Received: by 2002:a25:b323:0:0:0:0:0 with SMTP id l35csp1319450ybj; Fri, 20 Sep 2019 08:34:57 -0700 (PDT) X-Google-Smtp-Source: APXvYqwdJhjW+V3EC2N8fg6isme/eTnThwiM18QAQ+SAOm8QKLlB2QQZJfpjD0sie5CUowCu4jp+ X-Received: by 2002:aa7:c2ce:: with SMTP id m14mr4964625edp.191.1568993697307; Fri, 20 Sep 2019 08:34:57 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1568993697; cv=none; d=google.com; s=arc-20160816; b=PanXzIWXqaRa+HhT40iETVfCc23GR7UyEYISg5TdUYgWcAIoofOXZZJWY9VAMlKkCL XZWJOttiJv9hBiZaJWXSUnnfk7e4vqh7PJ6rehWmrgxpx1QdNja6C2KfzosjrerPPlYA u6iUGJjEExEaJ2xe8d6kOnnThtkYABvV6sOeyNL0RB45OxCz9rye0QjrUig+3II1/sM1 d+cMnxlZGrviTDsllsBNAq1nY9tXRofOGEYgMAHV00C8neknFqnomDoLuIJRBLPpaqaf Lcbb7FZX73tDqswszxtj/TPvVt5JXNaRgn9uJCUbSbyth4GdpGuUG/Bi6tUGObuaktVK /RHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=/G10+bQFad/o0Yq3YSyDaV0XIdoSOrTPioA0lX5I/Q0=; b=QJu9gwNvjJCpri7+lWBPOFUjBxWBD7enLmEWiRGU/mAVbSC2WRM5iIPdmsremGDGeO CoF1AqpFW1cTNHGZMBScCtMVl4uTuaAaNVgWwAukW5T/bJatSX5eh0xsFn4uJu88k5ja ORwK7KeFhBxBIUx5OSJH/0nxF0Re7MIWkcDr5+gTJGOCNy3mpIpWEPYRRUCJsGFxwS1j lCeEABa5grDuyIF6u4Nh9aHD+b4OwJLSMGEyxC7olow33zq0YfHBeC2qJo7RG2kEDWJb Otn+vZlIvwl/wHWVO03oCzvyVfyPE/y7XAQi6I60bDD9r0G4n0Ws1lh2qIgUNmGuG0dC vkuQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AtBTmOaT; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u4si1447006edp.447.2019.09.20.08.34.30; Fri, 20 Sep 2019 08:34:57 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=AtBTmOaT; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2405031AbfISWXM (ORCPT + 99 others); Thu, 19 Sep 2019 18:23:12 -0400 Received: from mail.kernel.org ([198.145.29.99]:38680 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2394167AbfISWXL (ORCPT ); Thu, 19 Sep 2019 18:23:11 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8E25021924; Thu, 19 Sep 2019 22:23:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1568931790; bh=yLnWCBzURFYaphma3SALcWe00G9AD5Jynb2Nanj3EW4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=AtBTmOaTMb0ztwJnUNcuACt6SF3CVhvyKSwGDqBbUYlWcinuSRduum+BuuxNmJuky ua3WJJYxHzK4DqtowjU9K9lcnvrAnlWAmHPU2Gw1W3xKHFJF/dKciL4qNqTVDAlEPB 5zWs4JWiwHKx6M9MnTp4uxucIpeNFJm0zgM9x8as= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Doug Berger , Laura Abbott , Mike Rapoport , Andrew Morton , Florian Fainelli , Rob Herring , "Steven Rostedt (VMware)" , Peng Fan , Geert Uytterhoeven , Russell King , Sasha Levin Subject: [PATCH 4.4 41/56] ARM: 8874/1: mm: only adjust sections of valid mm structures Date: Fri, 20 Sep 2019 00:04:22 +0200 Message-Id: <20190919214759.795931660@linuxfoundation.org> X-Mailer: git-send-email 2.23.0 In-Reply-To: <20190919214742.483643642@linuxfoundation.org> References: <20190919214742.483643642@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Doug Berger [ Upstream commit c51bc12d06b3a5494fbfcbd788a8e307932a06e9 ] A timing hazard exists when an early fork/exec thread begins exiting and sets its mm pointer to NULL while a separate core tries to update the section information. This commit ensures that the mm pointer is not NULL before setting its section parameters. The arguments provided by commit 11ce4b33aedc ("ARM: 8672/1: mm: remove tasklist locking from update_sections_early()") are equally valid for not requiring grabbing the task_lock around this check. Fixes: 08925c2f124f ("ARM: 8464/1: Update all mm structures with section adjustments") Signed-off-by: Doug Berger Acked-by: Laura Abbott Cc: Mike Rapoport Cc: Andrew Morton Cc: Florian Fainelli Cc: Rob Herring Cc: "Steven Rostedt (VMware)" Cc: Peng Fan Cc: Geert Uytterhoeven Signed-off-by: Russell King Signed-off-by: Sasha Levin --- arch/arm/mm/init.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/arch/arm/mm/init.c b/arch/arm/mm/init.c index a9f6705aea238..731b7e64715b9 100644 --- a/arch/arm/mm/init.c +++ b/arch/arm/mm/init.c @@ -691,7 +691,8 @@ static void update_sections_early(struct section_perm perms[], int n) if (t->flags & PF_KTHREAD) continue; for_each_thread(t, s) - set_section_perms(perms, n, true, s->mm); + if (s->mm) + set_section_perms(perms, n, true, s->mm); } read_unlock(&tasklist_lock); set_section_perms(perms, n, true, current->active_mm); -- 2.20.1