Message ID | 20230106084838.12690-1-sunhao.th@gmail.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a5d:4e01:0:0:0:0:0 with SMTP id p1csp718634wrt; Fri, 6 Jan 2023 00:54:25 -0800 (PST) X-Google-Smtp-Source: AMrXdXvW64uWGCXWmbVMI6JdnCfMW0toK9mgMTsnZns/7jYgmRjg+cg9jy+RqlLeCkwTjKNFhpg+ X-Received: by 2002:a17:907:c712:b0:7bd:6372:fdb4 with SMTP id ty18-20020a170907c71200b007bd6372fdb4mr64649471ejc.41.1672995265516; Fri, 06 Jan 2023 00:54:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1672995265; cv=none; d=google.com; s=arc-20160816; b=h6cA1hZNWSpUG90HOBue0U2nXIf+CwS/DvRKiWjDEpNBnKlmINIVMdxvh14JQb/ZzG GEJTKKrcYnOVW1FP82QtCbnNcL3dbPCVIp8Q1hkLWDVw1w0L4SQvHnhoHO5GgMp+NJ5n +pbBuW6buxzPfkwLt/QPdEcCMRb3+Ove6TDQ/sDA3mQw/gMnyQ3XHQDcZwejSAP7v/5s I/mPtc1TzBGRn0YPQ6GOnEZaKB2NPWoZXwKbqX0kYG3MTZPn+sIOASpqL948yaVXW08x BcZU5MyeiRfIK801bgDRHgOoOlD6T5K6l8aPvNWg7UX2Bltxn9LZwZva0QjXb+Sul5BN 1vsQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=CLvpBtlWPC1Y4yYI2pgDTW/iPqU69O+/L6LCbdiNubM=; b=RuO/rsu6bHatm7IjSKL8DdVtTS7W73KQo/oVR9L/Uw0BHokrtDRRey//JO6jhYddOz Uw1oCIZJgctpJhb2h9+WCDGfPa90vmaxe4ZzhNMBYTSec30WP1nmi6y5+b7rudYQQ01G 8dX0e/soNWbWSglxwzWbGSyzfbmMzXOLQOTf1PFVFXN0KcTbH3MomZ0l5M3luOvijaU/ tvyZdVA94HwKNo2parBcS2BDy6i7NpleENzXE0RTaETR4lcM0CrV67SxGInPbFcGUqA4 hxdxPmC9xQ2kJaFrWUjHU8yI+5R4TZTP96IF1nKYtNcCwDas3TyLaEKsFCeuoSq8h5Of CdRw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=lHv5XTXi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id e10-20020a056402190a00b00489b995ceffsi1324154edz.196.2023.01.06.00.54.01; Fri, 06 Jan 2023 00:54:25 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=lHv5XTXi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232086AbjAFIs6 (ORCPT <rfc822;tmhikaru@gmail.com> + 99 others); Fri, 6 Jan 2023 03:48:58 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56822 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232243AbjAFIsp (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Fri, 6 Jan 2023 03:48:45 -0500 Received: from mail-pj1-x102c.google.com (mail-pj1-x102c.google.com [IPv6:2607:f8b0:4864:20::102c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1E48954724; Fri, 6 Jan 2023 00:48:45 -0800 (PST) Received: by mail-pj1-x102c.google.com with SMTP id j8-20020a17090a3e0800b00225fdd5007fso1054800pjc.2; Fri, 06 Jan 2023 00:48:45 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=CLvpBtlWPC1Y4yYI2pgDTW/iPqU69O+/L6LCbdiNubM=; b=lHv5XTXiqHurmIC9daS85WL8F1hlIf+iMEPyKW/hqT5o6m23V36EImDG5+lebQRKh7 2rP/ozBPce66wr0G1nAHk8/dW/TCH5f1TsDPgdXZmFDqO5RiiValeEKncRc2RHt4kILf eonuRBauT79z5oxxhHdll1stttLZGbIvf+OyUqPvaVX5K7Bg4/2e85/Wgh3kvRtnjoql hS8c9IpERfH9+FDXga1NmZqwbw/Qrr0D8PaqUpr+7sRtH5lorO8aHxZu06g51dOUf58b m+KeVRccO0fjzADOYFQplOOFDksFH4Eeo2d/d3NFs6OyU6noDiqMFRtJEoc79SyrI4Tm