diff options
author | bsegall@google.com <bsegall@google.com> | 2017-04-07 19:04:51 -0400 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2017-04-12 06:41:12 -0400 |
commit | d9fa4351037b60068e108465afb5ddf66b8d115e (patch) | |
tree | 7dd28a2d58e1becd717108f6f803d1c54f194ddc | |
parent | e3b08ebe47734b65a8dae73499aac4f3a6eb258e (diff) |
ptrace: fix PTRACE_LISTEN race corrupting task->state
commit 5402e97af667e35e54177af8f6575518bf251d51 upstream.
In PT_SEIZED + LISTEN mode STOP/CONT signals cause a wakeup against
__TASK_TRACED. If this races with the ptrace_unfreeze_traced at the end
of a PTRACE_LISTEN, this can wake the task /after/ the check against
__TASK_TRACED, but before the reset of state to TASK_TRACED. This
causes it to instead clobber TASK_WAKING, allowing a subsequent wakeup
against TRACED while the task is still on the rq wake_list, corrupting
it.
Oleg said:
"The kernel can crash or this can lead to other hard-to-debug problems.
In short, "task->state = TASK_TRACED" in ptrace_unfreeze_traced()
assumes that nobody else can wake it up, but PTRACE_LISTEN breaks the
contract. Obviusly it is very wrong to manipulate task->state if this
task is already running, or WAKING, or it sleeps again"
[akpm@linux-foundation.org: coding-style fixes]
Fixes: 9899d11f ("ptrace: ensure arch_ptrace/ptrace_request can never race with SIGKILL")
Link: http://lkml.kernel.org/r/xm26y3vfhmkp.fsf_-_@bsegall-linux.mtv.corp.google.com
Signed-off-by: Ben Segall <bsegall@google.com>
Acked-by: Oleg Nesterov <oleg@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
-rw-r--r-- | kernel/ptrace.c | 14 |
1 files changed, 10 insertions, 4 deletions
diff --git a/kernel/ptrace.c b/kernel/ptrace.c index 49ba7c1ade9d..a5caecef88be 100644 --- a/kernel/ptrace.c +++ b/kernel/ptrace.c | |||
@@ -181,11 +181,17 @@ static void ptrace_unfreeze_traced(struct task_struct *task) | |||
181 | 181 | ||
182 | WARN_ON(!task->ptrace || task->parent != current); | 182 | WARN_ON(!task->ptrace || task->parent != current); |
183 | 183 | ||
184 | /* | ||
185 | * PTRACE_LISTEN can allow ptrace_trap_notify to wake us up remotely. | ||
186 | * Recheck state under the lock to close this race. | ||
187 | */ | ||
184 | spin_lock_irq(&task->sighand->siglock); | 188 | spin_lock_irq(&task->sighand->siglock); |
185 | if (__fatal_signal_pending(task)) | 189 | if (task->state == __TASK_TRACED) { |
186 | wake_up_state(task, __TASK_TRACED); | 190 | if (__fatal_signal_pending(task)) |
187 | else | 191 | wake_up_state(task, __TASK_TRACED); |
188 | task->state = TASK_TRACED; | 192 | else |
193 | task->state = TASK_TRACED; | ||
194 | } | ||
189 | spin_unlock_irq(&task->sighand->siglock); | 195 | spin_unlock_irq(&task->sighand->siglock); |
190 | } | 196 | } |
191 | 197 | ||