[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200421125908.ls5nwgkl4q7hjoov@wittgenstein>
Date: Tue, 21 Apr 2020 14:59:08 +0200
From: Christian Brauner <christian.brauner@...ntu.com>
To: Oleg Nesterov <oleg@...hat.com>
Cc: Linux Containers <containers@...ts.linux-foundation.org>,
Christof Meerwald <cmeerw@...erw.org>,
"Eric W. Biederman" <ebiederm@...ssion.com>,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH] signal: Avoid corrupting si_pid and si_uid in
do_notify_parent
On Tue, Apr 21, 2020 at 02:17:22PM +0200, Oleg Nesterov wrote:
> On 04/21, Christian Brauner wrote:
> >
> > process B setnses into
> > <pidnsC> which is a sibling pid namespace,
>
> please see pidns_install(), it verifies that
>
> * Only allow entering the current active pid namespace
> * or a child of the current active pid namespace.
I forgot about that.
Though, don't we have the same problem in:
static void do_notify_parent_cldstop(struct task_struct *tsk,
bool for_ptracer, int why)
at least for the for_ptrace is false case?
Christian
Powered by blists - more mailing lists