iNfw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=CLvpBtlWPC1Y4yYI2pgDTW/iPqU69O+/L6LCbdiNubM=; b=B/1+p1JdVnUiUe32VPR8lhWnBhvDJUVYXqzpxz7HTdkFt1QCmBJEM2apcev/0Rcff4 KU902RQ6gulDaVRXm11RUGLE3MRxNvyV1oatRLAypIBC9INfKGeYBzQNGGiq3UUnbMnS 5DdJv1rJqJlw0FQAj4+u17ASED2bscNbzcJnpPfnerrSTT5Lii1CUOk/XNUKkOMcWehX 2iV2CF6Q9Pz3JsWCUu6gyk5H4jXKAgY4PzdFaSW2OOVuukscWhdStOb/kuzeDa4qqB+t jf9d80bmNDm4ClKYu9iTZhNwvxh8OaRiIr3OLKNNSD7EsiPG+Th9jETWi92edhbbYEsW C2Ig== X-Gm-Message-State: AFqh2kr2RC8/QBK6Jq5QQQPD31rJ2ePGt39g7Roo0y9jfFplAmWhZxj/ K7UDD4+ueGWvV4r4Mgmx45wcram2Mw/y X-Received: by 2002:a17:902:d346:b0:192:9160:6cd with SMTP id l6-20020a170902d34600b00192916006cdmr35802234plk.13.1672994924239; Fri, 06 Jan 2023 00:48:44 -0800 (PST) Received: from localhost.localdomain ([144.214.0.13]) by smtp.gmail.com with ESMTPSA id o9-20020a170903210900b0017fe9b038fdsm469840ple.14.2023.01.06.00.48.41 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256); Fri, 06 Jan 2023 00:48:43 -0800 (PST) From: Hao Sun <sunhao.th@gmail.com> To: bpf@vger.kernel.org Cc: ast@kernel.org, daniel@iogearbox.net, john.fastabend@gmail.com, andrii@kernel.org, martin.lau@linux.dev, song@kernel.org, yhs@fb.com, kpsingh@kernel.org, sdf@google.com, haoluo@google.com, jolsa@kernel.org, davem@davemloft.net, linux-kernel@vger.kernel.org, Hao Sun <sunhao.th@gmail.com> Subject: [PATCH] bpf: skip task with pid=1 in send_signal_common() Date: Fri, 6 Jan 2023 16:48:38 +0800 Message-Id: <20230106084838.12690-1-sunhao.th@gmail.com> X-Mailer: git-send-email 2.37.1 (Apple Git-137.1) MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1754262683397937435?= X-GMAIL-MSGID: =?utf-8?q?1754262683397937435?= |
Series |
bpf: skip task with pid=1 in send_signal_common()
|
|
Commit Message
Hao Sun
Jan. 6, 2023, 8:48 a.m. UTC
The following kernel panic can be triggered when a task with pid=1
attach a prog that attempts to send killing signal to itself, also
see [1] for more details:
Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b
CPU: 3 PID: 1 Comm: systemd Not tainted 6.1.0-09652-g59fe41b5255f #148
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x100/0x178 lib/dump_stack.c:106
panic+0x2c4/0x60f kernel/panic.c:275
do_exit.cold+0x63/0xe4 kernel/exit.c:789
do_group_exit+0xd4/0x2a0 kernel/exit.c:950
get_signal+0x2460/0x2600 kernel/signal.c:2858
arch_do_signal_or_restart+0x78/0x5d0 arch/x86/kernel/signal.c:306
exit_to_user_mode_loop kernel/entry/common.c:168 [inline]
exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203
__syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline]
syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296
do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86
entry_SYSCALL_64_after_hwframe+0x63/0xcd
So skip task with pid=1 in bpf_send_signal_common() to avoid the panic.
