From: tip-bot for Thomas Gleixner <tglx@linutronix.de>
To: linux-tip-commits@vger.kernel.org
Cc: linux-kernel@vger.kernel.org, hpa@zytor.com, mingo@redhat.com,
tglx@linutronix.de
Subject: [tip:core/urgent] signals: Fix more rcu assumptions
Date: Thu, 10 Dec 2009 22:09:45 GMT [thread overview]
Message-ID: <tip-7cf7db8df0b78076eafa4ead47559344ca7b7a43@git.kernel.org> (raw)
In-Reply-To: <20091210004703.269843657@linutronix.de>
Commit-ID: 7cf7db8df0b78076eafa4ead47559344ca7b7a43
Gitweb: http://git.kernel.org/tip/7cf7db8df0b78076eafa4ead47559344ca7b7a43
Author: Thomas Gleixner <tglx@linutronix.de>
AuthorDate: Thu, 10 Dec 2009 00:53:21 +0000
Committer: Thomas Gleixner <tglx@linutronix.de>
CommitDate: Thu, 10 Dec 2009 23:04:11 +0100
signals: Fix more rcu assumptions
1) Remove the misleading comment in __sigqueue_alloc() which claims
that holding a spinlock is equivalent to rcu_read_lock().
2) Add a rcu_read_lock/unlock around the __task_cred() access
in __sigqueue_alloc()
This needs to be revisited to remove the remaining users of
read_lock(&tasklist_lock) but that's outside the scope of this patch.
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
LKML-Reference: <20091210004703.269843657@linutronix.de>
---
kernel/signal.c | 8 ++++----
1 files changed, 4 insertions(+), 4 deletions(-)
diff --git a/kernel/signal.c b/kernel/signal.c
index 7331656..f67545f 100644
--- a/kernel/signal.c
+++ b/kernel/signal.c
@@ -218,13 +218,13 @@ __sigqueue_alloc(int sig, struct task_struct *t, gfp_t flags, int override_rlimi
struct user_struct *user;
/*
- * We won't get problems with the target's UID changing under us
- * because changing it requires RCU be used, and if t != current, the
- * caller must be holding the RCU readlock (by way of a spinlock) and
- * we use RCU protection here
+ * Protect access to @t credentials. This can go away when all
+ * callers hold rcu read lock.
*/
+ rcu_read_lock();
user = get_uid(__task_cred(t)->user);
atomic_inc(&user->sigpending);
+ rcu_read_unlock();
if (override_rlimit ||
atomic_read(&user->sigpending) <=
next prev parent reply other threads:[~2009-12-10 22:10 UTC|newest]
Thread overview: 76+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-12-10 0:52 [patch 0/9] Fix various __task_cred related invalid RCU assumptions Thomas Gleixner
2009-12-10 0:52 ` [patch 1/9] sys: Fix missing rcu protection for __task_cred() access Thomas Gleixner
2009-12-10 1:25 ` Paul E. McKenney
2009-12-10 2:29 ` Tetsuo Handa
2009-12-10 2:43 ` Paul E. McKenney
2009-12-10 14:29 ` Oleg Nesterov
2009-12-10 14:44 ` Thomas Gleixner
2009-12-11 13:45 ` David Howells
2009-12-11 13:52 ` Thomas Gleixner
2009-12-10 14:20 ` Oleg Nesterov
2009-12-10 14:38 ` Thomas Gleixner
2009-12-10 15:08 ` [patch 1/9] sys: Fix missing rcu protection for __task_cred()access Tetsuo Handa
2009-12-10 21:17 ` Thomas Gleixner
2009-12-11 3:25 ` Tetsuo Handa
2010-02-08 12:30 ` [PATCH] Update comment on find_task_by_pid_ns Tetsuo Handa
2010-02-08 13:21 ` Oleg Nesterov
2010-02-08 17:07 ` Thomas Gleixner
2010-02-08 17:16 ` Oleg Nesterov
2010-02-08 21:42 ` Tetsuo Handa
2010-02-09 22:08 ` Andrew Morton
2010-02-10 16:30 ` Serge E. Hallyn
2010-02-10 17:57 ` Andrew Morton
2010-02-10 18:39 ` Thomas Gleixner
2010-02-10 20:18 ` Serge E. Hallyn
2010-02-10 20:30 ` Paul E. McKenney
2010-02-11 1:21 ` Tetsuo Handa
2010-02-11 12:04 ` [PATCH] sys: Fix missing rcu protection for sys_getpriority Tetsuo Handa
2010-02-12 14:22 ` Serge E. Hallyn
2009-12-10 22:09 ` [tip:core/urgent] sys: Fix missing rcu protection for __task_cred() access tip-bot for Thomas Gleixner
2009-12-11 13:41 ` [patch 1/9] " David Howells
2009-12-10 0:52 ` [patch 2/9] fs: Add missing rcu protection for __task_cred() in sys_ioprio_get Thomas Gleixner
2009-12-11 13:46 ` David Howells
2009-12-10 0:53 ` [patch 3/9] proc: Add missing rcu protection for __task_cred() in task_sig() Thomas Gleixner
2009-12-11 13:46 ` David Howells
2009-12-10 0:53 ` [patch 4/9] oom: Add missing rcu protection of __task_cred() in dump_tasks Thomas Gleixner
2009-12-10 0:53 ` Thomas Gleixner
2009-12-10 1:57 ` KOSAKI Motohiro
2009-12-10 1:57 ` KOSAKI Motohiro
2009-12-11 13:49 ` David Howells
2009-12-11 13:49 ` David Howells
2009-12-11 13:52 ` Thomas Gleixner
2009-12-11 13:52 ` Thomas Gleixner
2009-12-10 0:53 ` [patch 5/9] security: Use get_task_cred() in keyctl_session_to_parent() Thomas Gleixner
2009-12-10 2:45 ` Paul E. McKenney
2009-12-11 13:52 ` David Howells
2009-12-10 0:53 ` [patch 6/9] signal: Fix racy access to __task_cred in kill_pid_info_as_uid() Thomas Gleixner
2009-12-10 15:11 ` Oleg Nesterov
2009-12-10 22:09 ` [tip:core/urgent] " tip-bot for Thomas Gleixner
2009-12-11 13:53 ` [patch 6/9] " David Howells
2009-12-10 0:53 ` [patch 7/9] signals: Fix more rcu assumptions Thomas Gleixner
2009-12-10 14:34 ` Oleg Nesterov
2009-12-10 14:45 ` Thomas Gleixner
2009-12-11 13:59 ` David Howells
2009-12-10 22:09 ` tip-bot for Thomas Gleixner [this message]
2009-12-10 0:53 ` [patch 8/9] Documentation: Fix invalid " Thomas Gleixner
2009-12-10 23:55 ` Vegard Nossum
2009-12-11 14:00 ` David Howells
2009-12-11 16:07 ` Linus Torvalds
2009-12-11 16:37 ` Paul E. McKenney
2009-12-11 18:08 ` Thomas Gleixner
2009-12-11 21:28 ` Arnd Bergmann
2009-12-11 22:01 ` Paul E. McKenney
2009-12-10 0:53 ` [patch 9/9] security: Fix invalid rcu assumptions in comments Thomas Gleixner
2009-12-11 14:01 ` David Howells
2009-12-10 2:28 ` [patch 0/9] Fix various __task_cred related invalid RCU assumptions Paul E. McKenney
2009-12-10 3:15 ` Linus Torvalds
2009-12-10 5:13 ` Peter Zijlstra
2009-12-10 5:34 ` Paul E. McKenney
2009-12-13 18:56 ` Peter Zijlstra
2009-12-14 1:53 ` Paul E. McKenney
2009-12-14 10:17 ` Peter Zijlstra
2009-12-14 14:16 ` Paul E. McKenney
2009-12-14 14:30 ` Peter Zijlstra
2009-12-15 1:23 ` Paul E. McKenney
2009-12-11 13:39 ` David Howells
2009-12-11 16:35 ` Paul E. McKenney
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=tip-7cf7db8df0b78076eafa4ead47559344ca7b7a43@git.kernel.org \
--to=tglx@linutronix.de \
--cc=hpa@zytor.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-tip-commits@vger.kernel.org \
--cc=mingo@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.