Re: [RFC] checkpoint: handle more siginfo->si_code values

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On 06/17/2010 06:37 PM, Nathan Lynch wrote:
> I have a multithreaded testcase that easily hits the BUG() in
> fill_siginfo() by raise()'ing a signal it has blocked before
> checkpoint.  The value of si_code in this case is SI_TKILL.

Thanks for pointing out - this was indeed overlooked.

> 
> This gets my testcase to pass, but I'm not sure it's a complete
> solution...  comments?
> ---
>  kernel/signal.c |    8 ++++++--
>  1 files changed, 6 insertions(+), 2 deletions(-)
> 
> diff --git a/kernel/signal.c b/kernel/signal.c
> index e4ca9a6..cd25592 100644
> --- a/kernel/signal.c
> +++ b/kernel/signal.c
> @@ -2919,6 +2919,9 @@ static void fill_siginfo(struct ckpt_siginfo *si, siginfo_t *info)
>  	si->_errno = info->si_errno;
>  	si->code = info->si_code;
>  
> +	if (info->si_code < 0)
> +		return;
> +

This means that we do not save (nor restore) additional state
related to signals from tkill() syscall, or from other kernel
generated signals.

For example -

---
static int do_tkill(pid_t tgid, pid_t pid, int sig)
{
        struct siginfo info;

        info.si_signo = sig;
        info.si_errno = 0;
        info.si_code = SI_TKILL;
        info.si_pid = task_tgid_vnr(current);
        info.si_uid = current_uid();

        return do_send_specific(tgid, pid, sig, &info);
}
---

In this case, we lose the values of @si_pid and @si_uid fields.

The correct solution would be to examine each si_code < 0 and
add to the switch() statements (both checkpoint and restart)
to save/restart the additional information. (If it does not
carry more info, then add to the switch and do nothing).

>  	/* TODO: convert info->si_uid to uid_objref */
>  
>  	switch (info->si_code & __SI_MASK) {
> @@ -2953,7 +2956,8 @@ static void fill_siginfo(struct ckpt_siginfo *si, siginfo_t *info)
>  		si->sigval_ptr = (unsigned long) info->si_ptr;
>  		break;
>  	default:
> -		BUG();
> +		ckpt_debug("unknown si_code 0x%x\n", info->si_code);
> +		break;

The reason I put a BUG there, is to make a kernel bug visible...
and it surely worked :)

>  	}
>  }
>  
> @@ -3002,7 +3006,7 @@ static int load_siginfo(siginfo_t *info, struct ckpt_siginfo *si)
>  		info->si_ptr = (void __user *) (unsigned long) si->sigval_ptr;
>  		break;
>  	default:
> -		return -EINVAL;
> +		break;

Nack. This will allow users to inject arbitrary values here (at
the moment it's probably harmless, I think, but the kernel could
rely on values there).

Instead, let's add the missing si_code values explicitly to the
switch statement.

Thanks,

Oren.

_______________________________________________
Containers mailing list
Containers@xxxxxxxxxxxxxxxxxxxxxxxxxx
https://lists.linux-foundation.org/mailman/listinfo/containers


[Index of Archives]     [Cgroups]     [Netdev]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux