Page MenuHomeFreeBSD

Only return EPERM from kill(-pid) when no process was signalled.
ClosedPublic

Authored by kib on Dec 1 2019, 3:21 PM.
Tags
None
Referenced Files
Unknown Object (File)
Mar 14 2024, 6:17 PM
Unknown Object (File)
Mar 7 2024, 11:48 PM
Unknown Object (File)
Feb 24 2024, 7:25 PM
Unknown Object (File)
Feb 20 2024, 5:40 PM
Unknown Object (File)
Jan 26 2024, 5:56 AM
Unknown Object (File)
Jan 14 2024, 2:26 PM
Unknown Object (File)
Jan 7 2024, 2:24 AM
Unknown Object (File)
Jan 7 2024, 2:24 AM
Subscribers

Diff Detail

Repository
rS FreeBSD src repository - subversion
Lint
Lint Skipped
Unit
Tests Skipped
Build Status
Buildable 27987

Event Timeline

  • if the intent is to make the logic match POSIX, the manpage should be updated to exclude the mention of uid matching which contradicts both POSIX and the code
  • this does not fix the original misbehavior in case of case (kill(-1, 0) with uid != 0 and no other processes with that uid):
    • since no processes are signalled, sent_one would be false
    • since there almost always are processes which cannot be signalled (e.g. ones belonging to root), ret would be EPERM, which again is returned, while it should be ESRCH instead

According to POSIX, killpg1 should never return EPERM, as all three cases mention "permission to send a signal".

If pid is 0, sig shall be sent to all processes (excluding an unspecified set of system processes) whose process group ID is equal to the process group ID of the sender, and for which the process has permission to send a signal.

If pid is -1, sig shall be sent to all processes (excluding an unspecified set of system processes) for which the process has permission to send that signal.

If pid is negative, but not -1, sig shall be sent to all processes (excluding an unspecified set of system processes) whose process group ID is equal to the absolute value of pid, and for which the process has permission to send a signal.

So it should return either ESRCH, or 0 if any process could be signalled. So the change should probably be to just remove else if branches from original code.

  • if the intent is to make the logic match POSIX, the manpage should be updated to exclude the mention of uid matching which contradicts both POSIX and the code
  • this does not fix the original misbehavior in case of case (kill(-1, 0) with uid != 0 and no other processes with that uid):
    • since no processes are signalled, sent_one would be false
    • since there almost always are processes which cannot be signalled (e.g. ones belonging to root), ret would be EPERM, which again is returned, while it should be ESRCH instead

According to POSIX, killpg1 should never return EPERM, as all three cases mention "permission to send a signal".

If pid is 0, sig shall be sent to all processes (excluding an unspecified set of system processes) whose process group ID is equal to the process group ID of the sender, and for which the process has permission to send a signal.

If pid is -1, sig shall be sent to all processes (excluding an unspecified set of system processes) for which the process has permission to send that signal.

If pid is negative, but not -1, sig shall be sent to all processes (excluding an unspecified set of system processes) whose process group ID is equal to the absolute value of pid, and for which the process has permission to send a signal.

So it should return either ESRCH, or 0 if any process could be signalled. So the change should probably be to just remove else if branches from original code.

According to POSIX, both kill() and killpg() shall return EPERM, exactly when there is no a process for which permissions would allow send, but there are processes which permissions to test.

And the kill(2) manual page is actually good enough. It explains typical reasons for permission checks failure, I do not see why any of them should be removed. There might be some useful addition stating that more permission checks could be done, e.g. by a MAC module. There is even a sentence at line 109 that catches the issue I fixed in the error section.

I think the part "to all processes with the same uid as the user" is rather vague now, and would probably be better written as "to all processes which the caller has permission to", given that permission checks are quite complicated nowadays.

The [ESRCH] error seems not to be excluded when pid is negative in my reading, so the code in the review seems functionally correct.

The use of an integer that is being compared to together with a boolean may not be the clearest way to write this. Perhaps it is clearer to have a boolean indicating a signal was sent, a boolean indicating that a process was found, allowed to be visible but not to be signalled (EPERM) and an integer for weird errors (not EPERM and not ESRCH).

Our exclusion of the process itself with pid == -1 is not very clearly described in POSIX but changing that may not be a good idea.

Slightly related, the part "For compatibility with System V," about pids less than -1 can perhaps be removed as that feature is accepted as a standard feature nowadays.

sys/kern/kern_sig.c
1755–1756

POSIX is pretty clear that any successful signal sent (or signal that could be sent, if sig == 0) will cause kill() to succeed (not return an error). Given that if sent_one is true, ret can either be EPERM or 0 (under the assumption that p_cansignal() returns 0, EPERM or ESRCH), the part ret == EPERM && is only for special cases.

The question here is whether a "buggy" failure (such as because of an obscure edge case in locking which is not handled, or something) should be reported to the application, violating the letter of POSIX, or should be ignored if some other process was signalled, possibly confusing the application and making it hard to debug.

Use bool controls both for EPERM and ESRCH.
More edits to manpage.

jilles requested changes to this revision.Dec 6 2019, 5:02 PM
jilles added inline comments.
sys/kern/kern_sig.c
1706

found should only be set to true if p_cansignal() does not return ESRCH, so we don't admit a process exists when we should not due to restrictions like security.bsd.see_other_uids.

This revision now requires changes to proceed.Dec 6 2019, 5:02 PM
kib marked an inline comment as done.Dec 6 2019, 5:45 PM
kib added inline comments.
sys/kern/kern_sig.c
1706

I was actually not quite sure does p_cansignal() and code which it calls like prison_<something> care about returning ESRCH when visibility is denied (vs. returning something else), but it seems fine.

kib marked an inline comment as done.

Do not set 'found' if p_cansignal() returned ESRCH.
Restructure code to unify signal sending and error calculation.
Reduce proc_lock scope.

This revision is now accepted and ready to land.Dec 7 2019, 12:32 PM