lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 10 Nov 2010 17:02:11 +0100 From: Oleg Nesterov <oleg@...hat.com> To: "Paul E. McKenney" <paulmck@...ux.vnet.ibm.com> Cc: Greg Thelen <gthelen@...gle.com>, linux-kernel@...r.kernel.org, linux-mm@...ck.org, Jens Axboe <axboe@...nel.dk> Subject: Re: INFO: suspicious rcu_dereference_check() usage - kernel/pid.c:419 invoked rcu_dereference_check() without protection! (another try with the proper email address) On 11/09, Paul E. McKenney wrote: > > Thank you, Oleg! Greg, would you be willing to update your patch > to remove the comment? (Perhaps tasklist_lock as well...) Agreed, I think tasklock should be killed. But wait. Whatever we do, isn't this code racy? I do not see why, say, sys_ioprio_set(IOPRIO_WHO_PROCESS) can't install ->io_context after this task has already passed exit_io_context(). Jens, am I missed something? Oleg. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists