public inbox for linux-kernel@vger.kernel.org
 help / color / mirror / Atom feed
* [PATCH] ptrace: kill BKL in ptrace syscall
@ 2010-03-28 21:38 Frederic Weisbecker
  2010-03-28 21:45 ` Frederic Weisbecker
  2010-03-29 11:40 ` Oleg Nesterov
  0 siblings, 2 replies; 14+ messages in thread
From: Frederic Weisbecker @ 2010-03-28 21:38 UTC (permalink / raw)
  To: Roland McGrath, Oleg Nesterov
  Cc: LKML, Arnd Bergmann, Andrew Morton, Frederic Weisbecker

From: Arnd Bergmann <arnd@arndb.de>

The comment suggests that this usage is stale. There is no bkl in the
exec path so if there is a race lurking there, the bkl in ptrace is
not going to help in this regard.

Overview of the possibility of "accidental" races this bkl might
protect:

- ptrace_traceme() is protected against task removal and concurrent
read/write on current->ptrace as it locks write tasklist_lock.

- arch_ptrace_attach() is serialized by ptrace_traceme() against
concurrent PTRACE_TRACEME or PTRACE_ATTACH

- ptrace_attach() is protected the same way ptrace_traceme() and
in turn serializes arch_ptrace_attach()

- ptrace_check_attach() does its own well described serializing too.

There is no obvious race here.

Signed-off-by: Arnd Bergmann <arnd@arndb.de>
Signed-off-by: Frederic Weisbecker <fweisbec@gmail.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
---
 kernel/ptrace.c |   10 ----------
 1 files changed, 0 insertions(+), 10 deletions(-)

diff --git a/kernel/ptrace.c b/kernel/ptrace.c
index 42ad8ae..5357502 100644
--- a/kernel/ptrace.c
+++ b/kernel/ptrace.c
@@ -666,10 +666,6 @@ SYSCALL_DEFINE4(ptrace, long, request, long, pid, long, addr, long, data)
 	struct task_struct *child;
 	long ret;
 
-	/*
-	 * This lock_kernel fixes a subtle race with suid exec
-	 */
-	lock_kernel();
 	if (request == PTRACE_TRACEME) {
 		ret = ptrace_traceme();
 		if (!ret)
@@ -703,7 +699,6 @@ SYSCALL_DEFINE4(ptrace, long, request, long, pid, long, addr, long, data)
  out_put_task_struct:
 	put_task_struct(child);
  out:
-	unlock_kernel();
 	return ret;
 }
 
@@ -813,10 +808,6 @@ asmlinkage long compat_sys_ptrace(compat_long_t request, compat_long_t pid,
 	struct task_struct *child;
 	long ret;
 
-	/*
-	 * This lock_kernel fixes a subtle race with suid exec
-	 */
-	lock_kernel();
 	if (request == PTRACE_TRACEME) {
 		ret = ptrace_traceme();
 		goto out;
@@ -846,7 +837,6 @@ asmlinkage long compat_sys_ptrace(compat_long_t request, compat_long_t pid,
  out_put_task_struct:
 	put_task_struct(child);
  out:
-	unlock_kernel();
 	return ret;
 }
 #endif	/* CONFIG_COMPAT */
-- 
1.6.2.3


^ permalink raw reply related	[flat|nested] 14+ messages in thread

end of thread, other threads:[~2010-04-12 23:56 UTC | newest]

Thread overview: 14+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2010-03-28 21:38 [PATCH] ptrace: kill BKL in ptrace syscall Frederic Weisbecker
2010-03-28 21:45 ` Frederic Weisbecker
2010-03-29 11:40 ` Oleg Nesterov
2010-03-29 12:06   ` John Kacur
2010-03-29 13:05     ` Oleg Nesterov
2010-03-29 13:26       ` John Kacur
2010-03-29 18:22         ` Frederic Weisbecker
2010-03-29 18:35           ` Oleg Nesterov
2010-03-29 18:46             ` Frederic Weisbecker
2010-04-01 18:48             ` Frederic Weisbecker
2010-04-12 20:29               ` Andrew Morton
2010-04-12 20:32                 ` Frederic Weisbecker
2010-04-12 23:56                 ` Stephen Rothwell
2010-04-09 21:43   ` Roland McGrath

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox