From: Pavel Tikhomirov <ptikhomirov@virtuozzo.com>
To: Christian Brauner <brauner@kernel.org>
Cc: Andrew Morton <akpm@linux-foundation.org>,
Shuah Khan <shuah@kernel.org>, Kees Cook <kees@kernel.org>,
David Hildenbrand <david@kernel.org>,
Ingo Molnar <mingo@redhat.com>,
Peter Zijlstra <peterz@infradead.org>,
Juri Lelli <juri.lelli@redhat.com>,
Vincent Guittot <vincent.guittot@linaro.org>,
Jan Kara <jack@suse.cz>, Oleg Nesterov <oleg@redhat.com>,
Aleksa Sarai <cyphar@cyphar.com>,
Andrei Vagin <avagin@google.com>, Kirill Tkhai <tkhai@ya.ru>,
Alexander Mikhalitsyn <alexander@mihalicyn.com>,
Adrian Reber <areber@redhat.com>,
Mateusz Guzik <mjguzik@gmail.com>,
Pavel Tikhomirov <ptikhomirov@virtuozzo.com>,
linux-kernel@vger.kernel.org, linux-mm@kvack.org,
linux-kselftest@vger.kernel.org
Subject: [PATCH v6 1/5] pid_namespace: avoid optimization of accesses to ->child_reaper
Date: Wed, 18 Mar 2026 13:21:49 +0100 [thread overview]
Message-ID: <20260318122157.280595-2-ptikhomirov@virtuozzo.com> (raw)
In-Reply-To: <20260318122157.280595-1-ptikhomirov@virtuozzo.com>
To avoid potential problems related to cpu/compiler optimizations around
->child_reaper, let's use WRITE_ONCE (additional to task_list lock)
everywhere we write it and use READ_ONCE where we read it without
explicit lock. Note: It also pairs with existing READ_ONCE with no lock
in nsfs_fh_to_dentry().
Also let's add ASSERT_EXCLUSIVE_WRITER before write to identify to KCSAN
that we don't expect any concurrent ->child_reaper modifications, and
those must be detected.
Suggested-by: Oleg Nesterov <oleg@redhat.com>
Acked-by: Oleg Nesterov <oleg@redhat.com>
Signed-off-by: Pavel Tikhomirov <ptikhomirov@virtuozzo.com>
--
v3: Split from main commit. Add ASSERT_EXCLUSIVE_WRITER.
v5: Add one more READ_ONCE for access without lock in free_pid().
---
kernel/exit.c | 3 ++-
kernel/fork.c | 5 ++++-
kernel/pid.c | 4 ++--
3 files changed, 8 insertions(+), 4 deletions(-)
diff --git a/kernel/exit.c b/kernel/exit.c
index ede3117fa7d4..31b714c3a791 100644
--- a/kernel/exit.c
+++ b/kernel/exit.c
@@ -608,7 +608,8 @@ static struct task_struct *find_child_reaper(struct task_struct *father,
reaper = find_alive_thread(father);
if (reaper) {
- pid_ns->child_reaper = reaper;
+ ASSERT_EXCLUSIVE_WRITER(pid_ns->child_reaper);
+ WRITE_ONCE(pid_ns->child_reaper, reaper);
return reaper;
}
diff --git a/kernel/fork.c b/kernel/fork.c
index bc2bf58b93b6..75c99afb7529 100644
--- a/kernel/fork.c
+++ b/kernel/fork.c
@@ -2423,7 +2423,10 @@ __latent_entropy struct task_struct *copy_process(
init_task_pid(p, PIDTYPE_SID, task_session(current));
if (is_child_reaper(pid)) {
- ns_of_pid(pid)->child_reaper = p;
+ struct pid_namespace *ns = ns_of_pid(pid);
+
+ ASSERT_EXCLUSIVE_WRITER(ns->child_reaper);
+ WRITE_ONCE(ns->child_reaper, p);
p->signal->flags |= SIGNAL_UNKILLABLE;
}
p->signal->shared_pending.signal = delayed.signal;
diff --git a/kernel/pid.c b/kernel/pid.c
index 3b96571d0fe6..386e51fcebb3 100644
--- a/kernel/pid.c
+++ b/kernel/pid.c
@@ -128,7 +128,7 @@ void free_pid(struct pid *pid)
* is the reaper wake up the reaper. The reaper
* may be sleeping in zap_pid_ns_processes().
*/
- wake_up_process(ns->child_reaper);
+ wake_up_process(READ_ONCE(ns->child_reaper));
break;
case PIDNS_ADDING:
/* Handle a fork failure of the first process */
@@ -219,7 +219,7 @@ struct pid *alloc_pid(struct pid_namespace *ns, pid_t *arg_set_tid,
* Also fail if a PID != 1 is requested and
* no PID 1 exists.
*/
- if (tid != 1 && !tmp->child_reaper)
+ if (tid != 1 && !READ_ONCE(tmp->child_reaper))
goto out_abort;
retval = -EPERM;
if (!checkpoint_restore_ns_capable(tmp->user_ns))
--
2.53.0
next prev parent reply other threads:[~2026-03-18 12:25 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-03-18 12:21 [PATCH v6 0/5] pid_namespace: make init creation more flexible Pavel Tikhomirov
2026-03-18 12:21 ` Pavel Tikhomirov [this message]
2026-03-18 12:21 ` [PATCH v6 2/5] pid: check init is created first after idr alloc Pavel Tikhomirov
2026-03-18 12:21 ` [PATCH v6 3/5] pid_namespace: allow opening pid_for_children before init was created Pavel Tikhomirov
2026-03-18 12:21 ` [PATCH v6 4/5] selftests: Add tests for creating pidns init via setns Pavel Tikhomirov
2026-03-18 12:21 ` [PATCH v6 5/5] MAINTAINERS: add a new entry for testing pidns init creation " Pavel Tikhomirov
2026-03-20 13:47 ` [PATCH v6 0/5] pid_namespace: make init creation more flexible Christian Brauner
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260318122157.280595-2-ptikhomirov@virtuozzo.com \
--to=ptikhomirov@virtuozzo.com \
--cc=akpm@linux-foundation.org \
--cc=alexander@mihalicyn.com \
--cc=areber@redhat.com \
--cc=avagin@google.com \
--cc=brauner@kernel.org \
--cc=cyphar@cyphar.com \
--cc=david@kernel.org \
--cc=jack@suse.cz \
--cc=juri.lelli@redhat.com \
--cc=kees@kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-kselftest@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=mingo@redhat.com \
--cc=mjguzik@gmail.com \
--cc=oleg@redhat.com \
--cc=peterz@infradead.org \
--cc=shuah@kernel.org \
--cc=tkhai@ya.ru \
--cc=vincent.guittot@linaro.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox