From: Dennis Zhou <dennis@kernel.org>
To: Jeongjun Park <aha310510@gmail.com>
Cc: Shakeel Butt <shakeel.butt@linux.dev>,
tj@kernel.org, cl@gentwo.org, akpm@linux-foundation.org,
vbabka@suse.cz, rientjes@google.com, linux-mm@kvack.org,
linux-kernel@vger.kernel.org,
syzbot+e5bd32b79413e86f389e@syzkaller.appspotmail.com
Subject: Re: [PATCH] mm/percpu: prevent concurrency problem for pcpu_nr_populated read with spin lock
Date: Wed, 2 Jul 2025 22:57:50 -0700 [thread overview]
Message-ID: <aGYb3oqXlva9ASO5@snowbird> (raw)
In-Reply-To: <CAO9qdTG0uDcG5ydXbj5XZdsdH=pD2yHaq9dR=N=Nq5QvUMvuBA@mail.gmail.com>
On Thu, Jul 03, 2025 at 02:19:34PM +0900, Jeongjun Park wrote:
> Shakeel Butt <shakeel.butt@linux.dev> wrote:
> >
> > On Wed, Jul 02, 2025 at 05:27:49PM +0900, Jeongjun Park wrote:
> > > Read/Write to pcpu_nr_populated should be performed while protected
> > > by pcpu_lock. However, pcpu_nr_pages() reads pcpu_nr_populated without any
> > > protection, which causes a data race between read/write.
> > >
> > > Therefore, when reading pcpu_nr_populated in pcpu_nr_pages(), it should be
> > > modified to be protected by pcpu_lock.
> > >
> > > Reported-by: syzbot+e5bd32b79413e86f389e@syzkaller.appspotmail.com
> > > Fixes: 7e8a6304d541 ("/proc/meminfo: add percpu populated pages count")
> > > Signed-off-by: Jeongjun Park <aha310510@gmail.com>
> > > ---
> > > mm/percpu.c | 8 +++++++-
> > > 1 file changed, 7 insertions(+), 1 deletion(-)
> > >
> > > diff --git a/mm/percpu.c b/mm/percpu.c
> > > index b35494c8ede2..0f98b857fb36 100644
> > > --- a/mm/percpu.c
> > > +++ b/mm/percpu.c
> > > @@ -3355,7 +3355,13 @@ void __init setup_per_cpu_areas(void)
> > > */
> > > unsigned long pcpu_nr_pages(void)
> > > {
> > > - return pcpu_nr_populated * pcpu_nr_units;
> >
> > No need for the lock as I think race is fine here. Use something like
> > the following and add a comment.
> >
> > data_race(READ_ONCE(pcpu_nr_populated)) * pcpu_nr_units;
> >
>
> This race itself is not a critical security vuln, but it is a read/write
> race that actually occurs. Writing to pcpu_nr_populated is already
> systematically protected through pcpu_lock, so why do you think you can
> ignore the data race only when reading?
>
As mentioned in the other thread, the reader of this value is
/proc/meminfo and reading a stale value isn't the end of the world
either.
Thanks,
Dennis
prev parent reply other threads:[~2025-07-03 5:57 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-07-02 8:27 Jeongjun Park
2025-07-02 15:55 ` Christoph Lameter (Ampere)
2025-07-03 4:45 ` Jeongjun Park
2025-07-03 5:51 ` Dennis Zhou
2025-07-03 6:09 ` Jeongjun Park
2025-07-03 16:39 ` Tejun Heo
2025-07-02 17:03 ` Shakeel Butt
2025-07-03 5:19 ` Jeongjun Park
2025-07-03 5:57 ` Dennis Zhou [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=aGYb3oqXlva9ASO5@snowbird \
--to=dennis@kernel.org \
--cc=aha310510@gmail.com \
--cc=akpm@linux-foundation.org \
--cc=cl@gentwo.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-mm@kvack.org \
--cc=rientjes@google.com \
--cc=shakeel.butt@linux.dev \
--cc=syzbot+e5bd32b79413e86f389e@syzkaller.appspotmail.com \
--cc=tj@kernel.org \
--cc=vbabka@suse.cz \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox