From: Oleg Nesterov <oleg@tv-sign.ru>
To: Roland McGrath <roland@redhat.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>,
Andrew Morton <akpm@linux-foundation.org>,
linux-kernel@vger.kernel.org
Subject: Re: [PATCH 3/3] do_wait: return security_task_wait() error code in place of -ECHILD
Date: Mon, 31 Mar 2008 15:03:12 +0400 [thread overview]
Message-ID: <20080331110312.GC400@tv-sign.ru> (raw)
In-Reply-To: <20080331035949.608A226F8E9@magilla.localdomain>
On 03/30, Roland McGrath wrote:
>
> This reverts the effect of commit f2cc3eb133baa2e9dc8efd40f417106b2ee520f3
> "do_wait: fix security checks". That change reverted the effect of commit
> 73243284463a761e04d69d22c7516b2be7de096c. The rationale for the original
> commit still stands. The inconsistent treatment of children hidden by
> ptrace was an unintended omission in the original change and in no way
> invalidates its purpose.
OK, it turns out I misunderstood the purpose of 73243284463a761e04d69d22c7516b2be7de096c,
its changelog says:
wait* syscalls return -ECHILD even when an individual PID of a live child
was requested explicitly, when security_task_wait denies the operation.
This means that something like a broken SELinux policy can produce an
unexpected failure that looks just like a bug with wait or ptrace or
something.
I wrongly thought that "-ECHILD even when an individual PID ... was requested"
was the problem.
> This makes do_wait return the error returned by security_task_wait()
> (usually -EACCES) in place of -ECHILD when there are some children the
> caller would be able to wait for if not for the permission failure. A
> permission error will give the user a clue to look for security policy
> problems, rather than for mysterious wait bugs.
OK, thanks. Again, I was confused and thought we should "hide" -EACCES
unless the child was explicitly requested.
> @@ -1463,9 +1460,22 @@ static int wait_consider_task(struct task_struct *parent,
> int __user *stat_addr, struct rusage __user *ru)
> {
> int ret = eligible_child(type, pid, options, p);
> - if (ret <= 0)
> + if (!ret)
> return ret;
>
> + if (unlikely(ret < 0)) {
> + /*
> + * If we have not yet seen any eligible child,
> + * then let this error code replace -ECHILD.
> + * A permission error will give the user a clue
> + * to look for security policy problems, rather
> + * than for mysterious wait bugs.
> + */
> + if (*retval)
> + *retval = ret;
> + return 0;
> + }
Not that I blame this patch...
Suppose that we have 2 childs. The first one is running, the second is zombie
but nacked by security_task_wait(). Now waitpid(-1, WHOHANG|WEXITED) returns 0,
a bit strange/confusing.
Yes, we have the same behaviour before this patch, but after reading your
explanation I am starting to think this is not "optimal".
Don't get me wrong, I don't claim this should be changed, just I'd like to be
sure this didn't escape your attention.
Oleg.
next prev parent reply other threads:[~2008-03-31 12:03 UTC|newest]
Thread overview: 23+ messages / expand[flat|nested] mbox.gz Atom feed top
2008-03-29 3:34 [PATCH 1/2] do_wait reorganization Roland McGrath
2008-03-29 3:35 ` [PATCH 2/2] ptrace children revamp Roland McGrath
2008-03-29 10:39 ` Oleg Nesterov
2008-03-29 13:10 ` Oleg Nesterov
2008-03-29 14:37 ` Oleg Nesterov
2008-04-04 21:00 ` Roland McGrath
2008-04-05 14:06 ` Oleg Nesterov
2008-04-09 20:15 ` Roland McGrath
2008-04-13 14:24 ` Oleg Nesterov
2008-04-15 1:41 ` Roland McGrath
2008-03-29 10:35 ` [PATCH 1/2] do_wait reorganization Oleg Nesterov
2008-03-31 3:54 ` Roland McGrath
2008-03-29 16:16 ` Linus Torvalds
2008-03-31 3:27 ` Roland McGrath
2008-03-31 3:57 ` [PATCH 1/3] " Roland McGrath
2008-03-31 3:59 ` [PATCH 2/3] ptrace children revamp Roland McGrath
2008-03-31 9:12 ` Oleg Nesterov
2008-03-31 3:59 ` [PATCH 3/3] do_wait: return security_task_wait() error code in place of -ECHILD Roland McGrath
2008-03-31 11:03 ` Oleg Nesterov [this message]
2008-03-31 20:20 ` Roland McGrath
2008-03-31 8:51 ` [PATCH 1/3] do_wait reorganization Oleg Nesterov
2008-03-31 20:29 ` Roland McGrath
2008-03-31 20:07 ` Oleg Nesterov
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20080331110312.GC400@tv-sign.ru \
--to=oleg@tv-sign.ru \
--cc=akpm@linux-foundation.org \
--cc=linux-kernel@vger.kernel.org \
--cc=roland@redhat.com \
--cc=torvalds@linux-foundation.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox