[Devel] [PATCH 0/2] fuse: fix signals handling while processing request

Maxim Patlasov mpatlasov at virtuozzo.com
Sat Oct 15 20:21:31 PDT 2016


Stas,


On 10/14/2016 03:30 AM, Stanislav Kinsburskiy wrote:

>
>
> 14.10.2016 02:23, Maxim Patlasov пишет:
>> Stas,
>>
>>
>> The series look fine, so:
>>
>> Acked-by: Maxim Patlasov <mpatlasov at virtuozzo.com>
>>
>>
>> But, please, refine the description of the second patch. It must 
>> explain clearly why the patch fixes the problem:
>>
>> block_sigs() blocks ordinary non-fatal signals as expected, but 
>> surprisingly SIGTRAP is special: it does not matter whether it comes 
>> before or after block_sigs(), the latter does not affect SIGTRAP at 
>> all! And in contrast, wait_event_killable() is immune to it -- only 
>> fatal sig can wake it up.
>>
>
> No, Maxim. You make a mistake here.

Yes, I agree.

>
> There is nothing special with SIGTRAP (although it's being sometimes 
> sent via force_sig_info()).

OK.

>
> The problem is described as it is: block_sigs() doesn't (!) clear 
> TIG_SIGPENDING flag. All it does is blocking future signals to arrive.

OK. But I disagree with your explanation why it doesn't clear the flag.

>
> Moreover, __set_task_blocked() call recalc_sigpending(), which check 
> whether any of the signals to block is present in process pending 
> mask, and if so - set (!) TIF_SIGPENDING on the task.

Only if the correspondent bit is NOT set in blocked->sig[]:

 > case 1: ready  = signal->sig[0] &~ blocked->sig[0];

That's definitely not the case for block_sigs() who set all bits in 
blocked->sig[] except sigmask(SIGKILL). So, in our case 
recalc_sigpending() can only clear TIG_SIGPENDING flag, not set it.

> IOW, any pending signal remains pending after call to blocks_sigs().

No. Conversely: all non-fatal signals does NOT remain pending after call 
to blocks_sigs(). You can ascertain it yourself by debugging how 
block_sigs() react on "kill -USR1".

> And that's is the root of the issue (as it described in the patch 
> comment).

No. The root of the issue is in ptrace(2) calling ptrace_request(), 
calling task_set_jobctl_pending(), setting JOBCTL_TRAP_STOP in 
task->jobctl. So, when fuse calls block_sigs(), it eventually calls 
recalc_sigpending() which calls recalc_sigpending_tsk() which looks like 
this:

 >    if ((t->jobctl & JOBCTL_PENDING_MASK) ||
 >        PENDING(&t->pending, &t->blocked) ||
 >        PENDING(&t->signal->shared_pending, &t->blocked)) {
 >        set_tsk_thread_flag(t, TIF_SIGPENDING);
 >        return 1;

but as we know ptrace(2) already set JOBCTL_TRAP_STOP in task->jobctl:

 > #define JOBCTL_TRAP_MASK    (JOBCTL_TRAP_STOP | JOBCTL_TRAP_NOTIFY)
 > #define JOBCTL_PENDING_MASK    (JOBCTL_STOP_PENDING | JOBCTL_TRAP_MASK)

To sum it up, the patch from Al Viro that you backported doesn't change 
fuse behavior w.r.t signals, but it nicely replace signal_pending with 
fatal_signal_pending, and the latter solves our case because it checks 
for SIGKILL explicitly:

 > static inline int fatal_signal_pending(struct task_struct *p)
 > {
 >     return signal_pending(p) && __fatal_signal_pending(p);
 > }

 > static inline int __fatal_signal_pending(struct task_struct *p)
 > {
 >     return unlikely(sigismember(&p->pending.signal, SIGKILL));
 > }

Thanks,
Maxim

>
>> Thanks,
>> Maxim
>>
>> On 10/13/2016 03:03 AM, Stanislav Kinsburskiy wrote:
>>> This patch fixes wrong SIGBUS result in page fault handler for fuse 
>>> file, when
>>> process received a signal.
>>>
>>> https://jira.sw.ru/browse/PSBM-53581
>>>
>>> ---
>>>
>>> Stanislav Kinsburskiy (2):
>>>        new helper: wait_event_killable_exclusive()
>>>        fuse: handle only fatal signals while waiting request answer
>>>
>>>
>>>   fs/fuse/dev.c        |   42 
>>> ++++++++++++++++--------------------------
>>>   include/linux/wait.h |   26 ++++++++++++++++++++++++++
>>>   2 files changed, 42 insertions(+), 26 deletions(-)
>>>
>>> -- 
>>
>



More information about the Devel mailing list