[Containers] [PATCH 5/7] pid: Implement pid_nr

Eric W. Biederman ebiederm at xmission.com
Wed Aug 16 10:18:48 PDT 2006


Oleg Nesterov <oleg at tv-sign.ru> writes:

> On 08/16, Eric W. Biederman wrote:
>> Oleg Nesterov <oleg at tv-sign.ru> writes:
>> 
>> > On 08/15, Eric W. Biederman wrote:
>> >>
>> >> +static inline pid_t pid_nr(struct pid *pid)
>> >> +{
>> >> +	pid_t nr = 0;
>> >> +	if (pid)
>> >> +		nr = pid->nr;
>> >> +	return nr;
>> >> +}
>> >
>> > I think this is not safe, you need rcu locks here or the caller should
>> > do some locking.
>> >
>> > Let's look at f_getown() (PATCH 7/7). What if original task which was
>> > pointed by ->f_owner.pid has gone, another thread does fcntl(F_SETOWN),
>> > and pid_nr() takes a preemtion after 'if (pid)'? In this case 'pid->nr'
>> > may follow a freed memory.
>> 
>> This isn't an rcu reference.  I hold a hard reference count on
>> the pid entry.  So this should be safe.
>
> 	-static void f_modown(struct file *filp, unsigned long pid,
> 	+static void f_modown(struct file *filp, struct pid *pid, enum pid_type
> type,
> 			      uid_t uid, uid_t euid, int force)
> 	 {
> 		write_lock_irq(&filp->f_owner.lock);
> 		if (force || !filp->f_owner.pid) {
> 	-               filp->f_owner.pid = pid;
> 	+               put_pid(filp->f_owner.pid);
>
> This 'put_pid()' can actually free 'struct pid' if the task/group
> has already gone away. Another thread doing f_getown() can access
> a freed memory, no?

Good point.  In that case it looks like I need to hold the f_owner.lock.
Something needs to serialize that.

Fun. I touch the code and find a place where we didn't take a lock
and accidentally relied on integer operations being atomic.

I will see about working up a fix for that.

Eric



More information about the Containers mailing list