[1] https://lore.kernel.org/bpf/20221222043507.33037-1-sunhao.th@gmail.com
Signed-off-by: Hao Sun <sunhao.th@gmail.com>
---
kernel/trace/bpf_trace.c | 3 +++
1 file changed, 3 insertions(+)
base-commit: 4aea86b4033f92f01547e6d4388d4451ae9b0980
Comments
On Fri, Jan 6, 2023 at 12:48 AM Hao Sun <sunhao.th@gmail.com> wrote: > > The following kernel panic can be triggered when a task with pid=1 > attach a prog that attempts to send killing signal to itself, also > see [1] for more details: > > Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b > CPU: 3 PID: 1 Comm: systemd Not tainted 6.1.0-09652-g59fe41b5255f #148 > Call Trace: > <TASK> > __dump_stack lib/dump_stack.c:88 [inline] > dump_stack_lvl+0x100/0x178 lib/dump_stack.c:106 > panic+0x2c4/0x60f kernel/panic.c:275 > do_exit.cold+0x63/0xe4 kernel/exit.c:789 > do_group_exit+0xd4/0x2a0 kernel/exit.c:950 > get_signal+0x2460/0x2600 kernel/signal.c:2858 > arch_do_signal_or_restart+0x78/0x5d0 arch/x86/kernel/signal.c:306 > exit_to_user_mode_loop kernel/entry/common.c:168 [inline] > exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203 > __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline] > syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296 > do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86 > entry_SYSCALL_64_after_hwframe+0x63/0xcd > > So skip task with pid=1 in bpf_send_signal_common() to avoid the panic. > > [1] https://lore.kernel.org/bpf/20221222043507.33037-1-sunhao.th@gmail.com > > Signed-off-by: Hao Sun <sunhao.th@gmail.com> Acked-by: Stanislav Fomichev <sdf@google.com> > --- > kernel/trace/bpf_trace.c | 3 +++ > 1 file changed, 3 insertions(+) > > diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c > index 23ce498bca97..ed21ab9fe846 100644 > --- a/kernel/trace/bpf_trace.c > +++ b/kernel/trace/bpf_trace.c > @@ -844,6 +844,9 @@ static int bpf_send_signal_common(u32 sig, enum pid_type type) > */ > if (unlikely(current->flags & (PF_KTHREAD | PF_EXITING))) > return -EPERM; > + /* Task should not be pid=1 to avoid kernel panic. */ > + if (unlikely(is_global_init(current))) > + return -EPERM; > if (unlikely(!nmi_uaccess_okay())) > return -EPERM; > > > base-commit: 4aea86b4033f92f01547e6d4388d4451ae9b0980 > -- > 2.39.0 >
On 1/6/23 8:44 PM, Stanislav Fomichev wrote: > On Fri, Jan 6, 2023 at 12:48 AM Hao Sun <sunhao.th@gmail.com> wrote: >> >> The following kernel panic can be triggered when a task with pid=1 >> attach a prog that attempts to send killing signal to itself, also >> see [1] for more details: >> >> Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b >> CPU: 3 PID: 1 Comm: systemd Not tainted 6.1.0-09652-g59fe41b5255f #148 >> Call Trace: >> <TASK> >> __dump_stack lib/dump_stack.c:88 [inline] >> dump_stack_lvl+0x100/0x178 lib/dump_stack.c:106 >> panic+0x2c4/0x60f kernel/panic.c:275 >> do_exit.cold+0x63/0xe4 kernel/exit.c:789 >> do_group_exit+0xd4/0x2a0 kernel/exit.c:950 >> get_signal+0x2460/0x2600 kernel/signal.c:2858 >> arch_do_signal_or_restart+0x78/0x5d0 arch/x86/kernel/signal.c:306 >> exit_to_user_mode_loop kernel/entry/common.c:168 [inline] >> exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203 >> __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline] >> syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296 >> do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86 >> entry_SYSCALL_64_after_hwframe+0x63/0xcd >> >> So skip task with pid=1 in bpf_send_signal_common() to avoid the panic. >> >> [1] https://lore.kernel.org/bpf/20221222043507.33037-1-sunhao.th@gmail.com >> >> Signed-off-by: Hao Sun <sunhao.th@gmail.com> > > Acked-by: Stanislav Fomichev <sdf@google.com> Looks good, agree & applied. These three tests could actually be refactored and also reused in bpf_probe_write_user() given also the latter should have no business to mess with pid 1. >> kernel/trace/bpf_trace.c | 3 +++ >> 1 file changed, 3 insertions(+) >> >> diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c >> index 23ce498bca97..ed21ab9fe846 100644 >> --- a/kernel/trace/bpf_trace.c >> +++ b/kernel/trace/bpf_trace.c >> @@ -844,6 +844,9 @@ static int bpf_send_signal_common(u32 sig, enum pid_type type) >> */ >> if (unlikely(current->flags & (PF_KTHREAD | PF_EXITING))) >> return -EPERM; >> + /* Task should not be pid=1 to avoid kernel panic. */ >> + if (unlikely(is_global_init(current))) >> + return -EPERM; >> if (unlikely(!nmi_uaccess_okay())) >> return -EPERM; >> >> >> base-commit: 4aea86b4033f92f01547e6d4388d4451ae9b0980 >> -- >> 2.39.0 >>
Hello: This patch was applied to bpf/bpf.git (master) by Daniel Borkmann <daniel@iogearbox.net>: On Fri, 6 Jan 2023 16:48:38 +0800 you wrote: > The following kernel panic can be triggered when a task with pid=1 > attach a prog that attempts to send killing signal to itself, also > see [1] for more details: > > Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b > CPU: 3 PID: 1 Comm: systemd Not tainted 6.1.0-09652-g59fe41b5255f #148 > Call Trace: > <TASK> > __dump_stack lib/dump_stack.c:88 [inline] > dump_stack_lvl+0x100/0x178 lib/dump_stack.c:106 > panic+0x2c4/0x60f kernel/panic.c:275 > do_exit.cold+0x63/0xe4 kernel/exit.c:789 > do_group_exit+0xd4/0x2a0 kernel/exit.c:950 > get_signal+0x2460/0x2600 kernel/signal.c:2858 > arch_do_signal_or_restart+0x78/0x5d0 arch/x86/kernel/signal.c:306 > exit_to_user_mode_loop kernel/entry/common.c:168 [inline] > exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203 > __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline] > syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296 > do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86 > entry_SYSCALL_64_after_hwframe+0x63/0xcd > > [...] Here is the summary with links: - bpf: skip task with pid=1 in send_signal_common() https://git.kernel.org/bpf/bpf/c/a3d81bc1eaef You are awesome, thank you!
