[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20081201211518.GB15004@us.ibm.com>
Date: Mon, 1 Dec 2008 13:15:18 -0800
From: Sukadev Bhattiprolu <sukadev@...ux.vnet.ibm.com>
To: Greg Kurz <gkurz@...ibm.com>
Cc: Bastian Blank <bastian@...di.eu.org>, linux-kernel@...r.kernel.org,
oleg@...hat.com, ebiederm@...ssion.com, containers@...ts.osdl.org,
roland@...hat.com, xemul@...nvz.org
Subject: Re: [RFC][PATCH 2/5] pid: Generalize task_active_pid_ns
Greg Kurz [gkurz@...ibm.com] wrote:
| On Thu, 2008-11-27 at 02:17 +0100, Bastian Blank wrote:
| > On Tue, Nov 25, 2008 at 07:45:28PM -0800, Sukadev Bhattiprolu wrote:
| > > Currently task_active_pid_ns is not safe to call after a
| > > task becomes a zombie and exit_task_namespaces is called,
| > > as nsproxy becomes NULL.
| >
| > Why do you need to be able to get the pid namespace from zombie
| > processes?
After exiting namespaces, the process notifies parent. With new changes
to signals (in this patchset), the signal code may need to determine
the namespace of sender (the exiting child in this case).
| Also according to nsproxy.h this access variant is only
| > allowed for the current task, anything else needs to take a rcu lock.
and sender still is 'current' (the exiting child).
| >
|
| That doesn't save ->nsproxy to be NULL... as shown in the very same
| example you're talking about.
|
| I agree with Eric and Sukadev that task_active_pid_ns() is unsafe. There
| isn't even a /* don't use with zombies */ in pid_namespace.h...
Hmm. Its not unsafe at present. It would become unsafe if the signals code
tries to determine the namespace of sender.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists