From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from verein.lst.de ([213.95.11.211]:60485 "EHLO newverein.lst.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932163AbcJQSzz (ORCPT ); Mon, 17 Oct 2016 14:55:55 -0400 Date: Mon, 17 Oct 2016 20:55:52 +0200 From: Christoph Hellwig To: Jeff Moyer Cc: Christoph Hellwig , viro@zeniv.linux.org.uk, jack@suse.cz, dmonakhov@openvz.org, linux-fsdevel@vger.kernel.org, linux-aio@kvack.org, linux-kernel@vger.kernel.org, Peter Zijlstra , Oleg Nesterov , Mikulas Patocka Subject: Re: [PATCH] aio: fix a use after free (and fix freeze protection of aio writes) Message-ID: <20161017185552.GA24653@lst.de> References: <1476597082-15317-1-git-send-email-hch@lst.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-fsdevel-owner@vger.kernel.org List-ID: On Mon, Oct 17, 2016 at 02:19:47PM -0400, Jeff Moyer wrote: > This ends up being a call to __sb_end_write: > > void __sb_end_write(struct super_block *sb, int level) > { > percpu_up_read(sb->s_writers.rw_sem + level-1); > } > > Nothing guarantees that submission and completion happen on the same > CPU. Is this safe? Good point. From my reading of the percpu_rwsem implementation it is not safe to release it from a different CPU. Which makes me wonder how we can protect aio writes properly here..