svn commit: r265003 - head/secure/usr.sbin/sshd
Konstantin Belousov
kostikbel at gmail.com
Thu Aug 21 12:32:53 UTC 2014
On Thu, Aug 21, 2014 at 01:12:46PM +0200, Roger Pau Monn? wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA1
>
> On 21/08/14 10:05, Konstantin Belousov wrote:
> > On Wed, Aug 20, 2014 at 05:34:58PM +0200, Roger Pau Monn? wrote:
> >> On 20/08/14 17:28, Bryan Drewery wrote:
> >>> On 8/20/2014 10:19 AM, Roger Pau Monn? wrote:
> >>>> On 20/08/14 17:13, Konstantin Belousov wrote:
> >>>>> On Wed, Aug 20, 2014 at 04:41:05PM +0200, Roger Pau Monn??
> >>>>> wrote:
> >>>>>> On 27/04/14 07:28, Konstantin Belousov wrote:
> >>>>>>> Author: kib Date: Sun Apr 27 05:28:14 2014 New
> >>>>>>> Revision: 265003 URL:
> >>>>>>> http://svnweb.freebsd.org/changeset/base/265003
> >>>>>>>
> >>>>>>> Log: Fix order of libthr and libc in the global dso
> >>>>>>> list for sshd, by explicitely linking main binary with
> >>>>>>> -lpthread. Before, libthr appeared in the list due to
> >>>>>>> dependency of one of the kerberos libs. Due to the
> >>>>>>> change in ld(1) behaviour of not copying NEEDED entries
> >>>>>>> from direct dependencies into the link results, the
> >>>>>>> order becomes reversed.
> >>>>>>>
> >>>>>>> The libthr must appear before libc to properly
> >>>>>>> interpose libc symbols and provide working rtld locks
> >>>>>>> implementation. The symptom was sshd hanging on rtld
> >>>>>>> bind lock during nested symbol binding from a signal
> >>>>>>> handler.
> >>>>>>>
> >>>>>>> Approved by: des (openssh maintainer) Sponsored by:
> >>>>>>> The FreeBSD Foundation MFC after: 1 week
> >>>>>>>
> >>>>>>> Modified: head/secure/usr.sbin/sshd/Makefile
> >>>>>>>
> >>>>>>> Modified: head/secure/usr.sbin/sshd/Makefile
> >>>>>>> ==============================================================================
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>>>
> >>>>>>>
> - --- head/secure/usr.sbin/sshd/Makefile Sun Apr 27 05:19:01 2014 (r265002)
> >>>>>>> +++ head/secure/usr.sbin/sshd/Makefile Sun Apr 27
> >>>>>>> 05:28:14 2014 (r265003) @@ -57,6 +57,16 @@ CFLAGS+=
> >>>>>>> -DNONE_CIPHER_ENABLED DPADD+= ${LIBCRYPT} ${LIBCRYPTO}
> >>>>>>> ${LIBZ} LDADD+= -lcrypt -lcrypto -lz
> >>>>>>>
> >>>>>>> +# Fix the order of NEEDED entries for libthr and
> >>>>>>> libc. The libthr +# needs to interpose libc symbols,
> >>>>>>> leaving the libthr loading as +# dependency of krb
> >>>>>>> causes reversed order and broken interposing. Put +#
> >>>>>>> the threading library last on the linker command line,
> >>>>>>> just before +# the -lc added by a compiler driver.
> >>>>>>> +.if ${MK_KERBEROS_SUPPORT} != "no" +DPADD+=
> >>>>>>> ${LIBPTHREAD} +LDADD+= -lpthread +.endif + .if
> >>>>>>> defined(LOCALBASE) CFLAGS+=
> >>>>>>> -DXAUTH_PATH=\"${LOCALBASE}/bin/xauth\" .endif
> >>>>>>
> >>>>>> Hello,
> >>>>>>
> >>>>>> This change makes the following simple test program fail
> >>>>>> on the second assert. The problem is that sa_handler ==
> >>>>>> SIG_DFL, and sa_flags == SA_SIGINFO, which according to
> >>>>>> the sigaction(9) man page is not possible. With this
> >>>>>> change reverted the test is successful.
> >>>>> I do not quite follow.
> >>>>>
> >>>>> What are the relations between sshd and your test program ?
> >>>>> Should the test be run somehow specially ?
> >>>>
> >>>> No, and frankly that's what I don't understand. I compile
> >>>> this simple test with `cc -o test test.c`. It fails with
> >>>> this commit applied, and succeeds without it.
> >>>>
> >>>> Roger.
> >>>>
> >>>
> >>> Does it fail if you do not connect with ssh?
> >>
> >> Right, it works fine from the serial console, fails when
> >> executed from ssh.
> >
> > I cannot reproduce it locally with your scenario, but the attached
> > program demonstrates the issue without relying on inheritance and
> > libthr.
> >
> > I think you mis-interpret the man page statement, it only says that
> > SA_SIGINFO should not be set in new->sa_flags IMO. But I do not see
> > much sense in the requirement. Note that we do not test flags for
> > correctness at all. SUSv4 is also silent on the issue.
> >
> > If this is important for your case, the following patch prevents
> > leaking of the flags for ignored of default/action signals. Could
> > you, please, describe why do you consider this a bug ?
>
> IMO, it is an inconsistency to return an invalid old sigaction, I
> assume that what is returned as the old sigaction should also be valid
> according to the man page.
>
> I realize SUSv4 don't specify such requirement, but it would still be
> wrong to use SIG_DFL with SA_SIGINFO, since SA_SIGINFO expect the
> handler to be of the type:
>
> void func(int signo, siginfo_t *info, void *context);
>
> While SIG_DLF is of type:
>
> void func(int signo);
>
> There's software out there that (wrongly?) relies on sa_action ==
> SIG_DFL and (sa_flags & SA_SIGINFO) == 0:
>
> http://xenbits.xen.org/gitweb/?p=xen.git;a=blob;f=tools/libxl/libxl_fork.c;h=fa150959adcfa6618342ba1eb0085cbba5f75d0a;hb=HEAD#l338
>
> The sa_flags check done here seems too strong in my opinion, but I
> still think it's right according to the man page.
Apparently, the original problem requires /bin/sh as the login shell to
reproduce, while I used zsh on the test box.
Below is the patch which fixes reset of flags both for sigaction(2)
and execve(2).
diff --git a/sys/kern/kern_sig.c b/sys/kern/kern_sig.c
index 561ea0a..4077ec9 100644
--- a/sys/kern/kern_sig.c
+++ b/sys/kern/kern_sig.c
@@ -621,6 +621,15 @@ sig_ffs(sigset_t *set)
return (0);
}
+static bool
+sigact_flag_test(struct sigaction *act, int flag)
+{
+
+ return ((act->sa_flags & flag) != 0 &&
+ (__sighandler_t *)act->sa_sigaction != SIG_IGN &&
+ (__sighandler_t *)act->sa_sigaction != SIG_DFL);
+}
+
/*
* kern_sigaction
* sigaction
@@ -679,7 +688,7 @@ kern_sigaction(td, sig, act, oact, flags)
ps->ps_catchmask[_SIG_IDX(sig)] = act->sa_mask;
SIG_CANTMASK(ps->ps_catchmask[_SIG_IDX(sig)]);
- if (act->sa_flags & SA_SIGINFO) {
+ if (sigact_flag_test(act, SA_SIGINFO)) {
ps->ps_sigact[_SIG_IDX(sig)] =
(__sighandler_t *)act->sa_sigaction;
SIGADDSET(ps->ps_siginfo, sig);
@@ -687,19 +696,19 @@ kern_sigaction(td, sig, act, oact, flags)
ps->ps_sigact[_SIG_IDX(sig)] = act->sa_handler;
SIGDELSET(ps->ps_siginfo, sig);
}
- if (!(act->sa_flags & SA_RESTART))
+ if (sigact_flag_test(act, SA_RESTART))
SIGADDSET(ps->ps_sigintr, sig);
else
SIGDELSET(ps->ps_sigintr, sig);
- if (act->sa_flags & SA_ONSTACK)
+ if (sigact_flag_test(act, SA_ONSTACK))
SIGADDSET(ps->ps_sigonstack, sig);
else
SIGDELSET(ps->ps_sigonstack, sig);
- if (act->sa_flags & SA_RESETHAND)
+ if (sigact_flag_test(act, SA_RESETHAND))
SIGADDSET(ps->ps_sigreset, sig);
else
SIGDELSET(ps->ps_sigreset, sig);
- if (act->sa_flags & SA_NODEFER)
+ if (sigact_flag_test(act, SA_NODEFER))
SIGADDSET(ps->ps_signodefer, sig);
else
SIGDELSET(ps->ps_signodefer, sig);
@@ -935,6 +944,11 @@ execsigs(struct proc *p)
sigqueue_delete_proc(p, sig);
}
ps->ps_sigact[_SIG_IDX(sig)] = SIG_DFL;
+ SIGDELSET(ps->ps_siginfo, sig);
+ SIGDELSET(ps->ps_sigintr, sig);
+ SIGDELSET(ps->ps_sigonstack, sig);
+ SIGDELSET(ps->ps_sigreset, sig);
+ SIGDELSET(ps->ps_signodefer, sig);
}
/*
* Reset stack state to the user stack.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 819 bytes
Desc: not available
URL: <http://lists.freebsd.org/pipermail/svn-src-head/attachments/20140821/9ed6c8fb/attachment.sig>
More information about the svn-src-head
mailing list