From: oleg@redhat.com (Oleg Nesterov)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v9 11/11] seccomp: implement SECCOMP_FILTER_FLAG_TSYNC
Date: Wed, 9 Jul 2014 20:05:20 +0200 [thread overview]
Message-ID: <20140709180520.GA2560@redhat.com> (raw)
In-Reply-To: <1403911380-27787-12-git-send-email-keescook@chromium.org>
First of all, sorry for delay ;)
So far I quickly glanced at this series and everything look fine, but
I am confused by the signal_group_exit() check,
On 06/27, Kees Cook wrote:
>
> To make sure that de_thread() is actually able
> to kill other threads during an exec, any sighand holders need to check
> if they've been scheduled to be killed, and to give up on their work.
Probably this connects to that check below? I can't understand this...
> + /*
> + * Make sure we cannot change seccomp or nnp state via TSYNC
> + * while another thread is in the middle of calling exec.
> + */
> + if (flags & SECCOMP_FILTER_FLAG_TSYNC &&
> + mutex_lock_killable(¤t->signal->cred_guard_mutex))
> + goto out_free;
-EINVAL looks a bit confusing in this case, but this is cosemtic because
userspace won't see this error-code anyway.
> spin_lock_irq(¤t->sighand->siglock);
> + if (unlikely(signal_group_exit(current->signal))) {
> + /* If thread is dying, return to process the signal. */
OK, this doesn't hurt, but why?
You could check __fatal_signal_pending() with the same effect. And since
we hold this mutex, exec (de_thread) can be the source of that SIGKILL.
We take this mutex specially to avoid the race with exec.
So why do we need to abort if we race with kill() or exit_grouo() ?
Oleg.
next prev parent reply other threads:[~2014-07-09 18:05 UTC|newest]
Thread overview: 23+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-06-27 23:22 [PATCH v9 0/11] seccomp: add thread sync ability Kees Cook
2014-06-27 23:22 ` [PATCH v9 01/11] seccomp: create internal mode-setting function Kees Cook
2014-06-27 23:22 ` [PATCH v9 02/11] seccomp: extract check/assign mode helpers Kees Cook
2014-06-27 23:22 ` [PATCH v9 03/11] seccomp: split mode setting routines Kees Cook
2014-06-27 23:22 ` [PATCH v9 04/11] seccomp: add "seccomp" syscall Kees Cook
2014-06-27 23:22 ` [PATCH v9 05/11] ARM: add seccomp syscall Kees Cook
2014-06-27 23:22 ` [PATCH v9 06/11] MIPS: " Kees Cook
2014-06-27 23:22 ` [PATCH v9 07/11] sched: move no_new_privs into new atomic flags Kees Cook
2014-06-27 23:22 ` [PATCH v9 08/11] seccomp: split filter prep from check and apply Kees Cook
2014-06-27 23:22 ` [PATCH v9 09/11] seccomp: introduce writer locking Kees Cook
2014-07-09 18:42 ` Oleg Nesterov
2014-07-09 18:55 ` Oleg Nesterov
2014-07-10 9:25 ` Kees Cook
2014-07-10 15:24 ` Oleg Nesterov
2014-07-10 16:54 ` Kees Cook
2014-07-10 17:35 ` Oleg Nesterov
2014-07-09 18:59 ` Oleg Nesterov
2014-06-27 23:22 ` [PATCH v9 10/11] seccomp: allow mode setting across threads Kees Cook
2014-06-27 23:23 ` [PATCH v9 11/11] seccomp: implement SECCOMP_FILTER_FLAG_TSYNC Kees Cook
2014-07-09 18:05 ` Oleg Nesterov [this message]
2014-07-10 9:17 ` Kees Cook
2014-07-10 15:08 ` Oleg Nesterov
2014-07-10 16:03 ` Kees Cook
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20140709180520.GA2560@redhat.com \
--to=oleg@redhat.com \
--cc=linux-arm-kernel@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).