Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp1053965pxv; Thu, 22 Jul 2021 21:02:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwLDNwkqWEr+rmpK1kLUkZqlvk353RQuqsvy9DvQN29yMj7jPV6g8A+CDwlsYPIQ+R1j6WM X-Received: by 2002:a17:906:e1a:: with SMTP id l26mr2877064eji.129.1627012952856; Thu, 22 Jul 2021 21:02:32 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627012952; cv=none; d=google.com; s=arc-20160816; b=AqLvQsvw7ROY5f4ruAbazW+XIYw949OY4OWYWYMi4cIDxlbUdnerACsljXfji5N1UD 6qv/rQVOBsLLEXZfvkn9IVOsiqan1RyOn6Of5Bw2QGypXohen/5YGeD/r3bL1r0CF7QV 1V0xmXOv6zpfzLk13srwZv9+dnoLEsGCQtEfsMUmTtzkbn/ae4OT6F2M1VeTlIaZbQzr fDB1okqlDnbbBrMiq1tRSjtWzcm8baWc32QVAc1O7UjNG+RQxGNwjxbRRRDh20EjNrlP 8UDxaml8XBJijgMDXEGDf7gBk6OM/ek/Ox0zrpNdOm9yG/copimdaUuhx95Rzz5vEDps BCZg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=uavolfq0ZBy6WmCH8l11asouBgOyMPjHZbjlYRzBd1c=; b=fu95xX2CrWJP5uOG/30rHsR708LCd4E1pH0VJvtwW14CAaQk5d/ncMuu8k5Aq3Tx+J p0OkoVVNxdiovRtORuxUH/lRzKDDQMWhP7zdg8xwmPVKI8Va5zoWy9RIPj01RuKV1hED c9Ojrkjw+1oB5IeDiRQ8swc6RM2NeRk4ABBofI2bRGzu4ENckobQLWot7K+dwfxXW/MQ 0Ja1ZXn3Ikd5n/GlwAEOnd22biaHYTPj9f8wo7Yim7904Z4OmPQxJ0rcd09/k9AFdV/c JylqrWG3een6dTAuGQOcLvQh+7h/1Cr5unooyyGsC2JUIvKttB/qy3jS8UtxgPY+DTL6 E1MQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="b2GUWBt/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id uz6si28819970ejb.156.2021.07.22.21.02.09; Thu, 22 Jul 2021 21:02:32 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b="b2GUWBt/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234164AbhGWDRy (ORCPT + 99 others); Thu, 22 Jul 2021 23:17:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:37850 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233905AbhGWDRV (ORCPT ); Thu, 22 Jul 2021 23:17:21 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 20AF260F25; Fri, 23 Jul 2021 03:57:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1627012675; bh=ZXrRj46NdyKEbN4vE6KRRjHwnOAl6iXHvmIZKRwE23k=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=b2GUWBt/XfboItCAmcUEgwWLAD4OiAYkkk8ET/Z1GpUHUmpmeVZba8c+XfRf3p2oX kgnVaw3ZL0coININETf93u4jdO8j3xrKLe4EmTnPoKMYZR0QdanJwYFNl+/BoHw0r0 8rZzRir91C8/3ttElf2NC1hwufaMiYFUJMO1tLkxSq2/nzGuDy1A//rFh7AdgtQC4y znL4SbZ3miLyCPrOWutZf0JybFjhEBrGLgqDrCppLbLNZ1rpNOOFxCepqAMkhEV+IL 8uSd9S7Gntqe4OXpPbDdOIjxsKUT+tTnCaTrZeLkOgjRhgZ5z8ffrcf418MNuMjua7 QY+KVAzg84dkw== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: "Paul E. McKenney" , "Xu, Yanfei" , Sasha Levin , rcu@vger.kernel.org Subject: [PATCH AUTOSEL 5.10 05/17] rcu-tasks: Don't delete holdouts within trc_inspect_reader() Date: Thu, 22 Jul 2021 23:57:36 -0400 Message-Id: <20210723035748.531594-5-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210723035748.531594-1-sashal@kernel.org> References: <20210723035748.531594-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: "Paul E. McKenney" [ Upstream commit 1d10bf55d85d34eb73dd8263635f43fd72135d2d ] As Yanfei pointed out, although invoking trc_del_holdout() is safe from the viewpoint of the integrity of the holdout list itself, the put_task_struct() invoked by trc_del_holdout() can result in use-after-free errors due to later accesses to this task_struct structure by the RCU Tasks Trace grace-period kthread. This commit therefore removes this call to trc_del_holdout() from trc_inspect_reader() in favor of the grace-period thread's existing call to trc_del_holdout(), thus eliminating that particular class of use-after-free errors. Reported-by: "Xu, Yanfei" Signed-off-by: Paul E. McKenney Signed-off-by: Sasha Levin --- kernel/rcu/tasks.h | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/kernel/rcu/tasks.h b/kernel/rcu/tasks.h index 73bbe792fe1e..208acb286ec2 100644 --- a/kernel/rcu/tasks.h +++ b/kernel/rcu/tasks.h @@ -879,10 +879,9 @@ static bool trc_inspect_reader(struct task_struct *t, void *arg) in_qs = likely(!t->trc_reader_nesting); } - // Mark as checked. Because this is called from the grace-period - // kthread, also remove the task from the holdout list. + // Mark as checked so that the grace-period kthread will + // remove it from the holdout list. t->trc_reader_checked = true; - trc_del_holdout(t); if (in_qs) return true; // Already in quiescent state, done!!! -- 2.30.2