On Thu, 23 Feb 2012, Dave Hansen wrote: > I think I got lucky that my task_struct was bogus in the oops > below. It's probably quite feasible that a task_struct could get > freed back in to the slab, reallocated as another task_struct, > and then we do these cred checks against a valid, but basically > random task. Ok I buy that. > This patch takes the pid-to-task code along with the credential > and security checks in sys_move_pages() and sys_migrate_pages() > and consolidates them. It now takes a task reference in > the new function and requires the caller to drop it. I > believe this resolves the race. And this way its safer? > diff -puN include/linux/migrate.h~movememory-helper include/linux/migrate.h > --- linux-2.6.git/include/linux/migrate.h~movememory-helper 2012-02-16 09:59:17.270207242 -0800 > +++ linux-2.6.git-dave/include/linux/migrate.h 2012-02-16 09:59:17.286207438 -0800 > @@ -31,6 +31,7 @@ extern int migrate_vmas(struct mm_struct > extern void migrate_page_copy(struct page *newpage, struct page *page); > extern int migrate_huge_page_move_mapping(struct address_space *mapping, > struct page *newpage, struct page *page); > +struct task_struct *can_migrate_get_task(pid_t pid); Could we use something easier to understand? try_get_task()? > +++ linux-2.6.git-dave/mm/mempolicy.c 2012-02-16 09:59:17.286207438 -0800 > diff -puN mm/migrate.c~movememory-helper mm/migrate.c > --- linux-2.6.git/mm/migrate.c~movememory-helper 2012-02-16 09:59:17.278207340 -0800 > +++ linux-2.6.git-dave/mm/migrate.c 2012-02-16 09:59:17.286207438 -0800 > @@ -1339,38 +1339,22 @@ static int do_pages_stat(struct mm_struc > } > > /* > - * Move a list of pages in the address space of the currently executing > - * process. > + * If successful, takes a task_struct reference that > + * the caller is responsible for releasing. > */ > -SYSCALL_DEFINE6(move_pages, pid_t, pid, unsigned long, nr_pages, > - const void __user * __user *, pages, > - const int __user *, nodes, > - int __user *, status, int, flags) > +struct task_struct *can_migrate_get_task(pid_t pid) > { > - const struct cred *cred = current_cred(), *tcred; > struct task_struct *task; > - struct mm_struct *mm; > - int err; > - > - /* Check flags */ > - if (flags & ~(MPOL_MF_MOVE|MPOL_MF_MOVE_ALL)) > - return -EINVAL; > - > - if ((flags & MPOL_MF_MOVE_ALL) && !capable(CAP_SYS_NICE)) > - return -EPERM; > + const struct cred *cred = current_cred(), *tcred; > + int err = 0; > > - /* Find the mm_struct */ > rcu_read_lock(); > task = pid ? find_task_by_vpid(pid) : current; > if (!task) { > rcu_read_unlock(); > - return -ESRCH; > + return ERR_PTR(-ESRCH); > } > - mm = get_task_mm(task); > - rcu_read_unlock(); > - > - if (!mm) > - return -EINVAL; > + get_task_struct(task); Hmmm isnt the race still there between the determination of the task and the get_task_struct()? You would have to verify after the get_task_struct that this is really the task we wanted to avoid the race. -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@xxxxxxxxx. For more info on Linux MM, see: http://www.linux-mm.org/ . Fight unfair telecom internet charges in Canada: sign http://stopthemeter.ca/ Don't email: <a href=mailto:"dont@xxxxxxxxx"> email@xxxxxxxxx </a>