[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 9 Sep 2013 13:11:06 -0700 (PDT)
From: David Rientjes <rientjes@...gle.com>
To: Oleg Nesterov <oleg@...hat.com>
cc: Sergey Dyasly <dserrg@...il.com>, linux-kernel@...r.kernel.org,
linux-mm@...ck.org, Andrew Morton <akpm@...ux-foundation.org>,
Michal Hocko <mhocko@...e.cz>,
Rusty Russell <rusty@...tcorp.com.au>,
Sha Zhengju <handai.szj@...bao.com>
Subject: Re: [PATCH] OOM killer: wait for tasks with pending SIGKILL to
exit
On Mon, 9 Sep 2013, Oleg Nesterov wrote:
> > @@ -275,13 +275,16 @@ enum oom_scan_t oom_scan_process_thread(struct task_struct *task,
> > if (oom_task_origin(task))
> > return OOM_SCAN_SELECT;
> >
> > - if (task->flags & PF_EXITING && !force_kill) {
> > + if ((task->flags & PF_EXITING || fatal_signal_pending(task)) &&
> > + !force_kill) {
> > /*
> > * If this task is not being ptraced on exit, then wait for it
> > * to finish before killing some other task unnecessarily.
> > */
> > - if (!(task->group_leader->ptrace & PT_TRACE_EXIT))
> > + if (!(task->group_leader->ptrace & PT_TRACE_EXIT)) {
>
> can't we finally kill (or fix?) this PT_TRACE_EXIT check?
>
Patches are always welcome.
> It was added to fix the exploit I sent. But the patch was wrong,
> that exploit could be easily modified to trigger the same problem.
>
If the patch prevented your exploit when coredumping was done differently
then it was not wrong. It may not have been as inclusive as you would
have liked, but then again you never proposed any kernel changes to fix it
yourself either.
> However, now that the coredumping is killable that exploit won't
> work, so the original reason has gone away.
>
> So why do we need this check today?
>
If you feel it can be removed, please propose a patch to do so with a
changelog that describes why it is no longer necessary.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists