Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1758906AbaKUQgW (ORCPT ); Fri, 21 Nov 2014 11:36:22 -0500 Received: from mail-qc0-f172.google.com ([209.85.216.172]:42593 "EHLO mail-qc0-f172.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755442AbaKUQgV (ORCPT ); Fri, 21 Nov 2014 11:36:21 -0500 Message-ID: <546F6A05.9080600@gmail.com> Date: Fri, 21 Nov 2014 11:36:21 -0500 From: Pranith Kumar User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.2.0 MIME-Version: 1.0 To: Kees Cook CC: Andy Lutomirski , Will Drewry , open list Subject: Re: [PATCH v2 7/9] seccomp: Replace smp_read_barrier_depends() with lockless_dereference() References: <1416582363-20661-1-git-send-email-bobby.prani@gmail.com> <1416582363-20661-8-git-send-email-bobby.prani@gmail.com> In-Reply-To: Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/21/2014 11:33 AM, Kees Cook wrote: > On Fri, Nov 21, 2014 at 7:06 AM, Pranith Kumar wrote: >> Recently lockless_dereference() was added which can be used in place of >> hard-coding smp_read_barrier_depends(). The following PATCH makes the change. >> >> Signed-off-by: Pranith Kumar >> --- >> kernel/seccomp.c | 7 +++---- >> 1 file changed, 3 insertions(+), 4 deletions(-) > Thanks! > > Acked-by: Kees Cook > > Do you need me to carry this patch in the seccomp tree, or will > someone else be taking your entire series? > > -Kees Please take this patch individually into your tree. There are discussions about the other patches and I will drop the accepted patches and iterate for the next version. Thanks! >> diff --git a/kernel/seccomp.c b/kernel/seccomp.c >> index 4ef9687..3729b06 100644 >> --- a/kernel/seccomp.c >> +++ b/kernel/seccomp.c >> @@ -175,17 +175,16 @@ static int seccomp_check_filter(struct sock_filter *filter, unsigned int flen) >> */ >> static u32 seccomp_run_filters(struct seccomp_data *sd) >> { >> - struct seccomp_filter *f = ACCESS_ONCE(current->seccomp.filter); >> struct seccomp_data sd_local; >> u32 ret = SECCOMP_RET_ALLOW; >> + /* Make sure cross-thread synced filter points somewhere sane. */ >> + struct seccomp_filter *f = >> + lockless_dereference(current->seccomp.filter); >> >> /* Ensure unexpected behavior doesn't result in failing open. */ >> if (unlikely(WARN_ON(f == NULL))) >> return SECCOMP_RET_KILL; >> >> - /* Make sure cross-thread synced filter points somewhere sane. */ >> - smp_read_barrier_depends(); >> - >> if (!sd) { >> populate_seccomp_data(&sd_local); >> sd = &sd_local; >> -- >> 1.9.1 >> > > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/