From: Marc Hartmayer <mhartmay@linux.ibm.com>
To: Christian Borntraeger <borntraeger@de.ibm.com>,
"Dr. David Alan Gilbert" <dgilbert@redhat.com>
Cc: qemu-devel@nongnu.org, qemu-s390x <qemu-s390x@nongnu.org>,
virtio-fs@redhat.com, Stefan Hajnoczi <stefanha@redhat.com>,
Sven Schnelle <svens@linux.ibm.com>,
Stefan Liebler <stli@linux.ibm.com>
Subject: Re: [Virtio-fs] [PATCH] virtiofsd: Add `sigreturn` to the seccomp whitelist
Date: Tue, 29 Nov 2022 11:16:47 +0100 [thread overview]
Message-ID: <87sfi2f4kw.fsf@linux.ibm.com> (raw)
In-Reply-To: <618edde1-31d8-9db8-48d9-137fe81b788b@de.ibm.com>
Christian Borntraeger <borntraeger@de.ibm.com> writes:
> Am 29.11.22 um 10:52 schrieb Christian Borntraeger:
>>
>>
>> Am 29.11.22 um 10:42 schrieb Dr. David Alan Gilbert:
>>> * Marc Hartmayer (mhartmay@linux.ibm.com) wrote:
>>>> "Dr. David Alan Gilbert" <dgilbert@redhat.com> writes:
>>>>
>>>>> * Marc Hartmayer (mhartmay@linux.ibm.com) wrote:
>>>>>> The virtiofsd currently crashes on s390x. This is because of a
>>>>>> `sigreturn` system call. See audit log below:
>>>>>>
>>>>>> type=SECCOMP msg=audit(1669382477.611:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:virtd_t:s0-s0:c0.c1023 pid=6649 comm="virtiofsd" exe="/usr/libexec/virtiofsd" sig=31 arch=80000016 syscall=119 compat=0 ip=0x3fff15f748a code=0x80000000AUID="unset" UID="root" GID="root" ARCH=s390x SYSCALL=sigreturn
>>>>>
>>>>> I'm curious; doesn't that mean that some signal is being delivered and
>>>>> you're returning? Which one?
>>>>
>>>> code=0x80000000 means that the seccomp action SECCOMP_RET_KILL_PROCESS
>>>> is taken => process is killed by a SIGSYS signal (31) [1].
>>>>
>>>> At least, that’s my understanding of this log message.
>>>>
>>>> [1] https://man7.org/linux/man-pages/man2/seccomp.2.html
>>>
>>> But isn't that the fallout rather than the cause ? i.e. seccomp
>>> is sending a SIGSYS because the process used sigreturn, my question
>>> is why did the process call sigreturn in the first place - it must
>>> have received a signal to return from?
>>
>> Good question. virtiofsd seems to prepare itself for
>>
>> int fuse_set_signal_handlers(struct fuse_session *se)
>> {
>> /*
>> * If we used SIG_IGN instead of the do_nothing function,
>> * then we would be unable to tell if we set SIG_IGN (and
>> * thus should reset to SIG_DFL in fuse_remove_signal_handlers)
>> * or if it was already set to SIG_IGN (and should be left
>> * untouched.
>> */
>> if (set_one_signal_handler(SIGHUP, exit_handler, 0) == -1 ||
>> set_one_signal_handler(SIGINT, exit_handler, 0) == -1 ||
>> set_one_signal_handler(SIGTERM, exit_handler, 0) == -1 ||
>> set_one_signal_handler(SIGPIPE, do_nothing, 0) == -1) {
>> return -1;
>> }
>>
>>
>>
>> Given that rt_sigreturn was already on the seccomp list it seems
>> to be expected that those handlers are called.
>
> For me, it seems to happen on shutdown:
> Stack trace of thread 1:
> #0 0x000003ffc06f348a __kernel_sigreturn (linux-vdso64.so.1 + 0x48a)
> #1 0x000003ffc06f3488 __kernel_sigreturn (linux-vdso64.so.1 + 0x488)
> #2 0x000003ff9af1be96 __GI___futex_abstimed_wait_cancelable64 (libc.so.6 + 0x9be96)
> #3 0x000003ff9af211b4 __pthread_clockjoin_ex (libc.so.6 + 0xa11b4)
> #4 0x000003ff9af2106e pthread_join@GLIBC_2.2 (libc.so.6 + 0xa106e)
> #5 0x000002aa35d2fe36 fv_queue_cleanup_thread (virtiofsd + 0x2fe36)
> #6 0x000002aa35d3152c stop_all_queues (virtiofsd + 0x3152c)
> #7 0x000002aa35d2869c main (virtiofsd + 0x2869c)
> #8 0x000003ff9aeb4872 __libc_start_call_main (libc.so.6 + 0x34872)
> #9 0x000003ff9aeb4950 __libc_start_main@@GLIBC_2.34 (libc.so.6 + 0x34950)
> #10 0x000002aa35d290a0 .annobin_libvhost_user.c_end.startup (virtiofsd + 0x290a0)
>
>
That’s also what I see.
--
Kind regards / Beste Grüße
Marc Hartmayer
IBM Deutschland Research & Development GmbH
Vorsitzender des Aufsichtsrats: Gregor Pillen
Geschäftsführung: David Faller
Sitz der Gesellschaft: Böblingen
Registergericht: Amtsgericht Stuttgart, HRB 243294
prev parent reply other threads:[~2022-11-29 10:16 UTC|newest]
Thread overview: 15+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-11-25 14:39 [Virtio-fs] [PATCH] virtiofsd: Add `sigreturn` to the seccomp whitelist Marc Hartmayer
2022-11-25 16:32 ` German Maglione
2022-11-28 6:18 ` Christian Borntraeger
2022-11-28 9:00 ` Marc Hartmayer
2022-11-28 10:17 ` German Maglione
2022-12-01 9:44 ` Marc Hartmayer
2022-11-25 20:50 ` Stefan Hajnoczi
2022-11-28 18:47 ` Dr. David Alan Gilbert
2022-11-29 9:38 ` Marc Hartmayer
2022-11-29 9:42 ` Dr. David Alan Gilbert
2022-11-29 9:52 ` Christian Borntraeger
2022-11-29 9:57 ` Christian Borntraeger
2022-11-29 10:16 ` Dr. David Alan Gilbert
2022-11-29 12:04 ` Stefan Hajnoczi
2022-11-29 10:16 ` Marc Hartmayer [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=87sfi2f4kw.fsf@linux.ibm.com \
--to=mhartmay@linux.ibm.com \
--cc=borntraeger@de.ibm.com \
--cc=dgilbert@redhat.com \
--cc=qemu-devel@nongnu.org \
--cc=qemu-s390x@nongnu.org \
--cc=stefanha@redhat.com \
--cc=stli@linux.ibm.com \
--cc=svens@linux.ibm.com \
--cc=virtio-fs@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox