The patch titled
     Subject: proc: actually make proc_fd_permission() thread-friendly
has been added to the -mm tree.  Its filename is
     proc-actually-make-proc_fd_permission-thread-friendly.patch

This patch should soon appear at
    
http://ozlabs.org/~akpm/mmots/broken-out/proc-actually-make-proc_fd_permission-thread-friendly.patch
and later at
    
http://ozlabs.org/~akpm/mmotm/broken-out/proc-actually-make-proc_fd_permission-thread-friendly.patch

Before you just go and hit "reply", please:
   a) Consider who else should be cc'ed
   b) Prefer to cc a suitable mailing list as well
   c) Ideally: find the original patch on the mailing list and do a
      reply-to-all to that, adding suitable additional cc's

*** Remember to use Documentation/SubmitChecklist when testing your code ***

The -mm tree is included into linux-next and is updated
there every 3-4 working days

------------------------------------------------------
From: Oleg Nesterov <[email protected]>
Subject: proc: actually make proc_fd_permission() thread-friendly

The commit 96d0df79f264 ("proc: make proc_fd_permission() thread-friendly")
fixed the access to /proc/self/fd from sub-threads, but introduced another
problem: a sub-thread can't access /proc/<tid>/fd/ or /proc/thread-self/fd
if generic_permission() fails.

Change proc_fd_permission() to check same_thread_group(pid_task(), current).

Reported-by: "Jin, Yihua" <[email protected]>
Signed-off-by: Oleg Nesterov <[email protected]>
Cc: "Eric W. Biederman" <[email protected]>
Cc: <[email protected]>
Signed-off-by: Andrew Morton <[email protected]>
---

 fs/proc/fd.c |   14 +++++++++++---
 1 file changed, 11 insertions(+), 3 deletions(-)

diff -puN fs/proc/fd.c~proc-actually-make-proc_fd_permission-thread-friendly 
fs/proc/fd.c
--- a/fs/proc/fd.c~proc-actually-make-proc_fd_permission-thread-friendly
+++ a/fs/proc/fd.c
@@ -291,11 +291,19 @@ static struct dentry *proc_lookupfd(stru
  */
 int proc_fd_permission(struct inode *inode, int mask)
 {
-       int rv = generic_permission(inode, mask);
+       struct task_struct *p;
+       int rv;
+
+       rv = generic_permission(inode, mask);
        if (rv == 0)
-               return 0;
-       if (task_tgid(current) == proc_pid(inode))
+               return rv;
+
+       rcu_read_lock();
+       p = pid_task(proc_pid(inode), PIDTYPE_PID);
+       if (p && same_thread_group(p, current))
                rv = 0;
+       rcu_read_unlock();
+
        return rv;
 }
 
_

Patches currently in -mm which might be from [email protected] are

mmoom-fix-potentially-killing-unrelated-process-fix.patch
mm-fix-the-racy-mm-locked_vm-change-in.patch
mm-add-the-struct-mm_struct-mm-local-into.patch
mm-oom_kill-remove-the-wrong-fatal_signal_pending-check-in-oom_kill_process.patch
mm-oom_kill-cleanup-the-kill-sharing-same-memory-loop.patch
mm-oom_kill-fix-the-wrong-task-mm-==-mm-checks-in-oom_kill_process.patch
proc-actually-make-proc_fd_permission-thread-friendly.patch
change-current_is_single_threaded-to-use-for_each_thread.patch
signals-kill-block_all_signals-and-unblock_all_signals.patch
signal-turn-dequeue_signal_lock-into-kernel_dequeue_signal.patch
signal-turn-dequeue_signal_lock-into-kernel_dequeue_signal-fix.patch
signal-introduce-kernel_signal_stop-to-fix-jffs2_garbage_collect_thread.patch
signal-remove-jffs2_garbage_collect_thread-allow_signalsigcont.patch
coredump-ensure-all-coredumping-tasks-have-signal_group_coredump.patch
coredump-change-zap_threads-and-zap_process-to-use-for_each_thread.patch

--
To unsubscribe from this list: send the line "unsubscribe stable" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to