[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <30014.1282294202@redhat.com>
Date: Fri, 20 Aug 2010 09:50:02 +0100
From: David Howells <dhowells@...hat.com>
To: KOSAKI Motohiro <kosaki.motohiro@...fujitsu.com>
Cc: dhowells@...hat.com,
"Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>,
LKML <linux-kernel@...r.kernel.org>,
linux-mm <linux-mm@...ck.org>,
Andrew Morton <akpm@...ux-foundation.org>,
David Rientjes <rientjes@...gle.com>,
KAMEZAWA Hiroyuki <kamezawa.hiroyu@...fujitsu.com>
Subject: Re: oom: __task_cred() need rcu_read_lock()
KOSAKI Motohiro <kosaki.motohiro@...fujitsu.com> wrote:
> > KOSAKI Motohiro <kosaki.motohiro@...fujitsu.com> wrote:
> >
> > > dump_tasks() can call __task_cred() safely because we are holding
> > > tasklist_lock. but rcu lock validator don't have enough knowledge and
> > > it makes following annoying warning.
> >
> > No, it can't. The tasklist_lock is not protection against the creds
> > changing on another CPU.
>
> Thank you for correction.
>
> I suppose you mean I missed CONFIG_TREE_PREEMPT_RCU, right?
> As far as my grepping, other rcu implementation and spinlock use
> preempt_disable(). In other word, Can I assume usual distro user
> don't hit this issue?
No. The paths by which a process changes its credentials don't normally take
tasklist_lock, so holding tasklist_lock doesn't prevent the process you're
looking at from replacing its cred and discarding the ones you're looking at.
Further, unless you're holding the RCU read lock, there's nothing theoretically
stopping the system from deleting the discarded credentials.
David
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists