabend@gmail.com, andrii@kernel.org, martin.lau@linux.dev, song@kernel.org, yhs@fb.com, kpsingh@kernel.org, haoluo@google.com, jolsa@kernel.org, davem@davemloft.net, linux-kernel@vger.kernel.org References: <20230106084838.12690-1-sunhao.th@gmail.com> From: Daniel Borkmann Message-ID: Date: Fri, 6 Jan 2023 22:54:32 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.103.7/26773/Fri Jan 6 09:48:44 2023) X-Spam-Status: No, score=-4.8 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/6/23 8:44 PM, Stanislav Fomichev wrote: > On Fri, Jan 6, 2023 at 12:48 AM Hao Sun wrote: >> >> The following kernel panic can be triggered when a task with pid=1 >> attach a prog that attempts to send killing signal to itself, also >> see [1] for more details: >> >> Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b >> CPU: 3 PID: 1 Comm: systemd Not tainted 6.1.0-09652-g59fe41b5255f #148 >> Call Trace: >> >> __dump_stack lib/dump_stack.c:88 [inline] >> dump_stack_lvl+0x100/0x178 lib/dump_stack.c:106 >> panic+0x2c4/0x60f kernel/panic.c:275 >> do_exit.cold+0x63/0xe4 kernel/exit.c:789 >> do_group_exit+0xd4/0x2a0 kernel/exit.c:950 >> get_signal+0x2460/0x2600 kernel/signal.c:2858 >> arch_do_signal_or_restart+0x78/0x5d0 arch/x86/kernel/signal.c:306 >> exit_to_user_mode_loop kernel/entry/common.c:168 [inline] >> exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203 >> __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline] >> syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296 >> do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86 >> entry_SYSCALL_64_after_hwframe+0x63/0xcd >> >> So skip task with pid=1 in bpf_send_signal_common() to avoid the panic. >> >> [1] https://lore.kernel.org/bpf/20221222043507.33037-1-sunhao.th@gmail.com >> >> Signed-off-by: Hao Sun > > Acked-by: Stanislav Fomichev Looks good, agree & applied. These three tests could actually be refactored and also reused in bpf_probe_write_user() given also the latter should have no business to mess with pid 1. >> kernel/trace/bpf_trace.c | 3 +++ >> 1 file changed, 3 insertions(+) >> >> diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c >> index 23ce498bca97..ed21ab9fe846 100644 >> --- a/kernel/trace/bpf_trace.c >> +++ b/kernel/trace/bpf_trace.c >> @@ -844,6 +844,9 @@ static int bpf_send_signal_common(u32 sig, enum pid_type type) >> */ >> if (unlikely(current->flags & (PF_KTHREAD | PF_EXITING))) >> return -EPERM; >> + /* Task should not be pid=1 to avoid kernel panic. */ >> + if (unlikely(is_global_init(current))) >> + return -EPERM; >> if (unlikely(!nmi_uaccess_okay())) >> return -EPERM; >> >> >> base-commit: 4aea86b4033f92f01547e6d4388d4451ae9b0980 >> -- >> 2.39.0 >>