linux-fsdevel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: "J. Bruce Fields" <bfields@fieldses.org>
To: Robert Rappaport <robert.rappaport@gmail.com>
Cc: linux-fsdevel@vger.kernel.org
Subject: Re: Problem with getting signals delivered to a Samba server
Date: Tue, 7 Aug 2007 17:56:27 -0400	[thread overview]
Message-ID: <20070807215627.GH3742@fieldses.org> (raw)
In-Reply-To: <f0a71180706261348y24625f3fu72804dafdf3666fb@mail.gmail.com>

On Tue, Jun 26, 2007 at 04:48:42PM -0400, Robert Rappaport wrote:
> A Samba server running on Linux, supporting Oplocks for its clients,
> will establish a lease for each OpLock that it grants to a client.
> Then when some other activity in the file system occurs, such as
> another application opening a file with an OpLock (and therefore a
> lease), a call is made to Linux routine, __break_lease() and this is
> supposed to result in a signal being delivered to the process which
> established the lease.  Receipt of such a signal should cause the
> process to release the lease.
>
> What I see is that the delivery of such signals appears to be
> unreliable.  The problem occurs in routine, sigio_perm(), which often
> returns a value which then leads to the signal not being delivered.
> The entire sequence of calls leading to this failure is as follows:
>
>    __break_lease() => lease_break_callback() => kill_fasync() =>
> __kill_fasync() => send_sigio() => send_sigio_to_task() =>
> sigio_perm()
>
>  Routine, sigio_perm() is very simple:
>
>  static inline int sigio_perm(struct task_struct *p,
>                              struct fown_struct *fown, int sig)
>  {
>          return (((fown->euid == 0) ||
>                   (fown->euid == p->suid) || (fown->euid == p->uid) ||
>                   (fown->uid == p->suid) || (fown->uid == p->uid)) &&
>                  !security_file_send_sigiotask(p, fown, sig));
> }

Hm.  I don't understand this code well either.  However, looking at the
F_SETOWN description in the man page for fcntl(2):

	"Sending a signal to  the  owner  process  (group)  specified by
	F_SETOWN  is  subject  to  the  same  permissions checks as are
	described for kill(2), where the sending process is the one that
	employs F_SETOWN (but see BUGS below)."

where the relevant language from kill(2) is:

	"For  a  process  to  have permission to send a signal it must
	either be privileged (under Linux: have the CAP_KILL
	capability), or the real  or effective  user  ID of the sending
	process must equal the real or saved set-user-ID of the target
	process."

it appears that the above logic is enforcing this requirement.

> And the reason that this is failing to send the signal is that the
> values for fown->euid and fown->uid are both 500, consistent with a
> user mode client, and the values of p->uid and p->suid are both zero,
> consistent with a root process, i.e. the smbd.

So it looks to me like the kernel may be correct here, and that Samba
should be calling F_SETOWN as root to ensure that this permission check
will pass.  (From a quick check of the F_SETOWN implementation in
fs/fcntl.c, it does appear to set the uid and euid to the that of the
calling process, as documented in the man pages.)

--b.

      reply	other threads:[~2007-08-07 21:56 UTC|newest]

Thread overview: 2+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2007-06-26 20:48 Problem with getting signals delivered to a Samba server Robert Rappaport
2007-08-07 21:56 ` J. Bruce Fields [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20070807215627.GH3742@fieldses.org \
    --to=bfields@fieldses.org \
    --cc=linux-fsdevel@vger.kernel.org \
    --cc=robert.rappaport@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).