lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 11 Dec 2009 13:53:47 +0000 From: David Howells <dhowells@...hat.com> To: Thomas Gleixner <tglx@...utronix.de> Cc: dhowells@...hat.com, LKML <linux-kernel@...r.kernel.org>, "Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>, Dipankar Sarma <dipankar@...ibm.com>, Ingo Molnar <mingo@...e.hu>, Peter Zijlstra <peterz@...radead.org>, Oleg Nesterov <oleg@...sign.ru>, Al Viro <viro@...iv.linux.org.uk>, James Morris <jmorris@...ei.org>, Andrew Morton <akpm@...ux-foundation.org>, Linus Torvalds <torvalds@...ux-foundation.org>, Oleg Nesterov <oleg@...hat.com> Subject: Re: [patch 6/9] signal: Fix racy access to __task_cred in kill_pid_info_as_uid() Thomas Gleixner <tglx@...utronix.de> wrote: > kill_pid_info_as_uid() accesses __task_cred() without being in a RCU > read side critical section. tasklist_lock is not protecting that when > CONFIG_TREE_PREEMPT_RCU=y. > > Convert the whole tasklist_lock section to rcu and use > lock_task_sighand to prevent the exit race. > > Signed-off-by: Thomas Gleixner <tglx@...utronix.de> Acked-by: David Howells <dhowells@...hat.com> -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists