Received: by 2002:a05:7412:6592:b0:d7:7d3a:4fe2 with SMTP id m18csp945414rdg; Fri, 11 Aug 2023 05:16:05 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEhqyxrpn1aIWF7XuR9hv2n0feR1pgsnk1XiloG3uisRat46JHeV1pl71sULvSW/4hsUNb5 X-Received: by 2002:a05:6a20:6a0a:b0:138:92ef:78f9 with SMTP id p10-20020a056a206a0a00b0013892ef78f9mr2037399pzk.6.1691756164764; Fri, 11 Aug 2023 05:16:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1691756164; cv=none; d=google.com; s=arc-20160816; b=pvuy0CGZdV5v5WZ1MiWs/6879vMDHFYjgzi7W55i2Vx/f8m+O5L6FgsFJMbBaLrb73 T2RwJ2sIGNiTDq3rsXoXHHJkUnugqwNgGM09fA4j13kwOBDUOgZHok9Wqf4ldqfN1N1l wXBBuP3eg5SEz4J3LO4/BHQ+ZLwGwALig7J0uiaJ6h1RcIARAaDbPZVHBvHFIWHMf+dP h7yVnyhoytlktMyzHr3NSMx100kZo2UiA75w1aGlf58I91MuBLZq/9Fyb92lSRfVcYYt iRJBchb2rllrT7MOJJYg12uEKHaFurYuPqAWOjzC1d5O54F4/MQ/Azj1X4OhopRA6KbZ xMXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=28meTfHRse5PRs0sdjJ4C72LuRQ3lY/Pbb57IzLI2Dw=; fh=UZAY3NsMhOxHxY0izyFh40MoAmYdRjS+SJt1ZOsoOig=; b=sWMIuF9F83hE6VCZxb7m7XcfJyrX9wNjj4yU/nkbkm9iQbs6ItIoh9W4e5+HdHKxBh KskRbzmC+oBMMf8ZOXa/0ebFTnXyhARKnqCYy8NQhBoWaLP5lYdWL8W1grpgR6PPCrVV POt6HDnRNDt/hRF2mnSKJOaLLihG3WEYrNpnvLuPmhcw+cVZ34YzNq8yh4ZOgCemUgHK ZVGiGDq6ptIX21UdmQ17rOEJtaiJJmAE97JMQoBiOB2sFPFC3H2kj/AdhMfYgFFzGbOq 3wJGszbwyhdJbLy/54HfO38xXkLpxdkX8OQV6DDxUsxnncdKTu0ZI915imiAKPksaMao qLeA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=nNCHCMWB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ca13-20020a056a02068d00b00563adc94096si3539690pgb.743.2023.08.11.05.15.52; Fri, 11 Aug 2023 05:16:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=nNCHCMWB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234201AbjHKLkr (ORCPT + 99 others); Fri, 11 Aug 2023 07:40:47 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38596 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229700AbjHKLkr (ORCPT ); Fri, 11 Aug 2023 07:40:47 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B2E8D26B6 for ; Fri, 11 Aug 2023 04:40:46 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 4831B64135 for ; Fri, 11 Aug 2023 11:40:46 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 127ADC433C7; Fri, 11 Aug 2023 11:40:43 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1691754045; bh=8tm1jV+HgOUZp4y+wMYuaXLozGBvMcrHW58C6uqLa3A=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=nNCHCMWB0RtbouXa4zqOvJ8XOUk4TMLYIaY/ev7deRVfxrGA6Sa2NrX705bdL3l5p +tn/HQhNsyiWIlQvqlmu+z7oWcs8HtQ4gRWHe5iOtVHH8+F8cghe3II+SKJyBt21Qs ILuCOl7o6Y5ubDy9x1wba7D32Bs0ErMWfU4vYK3xkiEvb20porqh3opt8SopkQfdt7 FIDWD36HL1uB2qvTekdJVkqBsZkhya7l0FtrXg1T9YXfORkB+V8G94wAJJ7PKXAzNo V6O6R0w+eJuCJH08eQ87sVpq1NqJ6Ol+WgpwmDUF7r6wl2YtOB+nkmEKyHoiO9dm4P IQbA4HlpRiEWQ== Date: Fri, 11 Aug 2023 13:40:41 +0200 From: Christian Brauner To: Oleg Nesterov Cc: David Rheinsberg , linux-kernel@vger.kernel.org, Jan Kara , Kees Cook , Alexander Mikhalitsyn , Luca Boccassi Subject: Re: [PATCH] pid: allow pidfds for reaped tasks Message-ID: <20230811-perplex-installieren-899f5925534d@brauner> References: <20230807085203.819772-1-david@readahead.eu> <20230807-porzellan-rehkitz-9fde1b94dd6b@brauner> <20230811112911.GA22566@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20230811112911.GA22566@redhat.com> X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Aug 11, 2023 at 01:29:11PM +0200, Oleg Nesterov wrote: > Hi Christian, > > Sorry for delay, I've just returned from vacation and I am slowly Absolutely no problem! Thanks for getting back to us. > crawling my email backlog. > > > > On 08/07, Christian Brauner wrote: > > > > > int pidfd_prepare(struct pid *pid, unsigned int flags, struct file **ret) > > > { > > > - if (!pid || !pid_has_task(pid, PIDTYPE_TGID)) > > > + if (!pid) > > > + return -EINVAL; > > > + > > > + /* > > > + * Non thread-group leaders cannot have pidfds, but we allow them for > > > + * reaped thread-group leaders. > > > + */ > > > + if (pid_has_task(pid, PIDTYPE_PID) && !pid_has_task(pid, PIDTYPE_TGID)) > > > return -EINVAL; > > > > TL;DR userspace wants to be able to get a pidfd to an already reaped > > thread-group leader. I don't see any issues with this. > > I guess I need to read the whole thread carefully, but right now > I don't understand this patch and the problem... > > OK, suppose we have a group leader L with pid 100 and its sub-thread > T with pid 101. > > With this patch pidfd_open(101) can succeed if T exits right after > find_get_pid(101) because pid_has_task(pid, PIDTYPE_PID) above will > fail, right? > > This looks wrong, 101 was never a leader pid... Well, let me simplify the question: What code do we need to allow userspace to open a pidfd to a leader pid even if it has already been exited and reaped (without also accidently allowing to open non-lead pid pidfds)? I hope that clarifies?