Received: by 2002:a25:b323:0:0:0:0:0 with SMTP id l35csp899503ybj; Fri, 20 Sep 2019 01:41:55 -0700 (PDT) X-Google-Smtp-Source: APXvYqzImsXYVeRL36nV0HdLPHs0kbFHMpctk95rsb64CV+UPnnpaJUEcuBbeXZ8q/ZYLAMIrGag X-Received: by 2002:a50:8f81:: with SMTP id y1mr20636661edy.181.1568968915331; Fri, 20 Sep 2019 01:41:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568968915; cv=none; d=google.com; s=arc-20160816; b=MVDr+aRjOFATguld6VAc6S2scUaebrVuxCYdoFY2/5dr/fElsUswNuF3yIXs3G4Qzs dHx9mxPBrN/YKWqQ9m/G3rIBaQMHi4tCvlGdprR1dllVOCTUvMJ+ov8y+BYkpnQKBXde kE7sPackC9tzbzmYp3FjGLrUEghOxsuQrudB2NNzqJ3Cdw1Em/tc9IG7qpwTlHK5Wxh2 iRW3CbLGYYLdmeqazxufqTdk/DdS9jLmCwaLCQ+T3Mg2XA+H69aV0lbyDCXSqENnvtRe EoNXyCyBd5vJIbAFu5eD1fYVMBrFV8vfuH1d9jcOMPpCo3Fu6YmNHqnsfgU10sVfNAC6 CRSA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Uid9PRbYOYEbXiTeKp1TUCFzr2I2WqtU44jk6rdD0uI=; b=soaVfPhMkINCqda1+BGRiyU2zfUOq6W9Nz9xqT+8+pbvJ5N0HrTCSVEV5IXUWLGP1G OxIGGe3soN2XEDB9pXjaV/sD8WVjKn136uFsqE2VcfDS55OaMWbnaXUs6LSJaSyPkAux iohln8KZYqZ4e8K5/MGBtJxiI/FwrFCTkIaxyrrnS7BFRNwmSH28up/C04mNDr9nAlNm gHM7IEoe+uZ0G3AF22Yl+pCzK9WXJT827244G/9x4pWlOAGnxGBOnkvg1I2bpwq6t85D OwKkAMGr/jsJQ46FgARhQrBAomB4uVLmKX6u9EC9oNwP9jTCWxZzLA+PAGaprtLjlFGK qYJw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="f/kD/85D"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o12si703517edc.279.2019.09.20.01.41.32; Fri, 20 Sep 2019 01:41:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="f/kD/85D"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2393466AbfISWIl (ORCPT + 99 others); Thu, 19 Sep 2019 18:08:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:46578 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2393451AbfISWIh (ORCPT ); Thu, 19 Sep 2019 18:08:37 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 23A1B21907; Thu, 19 Sep 2019 22:08:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568930916; bh=ep+37ZmQaFe9khzB1Ublxq7aT04QtrRwFlS7AmDIN7w=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=f/kD/85Dj/Ulnvf9UKmKb+vXNlCuZPNSPtknzpklr+UHdoSveUWE2O/fdIeLGlXQL zW843VI5EU8MKMDrcGvgaNxrlLrFrhrIYgwkOFKDHXSbmtVyd5Vsf0nRVuyTSeNafN RIcwsOr9b7m6Apk9VileJF7rteE/sXBf/jtH+usQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Doug Berger , Laura Abbott , Mike Rapoport , Andrew Morton , Florian Fainelli , Rob Herring , "Steven Rostedt (VMware)" , Peng Fan , Geert Uytterhoeven , Russell King , Sasha Levin Subject: [PATCH 5.2 061/124] ARM: 8874/1: mm: only adjust sections of valid mm structures Date: Fri, 20 Sep 2019 00:02:29 +0200 Message-Id: <20190919214821.217421318@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190919214819.198419517@linuxfoundation.org> References: <20190919214819.198419517@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Doug Berger [ Upstream commit c51bc12d06b3a5494fbfcbd788a8e307932a06e9 ] A timing hazard exists when an early fork/exec thread begins exiting and sets its mm pointer to NULL while a separate core tries to update the section information. This commit ensures that the mm pointer is not NULL before setting its section parameters. The arguments provided by commit 11ce4b33aedc ("ARM: 8672/1: mm: remove tasklist locking from update_sections_early()") are equally valid for not requiring grabbing the task_lock around this check. Fixes: 08925c2f124f ("ARM: 8464/1: Update all mm structures with section adjustments") Signed-off-by: Doug Berger Acked-by: Laura Abbott Cc: Mike Rapoport Cc: Andrew Morton Cc: Florian Fainelli Cc: Rob Herring Cc: "Steven Rostedt (VMware)" Cc: Peng Fan Cc: Geert Uytterhoeven Signed-off-by: Russell King Signed-off-by: Sasha Levin --- arch/arm/mm/init.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/arch/arm/mm/init.c b/arch/arm/mm/init.c index 749a5a6f61433..8e793cddac661 100644 --- a/arch/arm/mm/init.c +++ b/arch/arm/mm/init.c @@ -613,7 +613,8 @@ static void update_sections_early(struct section_perm perms[], int n) if (t->flags & PF_KTHREAD) continue; for_each_thread(t, s) - set_section_perms(perms, n, true, s->mm); + if (s->mm) + set_section_perms(perms, n, true, s->mm); } set_section_perms(perms, n, true, current->active_mm); set_section_perms(perms, n, true, &init_mm); -- 2.20.1