[Pkg-shadow-devel] Bug#942680: passwd: vipw does not resume properly when suspended
Todd C. Miller
Todd.Miller at sudo.ws
Sat Oct 19 23:20:11 BST 2019
Package: passwd
Version: 1:4.5-1.1
Severity: normal
Tags: patch
Dear Maintainer,
* What led up to the situation?
If vipw is suspended (e.g. via control-Z) and then resumed, it
often gets immediately suspended. This is easier to reproduce
on a multi-core system.
* What exactly did you do (or not do) that was effective (or
ineffective)?
root at buster:~# /usr/sbin/vipw
[1]+ Stopped /usr/sbin/vipw
root at buster:~# fg
/usr/sbin/vipw
[1]+ Stopped /usr/sbin/vipw
root at buster:~# fg
[vipw resumes on the second fg]
The problem is that vipw forks a child process and calls waitpid()
with the WUNTRACED flag. When the child process (running the editor)
is suspended, the parent sends itself SIGSTOP to suspend the main vipw
process. However, because the main vipw is in the same process group
as the editor which received the ^Z, the kernel already sent the
main vipw SIGTSTP.
If the main vipw receives SIGTSTP before the child, it will be
suspended and then, once resumed, will proceed to suspend itself
again.
There are two main ways to fix this. I've included patches for
each approach.
1) Don't pass the WUNTRACED flag to waitpid() in vipw.c and
just assume the main vipw will receive a stop signal from
the kernel. This is the simplest fix and works fine for
stop signals generated due to ^Z. However, if someone sends
SIGSTOP to the vipw child process via the kill command, the
parent vipw will not notice.
--- vipw.c.orig 2019-10-18 16:19:15.673956247 -0600
+++ vipw.c.simple_fix 2019-10-18 16:43:04.265583507 -0600
@@ -325,16 +325,9 @@
}
for (;;) {
- pid = waitpid (pid, &status, WUNTRACED);
- if ((pid != -1) && (WIFSTOPPED (status) != 0)) {
- /* The child (editor) was suspended.
- * Suspend vipw. */
- kill (getpid (), SIGSTOP);
- /* wake child when resumed */
- kill (pid, SIGCONT);
- } else {
+ pid = waitpid (pid, &status, 0);
+ if (pid != -1 || errno != EINTR)
break;
- }
}
if (-1 == pid) {
2) The other option is to run the child process in its own process
group as the foregroup process group. That way, control-Z will
only affect the child process and the parent can use the existing
logic to suspend the parent.
--- vipw.c.orig 2019-10-18 16:19:15.673956247 -0600
+++ vipw.c.pgrp_fix 2019-10-19 12:55:50.526591299 -0600
@@ -206,6 +206,8 @@
struct stat st1, st2;
int status;
FILE *f;
+ pid_t orig_pgrp, editor_pgrp = -1;
+ sigset_t mask, omask;
/* FIXME: the following should have variable sizes */
char filebackup[1024], fileedit[1024];
char *to_rename;
@@ -293,6 +295,8 @@
editor = DEFAULT_EDITOR;
}
+ orig_pgrp = tcgetpgrp(STDIN_FILENO);
+
pid = fork ();
if (-1 == pid) {
vipwexit ("fork", 1, 1);
@@ -302,6 +306,14 @@
char *buf;
int status;
+ /* Wait for parent to make us the foreground pgrp. */
+ if (orig_pgrp != -1) {
+ pid = getpid();
+ setpgid(0, 0);
+ while (tcgetpgrp(STDIN_FILENO) != pid)
+ continue;
+ }
+
buf = (char *) malloc (strlen (editor) + strlen (fileedit) + 2);
snprintf (buf, strlen (editor) + strlen (fileedit) + 2,
"%s %s", editor, fileedit);
@@ -324,19 +336,50 @@
}
}
+ /* Run child in a new pgrp and make it the foreground pgrp. */
+ if (orig_pgrp != -1) {
+ setpgid(pid, pid);
+ tcsetpgrp(STDIN_FILENO, pid);
+
+ /* Avoid SIGTTOU when changing foreground pgrp below. */
+ sigemptyset(&mask);
+ sigaddset(&mask, SIGTTOU);
+ sigprocmask(SIG_BLOCK, &mask, &omask);
+ }
+
for (;;) {
pid = waitpid (pid, &status, WUNTRACED);
if ((pid != -1) && (WIFSTOPPED (status) != 0)) {
/* The child (editor) was suspended.
- * Suspend vipw. */
+ * Restore terminal pgrp and suspend vipw. */
+ if (orig_pgrp != -1) {
+ editor_pgrp = tcgetpgrp(STDIN_FILENO);
+ if (editor_pgrp == -1) {
+ fprintf (stderr, "%s: %s: %s", Prog,
+ "tcgetpgrp", strerror (errno));
+ }
+ if (tcsetpgrp(STDIN_FILENO, orig_pgrp) == -1) {
+ fprintf (stderr, "%s: %s: %s", Prog,
+ "tcsetpgrp", strerror (errno));
+ }
+ }
kill (getpid (), SIGSTOP);
/* wake child when resumed */
- kill (pid, SIGCONT);
+ if (editor_pgrp != -1) {
+ if (tcsetpgrp(STDIN_FILENO, editor_pgrp) == -1) {
+ fprintf (stderr, "%s: %s: %s", Prog,
+ "tcsetpgrp", strerror (errno));
+ }
+ }
+ killpg (pid, SIGCONT);
} else {
break;
}
}
+ if (orig_pgrp != -1)
+ sigprocmask(SIG_SETMASK, &omask, NULL);
+
if (-1 == pid) {
vipwexit (editor, 1, 1);
} else if ( WIFEXITED (status)
-- System Information:
Debian Release: 10.1
APT prefers stable-updates
APT policy: (500, 'stable-updates'), (500, 'stable')
Architecture: amd64 (x86_64)
Kernel: Linux 4.19.0-6-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages passwd depends on:
ii libaudit1 1:2.8.4-3
ii libc6 2.28-10
ii libpam-modules 1.3.1-5
ii libpam0g 1.3.1-5
ii libselinux1 2.8-1+b1
ii libsemanage1 2.8-2
passwd recommends no packages.
passwd suggests no packages.
-- no debconf information
More information about the Pkg-shadow-devel
mailing list