lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 20 Nov 2007 19:21:36 -0600 From: Robert Hancock <hancockr@...w.ca> To: "Eric W. Biederman" <ebiederm@...ssion.com> Cc: Ulrich Drepper <drepper@...hat.com>, Roland McGrath <roland@...hat.com>, Guillaume Chazarain <guichaz@...oo.fr>, Ingo Molnar <mingo@...e.hu>, Pavel Emelyanov <xemul@...nvz.org>, "Rafael J. Wysocki" <rjw@...k.pl>, Pavel Machek <pavel@....cz>, kernel list <linux-kernel@...r.kernel.org>, netdev <netdev@...r.kernel.org> Subject: Re: 2.6.24-rc3: find complains about /proc/net Eric W. Biederman wrote: > Could you elaborate a bit on how the semantics of returning the > wrong information are more useful? > > In particular if a thread does the logical equivalent of: > grep Pid: /proc/self/status. It always get the tgid despite > having a different process id. The POSIX-defined userspace concept of a PID requires that all threads appear to have the same PID. This is something that Linux didn't comply with under the old LinuxThreads implementation and was finally fixed with NPTL. This isn't a POSIX-defined interface, but I assume it's trying to be consistent with getpid(), etc. > How can that possibly be useful or correct? > > From the kernel side I really think the current semantics of /proc/self > in the context of threads is a bug and confusing. All of the kernel > developers first reaction when this was pointed out was that this > is a regression. > > If it is truly useful to user space we can preserve this API design > bug forever. I just want to make certain we are not being bug > compatible without a good reason. > > Currently we have several kernel side bugs with threaded > programs because /proc/self does not do the intuitive thing. Unless > something has changed recently selinux will cause accesses by a > non-leader thread to fail when accessing files through /proc/self. > > So far the more I look at the current /proc/self behavior the > more I am convinced it is broken, and useless. Please help me see > where it is useful, so we can justify keeping it. -- Robert Hancock Saskatoon, SK, Canada To email, remove "nospam" from hancockr@...pamshaw.ca Home Page: http://www.roberthancock.com/ - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists