From mboxrd@z Thu Jan 1 00:00:00 1970 Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933113AbeALKFb (ORCPT + 1 other); Fri, 12 Jan 2018 05:05:31 -0500 Received: from mail-eopbgr00129.outbound.protection.outlook.com ([40.107.0.129]:45388 "EHLO EUR02-AM5-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1754515AbeALKF1 (ORCPT ); Fri, 12 Jan 2018 05:05:27 -0500 Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=ktkhai@virtuozzo.com; Subject: Re: [PATCH 3/4] tty: Iterate only thread group leaders in __do_SAK() From: Kirill Tkhai To: Oleg Nesterov Cc: linux-kernel@vger.kernel.org, gregkh@linuxfoundation.org, jslaby@suse.com, viro@zeniv.linux.org.uk, keescook@chromium.org, serge@hallyn.com, james.l.morris@oracle.com, luto@kernel.org, john.johansen@canonical.com, mingo@kernel.org, akpm@linux-foundation.org, mhocko@suse.com, peterz@infradead.org References: <151568564127.6090.3546718160925256054.stgit@localhost.localdomain> <151568582337.6090.931248807289363396.stgit@localhost.localdomain> <20180111183412.GA18725@redhat.com> <9a854275-7a72-fc54-99fa-66161732fbf9@virtuozzo.com> Message-ID: <50c23f46-f4ad-b6c8-b7bc-0a8d8449c62f@virtuozzo.com> Date: Fri, 12 Jan 2018 13:05:19 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.4.0 MIME-Version: 1.0 In-Reply-To: <9a854275-7a72-fc54-99fa-66161732fbf9@virtuozzo.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [195.214.232.6] X-ClientProxiedBy: HE1PR0701CA0073.eurprd07.prod.outlook.com (2603:10a6:3:64::17) To HE1PR0801MB1338.eurprd08.prod.outlook.com (2603:10a6:3:39::28) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 7df84eba-a3ab-40cd-ffca-08d559a3fe43 X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:(7020080)(4652020)(5600026)(4604075)(2017052603307)(7153060)(7193020);SRVR:HE1PR0801MB1338; X-Microsoft-Exchange-Diagnostics: 1;HE1PR0801MB1338;3:W+nZ1iF6QEOxMoHiInaGZlqBAHz9ZnmBPzKZZij6tJCo4UjfDtyy+L6YALYwlOViXlg7oqfKp8iaYJZCAEUIyCjHFqBwO2w7063j5O1E5TzQHw8+bEQ4IO4L1/mKiR0F2YJ77ND4zX1B5C42ipYs8jVJaP0OU5M/8ypHLBvrOhll+Bpfx25Tg+RhVxpFkYhP8db41a2uAHrJo5M2WcRazJZBYrllYHeHLN5bobvLqEqZdqok9NHSaME/CoqDrugp;25:cUg07OE1LIpUp7XGQby1Qnmd3SAu4r6DRgjPDdo1hnN3zDHoG2EZ5IV0SzeGe3Fy+rpiX406GUtGh2z813YH+9Z+GmkqRH0nRVSApQF5uCaWLeIQiSwayiSIyEU8pkMZUelYCoE9nyP8w+icVDrsI0TRfzu5B7ZefF/F0XK4UBE66MWYaLc6fTcsjfyjcsBtub/PYk3+KNc17NY4yg8F2p2MwcpfbB1Oj81sSFutvv79uZKU4IXVmYaWNxUx6jUUOtdQ7BDn035XEGxB9JF0ZlgYR/muAlZgih4v5ajRHsh+TWF9/9M3Lf17o59jJScBoVpIgZ69fVrUbxIjnuUJtA==;31:8OIPt4rvrBxybayC6p8gaiKZvhRvHljFVx4VBeVKNAOX9IQYRGKAPJVjoLhxOjX8sWOH9kiNu6UoQjyLIStDO5QMTcO0O0hxy0yBw3w7vMlaoKCw2i1Pu5/O3K3xH45q6RFqjWXcfRZgsd/UFRVxzKQPKV/8fan1z5RlxcnzGn1fg5bnH0xSMSZRK29EaiyNnMxNb8b3Wx2VqNwFOqPnDVY+Se9A5Ur21GYaIR5YLYE= X-MS-TrafficTypeDiagnostic: HE1PR0801MB1338: X-Microsoft-Exchange-Diagnostics: 1;HE1PR0801MB1338;20:VuSixoo3eX668zkp1ERdNyfDrAkYuUTaK5efPgV8X4mt9IoNFwAwMcSAKVlRBVLu/HAjeUUWJFCWormz1W/tN8Tw9aQkUVMXU3Ve5yODKxNozkeAUQJl7W7CchieukAOtFKLYCCiKz8BeDhUuEKH1LmYZWCPoFIHyAKEL/Rsh7wLwwpiymcfWSTEo+8ig8jKyTtaie1F3oiOyqTWjag8ZtDNJpqgI3eEJWQF0RCgEcQM95tx3vgivQaEEdKNUsTee6k4ohLtKy1JslQ9u6Nyqj0I2/L0KQzSxJituMIoJBOUzViJzulBZmk71nR2YASUdRCwirgctRE6LXTSLIoQhNTgTGxAasRs62vn3OYx7gBtnnIOylJN71OruFqCPdLyCfLmG8tQyaj6S3LF+nFXkiTEe3/Ei8zo5UYvmeuAnhs=;4:4lcekJcy1vdZGd0X3EsBNc9Pi4Ck4LgH7SsbSKERNd5sBrgoeittax+fRECJPzgP9p6RKZU2roG/ZtcHBOGcOM7qtxlIIESvfLZDk1JsU3f1Bi4yCtDZLFwLA+MynPtY0UgOQdKajCIRPJ3V2yT5Gn8J02AuV76ymaruBr3IYavGQeKT8e3R6M5NejuCnGc2quaDmUxPBRwYIgM7cqMZnj4xiQxa6wEOtpDXUsntJPdhDQGrEqFh+oZdSxZ3cF08x0sO8soiqWHFxED9ev9oJA== X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(6040470)(2401047)(8121501046)(5005006)(3002001)(3231023)(944501142)(93006095)(93001095)(10201501046)(6041268)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123558120)(20161123564045)(6072148)(201708071742011);SRVR:HE1PR0801MB1338;BCL:0;PCL:0;RULEID:(100000803101)(100110400095);SRVR:HE1PR0801MB1338; X-Forefront-PRVS: 0550778858 X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10019020)(6049001)(39380400002)(376002)(396003)(366004)(39850400004)(346002)(24454002)(199004)(189003)(76104003)(65826007)(59450400001)(478600001)(6116002)(8936002)(65956001)(31686004)(65806001)(81156014)(16526018)(66066001)(86362001)(64126003)(53936002)(31696002)(81166006)(8676002)(83506002)(316002)(58126008)(93886005)(16576012)(68736007)(50466002)(97736004)(25786009)(2486003)(305945005)(229853002)(6486002)(77096006)(230700001)(4326008)(2950100002)(105586002)(47776003)(52116002)(7736002)(23676004)(52146003)(7416002)(6246003)(53546011)(106356001)(36756003)(2906002)(6916009)(3846002)(76176011)(386003)(5660300001);DIR:OUT;SFP:1102;SCL:1;SRVR:HE1PR0801MB1338;H:[172.16.25.196];FPR:;SPF:None;PTR:InfoNoRecords;A:1;MX:1;LANG:en; X-Microsoft-Exchange-Diagnostics: =?utf-8?B?MTtIRTFQUjA4MDFNQjEzMzg7MjM6S0N5UEw0aXN1YXZtUjF6d3A4WnBYLzZ5?= =?utf-8?B?UG9PWFFMQVM1UStxTzkwVDFJN2ZJSGNZOFByZWJ4SFB5c1JJRjBYWjBCbHNU?= =?utf-8?B?MDVBbmRxc0hlY1lEeTB6YlVNTE1Bd3AxUWlJQTJseVk1U2M0OENGRGkrYmFr?= =?utf-8?B?VUhUcURRUkJ5MkNmOTBuUENZZGNyeFpJM2F3cDZpYTJtU1VNWkxQZkU5UWlC?= =?utf-8?B?dVg0WVlnL0xwSkhZRjA3TnJPVUNKUjIvanRDRkVWU0JMWGhmcFk1YXd0ZWZV?= =?utf-8?B?OUl1UTVtWHNOSi9FbXJzS0xMLzl4ZTBYWTN1NEdKZy9PTWZYOUZoQ25KWmZT?= =?utf-8?B?QjlQVEhlZ24ySUQyekZkTVBUb3pJenhCM1F0L0p3dE4wbWxZV1h1SkVLT2Na?= =?utf-8?B?OEdPYkp3RmZHaE4veTBxdzZyQ1Vvb1ZUOFhwTGQyalFJWENKV0haakRFb0tE?= =?utf-8?B?bTZlQ2ZDWW5zdWxxUTJUZHlZRzZiZW5BWjZWempkQXFoNEwwc0dqM0ZtM2kw?= =?utf-8?B?RXhOdFdvNWtZb3hmMDNYeklBVTRkbVV2SitjbUFrVEQ5YnljKzdEY1lzeHlj?= =?utf-8?B?NGpBbHhnMmdrTzRSdktqZXE5MUxXUVhWb3FZN3ZLRVdzSURPTWpCc3I5VUJK?= =?utf-8?B?SkVYUmtZREVWeVZIaWxZNVZXTGVPNE5ya0JQQTVENTlLTWVuS3VrY1ZqZy9i?= =?utf-8?B?SGZtUHRwUVFPcG9JcUk0YVo2TThob0h3NWRkSldPRWpOWHRLT1pHcnkzWVZ1?= =?utf-8?B?YTlIeHlDcmpzNEorVnUvdUo5aUJaUnR1dlpVbzJpbyt3Q1R5b3FmN0pFR05T?= =?utf-8?B?VzJpRWVnVkdzeGI2Q0dnZlVSck1KWEFHZy9nTE1YbUVPU0lsODh0RGVhTWhS?= =?utf-8?B?b2VDTjgzb00yQUNKekE2ZnhDem9RVVlScTZPQXlSajYzYWhmTWw2UWFWa1VU?= =?utf-8?B?My9ickk3QnNnODl6QTdRck1OL2plL3FReVYxeHlhTzJtaWdmMFZ4a05ZYWhL?= =?utf-8?B?bDg3K2d3RUxuTk1FenI0UmExUlRQUmtXSFdVNmVmY2U1VjVURVFlL2lVMERw?= =?utf-8?B?RUU5N1JKTWhuaU9PNE54VDhKendMa1pBbldZYlVHcWlad25XSVJ2emYzTklm?= =?utf-8?B?N09JcThTTlhnaWR0dXV4UFVUakhiV3lhb2tzbE05bXY3eVlLcmgyRmNRMS9z?= =?utf-8?B?N0Z3amk0UVYxU1lncjFnVWJDU3k2d21mTmN6bGdCYnpsa2xic2x1RTZSMzlV?= =?utf-8?B?b0xmazVMV3F6eEdJVmdjcGxjLzRrelUwSlQ5UFVVSzZOSzlPWkZEdTREb1FZ?= =?utf-8?B?VHJ3ODIrUkF0NndMTzhXc1RHR2FVZnIvVW9HaHg0dEcrazc2dWp2TXdCZG1O?= =?utf-8?B?bTY2VnR2eW10S3lSYlBVamFXekU0V281enVHQW1rbm9OQWJlNm9md3IzQWx0?= =?utf-8?B?WTdYOXBKcXhwaXR6VTd3akFKTTBiRWNySkxKUW1mUy9ISm9MdnBGZzcwRnh4?= =?utf-8?B?clJ4YUIwRXJUTnI3ZmVHUm9VMUVKYUlrU1J1WlFERHRHaGl4WXNtb0FvZFQ1?= =?utf-8?B?Um1rR2hVVG5TeVJ1b1F2SEdlQVBVMXV0WGY3VjVvQ0xkMWhiS2hCV01QcE5a?= =?utf-8?B?OEZZVWNydHlMRzlFTVhGb2J4UFZKZEwvdkcvM1I5Q282Z3JGR2ljWVJybEdQ?= =?utf-8?B?RFNPbEMrWjFaT0V1WmMvZktPVDBJT1NvcW9NN2hrdnppR3JjZDVUL0swa1Rh?= =?utf-8?B?YVdyNVByZ25HUHdlMmR6VTBaWHIrOHZ4NnNKOWxIbkQ4RzlvQm10TnVYT3dK?= =?utf-8?B?ZFEvVXM2WUI3aFBnNURBdlh4QzRBVFp2QzRCdnluaG5xbXdNVDhKajNLQnRZ?= =?utf-8?B?S3pSWHN2TnZzdjk1WCtxQ2Fyb3VOVzFteGNoM0ltZmUzWi9tRDJXeHBzN1ln?= =?utf-8?B?RkxlNStxeXNVd2c9PQ==?= X-Microsoft-Exchange-Diagnostics: 1;HE1PR0801MB1338;6:FHB6z3gN1wDahmLMH/Bgf0Fi7J9qlVGOAYbNwYFGuEAz69OVuquvD1ZYiE1UQgFzj56R3XdBsRVG84MKJXiQpGQ9Em7n4dgxQysygTQ9Evme0qW3VMYsnP5GdsuCwWKf0bV9UUeOJtxA516sHEQqQNC2HdmZn4TwXcd+Bx1v7gYSoK87iOk+h+4tBscIUNMXZBNADowDXheSdEGWS1+12rPRfB02CujAvbEqI6gYP0DNHSRmqrp+Sw56GQXWoQOvq+l7Qs553ovfp4hOL/GdWsRLWNcMM7UPauCl3y4l+1oq4J0kLFKVlLgdw/L5Av8F7rJ3D8QhZ/WuEV3xz4AxEllxrDBPn1aUEP62KgdNHuM=;5:y0plbxiWjqLDe8zAbaFD96bNpjWIicKt3Pa19uyKUT8BWABHthJhw/xE4SI9RqL89azei0QRZjodwrnldC623EjLs5o+bDplNi+8bo5d0qlH8eCkjLVhg51gvljSo6Y0G9cs8SzKKCmqm7L7I1dHmiep1pZZnfMd/s3ZR/x86mc=;24:PX7VvSSq5/S2x8u2Q9a5JFe/waoHnJIy7rkB8N82vuGt7cQKwzCthbSDecLZc3VxOIZYFX1fy+yzsGrhYwlOF4s3y7i7LGuxL8QyTadv0nQ=;7:ryDwr5e9MZjkYnQTWq187+EVvDtG/T8UlFq1Gr1YW6c4yMZJDzj2xvZ9MIVX/LUp+Bf23AlsoDywrFS+TDnhG6xZXOMDhKS7urEoSd3BVaQ9D/FmIdaeik1ziV3i+5yxvvkFcKNcmZdfESyeOBNVbKwHxzveEb8f+M2EyBYQtiMhBlhs1aoT5SxrgV6sg5MuqGiSWUwUQe6g/6uWO+2cnUYS4xC+K74GDOiQuSzP//f7q4skxCQXngaB2cj0Znqd SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;HE1PR0801MB1338;20:EBeWD9GNJtSeBrr7IHekBeADWe2u63WC5racWQaCWlm+qTIA47HrUlzDVB1XpSk4ra9m5HEHrTsTl4Z+7iAKYWQYg2ryZ5TRf2JL0+vHtJr7/1BgkXhRmQpF6bAg/UQxuOwIkqrGT8xA3oadus9A5loBhgtKOJ35686UEDDCKh4= X-OriginatorOrg: virtuozzo.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Jan 2018 10:05:21.8203 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 7df84eba-a3ab-40cd-ffca-08d559a3fe43 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 0bc7f26d-0264-416e-a6fc-8352af79c58f X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0801MB1338 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return-Path: On 12.01.2018 11:42, Kirill Tkhai wrote: > On 11.01.2018 21:34, Oleg Nesterov wrote: >> On 01/11, Kirill Tkhai wrote: >>> >>> Since threads can't have additional fd in comparison >>> to thread group leader >> ... >>> as they definitely have the same >>> files struct, as thread group leader. >> >> Hmm. Why? Iirc CLONE_THREAD doesn't require CLONE_FILES? > > Oh, it's really so. Surprise. Thanks for pointing that. > I'll try to find a way, how we can iterate threads fds using rcu. > >> Also. The group leader can exit, in this case its ->files == NULL >> but other threads can be alive. > > Sure, thanks, Oleg. How about this patch instead of the whole set? I left thread iterations and added sighand locking for visability. It looks like the only way, that already iterated tasks reopen tty fd again, is when they obtain it from unix scm or from foreign /proc/[pid]/fd/[fd] like it was before the patch. What do you think about this? diff --git a/drivers/tty/tty_io.c b/drivers/tty/tty_io.c index dc60aeea87d8..ab86aabfebc7 100644 --- a/drivers/tty/tty_io.c +++ b/drivers/tty/tty_io.c @@ -2706,6 +2706,7 @@ void __do_SAK(struct tty_struct *tty) #else struct task_struct *g, *p; struct pid *session; + unsigned long flags; int i; if (!tty) @@ -2723,25 +2724,51 @@ void __do_SAK(struct tty_struct *tty) task_pid_nr(p), p->comm); send_sig(SIGKILL, p, 1); } while_each_pid_task(session, PIDTYPE_SID, p); + read_unlock(&tasklist_lock); + tty_lock(tty); + rcu_read_lock(); /* Now kill any processes that happen to have the tty open */ - do_each_thread(g, p) { - if (p->signal->tty == tty) { - tty_notice(tty, "SAK: killed process %d (%s): by controlling tty\n", - task_pid_nr(p), p->comm); - send_sig(SIGKILL, p, 1); - continue; + for_each_process(g) { + for_each_thread(g, p) { + task_lock(p); + i = iterate_fd(p->files, 0, this_tty, tty); + if (i != 0) { + tty_notice(tty, "SAK: killed process %d (%s): by fd#%d\n", + task_pid_nr(p), p->comm, i - 1); + force_sig(SIGKILL, p); + } + task_unlock(p); + + /* + * p->signal is always valid for task_struct obtained + * from the task list under rcu_read_lock(). + */ + if (!i && p->signal->tty == tty) { + tty_notice(tty, "SAK: killed process %d (%s): by controlling tty\n", + task_pid_nr(p), p->comm); + send_sig(SIGKILL, p, 1); + } + + if (READ_ONCE(p->thread_node.next) == &g->signal->thread_head) { + /* Take and drop the lock to see newly forked threads */ + if (lock_task_sighand(p, &flags)) + unlock_task_sighand(p, &flags); + else { + read_lock(&tasklist_lock); + read_unlock(&tasklist_lock); + } + } } - task_lock(p); - i = iterate_fd(p->files, 0, this_tty, tty); - if (i != 0) { - tty_notice(tty, "SAK: killed process %d (%s): by fd#%d\n", - task_pid_nr(p), p->comm, i - 1); - force_sig(SIGKILL, p); + + if (unlikely(next_task(p) == &init_task)) { + /* Take and drop the lock to see newly forked tasks */ + read_lock(&tasklist_lock); + read_unlock(&tasklist_lock); } - task_unlock(p); - } while_each_thread(g, p); - read_unlock(&tasklist_lock); + } + rcu_read_unlock(); + tty_unlock(tty); #endif }