On Fri, Jan 06, 2023 at 02:18:38PM IST, Hao Sun wrote: > The following kernel panic can be triggered when a task with pid=1 > attach a prog that attempts to send killing signal to itself, also > see [1] for more details: > > Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b > CPU: 3 PID: 1 Comm: systemd Not tainted 6.1.0-09652-g59fe41b5255f #148 > Call Trace: > <TASK> > __dump_stack lib/dump_stack.c:88 [inline] > dump_stack_lvl+0x100/0x178 lib/dump_stack.c:106 > panic+0x2c4/0x60f kernel/panic.c:275 > do_exit.cold+0x63/0xe4 kernel/exit.c:789 > do_group_exit+0xd4/0x2a0 kernel/exit.c:950 > get_signal+0x2460/0x2600 kernel/signal.c:2858 > arch_do_signal_or_restart+0x78/0x5d0 arch/x86/kernel/signal.c:306 > exit_to_user_mode_loop kernel/entry/common.c:168 [inline] > exit_to_user_mode_prepare+0x15f/0x250 kernel/entry/common.c:203 > __syscall_exit_to_user_mode_work kernel/entry/common.c:285 [inline] > syscall_exit_to_user_mode+0x1d/0x50 kernel/entry/common.c:296 > do_syscall_64+0x44/0xb0 arch/x86/entry/common.c:86 > entry_SYSCALL_64_after_hwframe+0x63/0xcd > > So skip task with pid=1 in bpf_send_signal_common() to avoid the panic. > > [1] https://lore.kernel.org/bpf/20221222043507.33037-1-sunhao.th@gmail.com > > Signed-off-by: Hao Sun <sunhao.th@gmail.com> > --- > kernel/trace/bpf_trace.c | 3 +++ > 1 file changed, 3 insertions(+) > > diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c > index 23ce498bca97..ed21ab9fe846 100644 > --- a/kernel/trace/bpf_trace.c > +++ b/kernel/trace/bpf_trace.c > @@ -844,6 +844,9 @@ static int bpf_send_signal_common(u32 sig, enum pid_type type) > */ > if (unlikely(current->flags & (PF_KTHREAD | PF_EXITING))) > return -EPERM; > + /* Task should not be pid=1 to avoid kernel panic. */ > + if (unlikely(is_global_init(current))) > + return -EPERM; Sorry for chiming in late. This seems a bit too restrictive, there are a lot of legitimate signals that can be sent to the init process (like the ones listed in man 1 systemd). Maybe you should only prevent sig == SIGKILL and not others?
diff --git a/kernel/trace/bpf_trace.c b/kernel/trace/bpf_trace.c index 23ce498bca97..ed21ab9fe846 100644 --- a/kernel/trace/bpf_trace.c +++ b/kernel/trace/bpf_trace.c @@ -844,6 +844,9 @@ static int bpf_send_signal_common(u32 sig, enum pid_type type) */ if (unlikely(current->flags & (PF_KTHREAD | PF_EXITING))) return -EPERM; + /* Task should not be pid=1 to avoid kernel panic. */ + if (unlikely(is_global_init(current))) + return -EPERM; if (unlikely(!nmi_uaccess_okay())) return -EPERM;