On Wed, Dec 11 2013, Francis Moreau wrote:
> On 12/11/2013 06:54 PM, Greg Thelen wrote:
> [...]
>>
>> I don't think that 3.4 suffers the same problem. So I don't see any
>> reason to apply "fix shm_file deletion races" to 3.4.x. 3.4 is immune
>> because it use exclusive locking (spinlock) for shm-id-to-shm-object
>> conversions (shm_lock_check() in shmctl()). Newer kernels use rcu
>> protected schemes so more races are possible. Furthermore, I ran some
>> quick tests on v3.4.71 and did not find any crashes. So I don't think
>> 3.4.x needs this patch.
>>
>
> Ah ok, thank you for your insight.
>
> Maybe also adding a reference to the commit that introduced the bug
> would help but that would add extra work.
>
> Thanks
>From patch a399b29dfbaa ("ipc,shm: fix shm_file deletion races") commit
log:
Fixes: c2c737a0461e ("ipc,shm: shorten critical region for shmat")
Fixes: 2caacaa82a51 ("ipc,shm: shorten critical region for shmctl")
I think that these two patches are the ones to look for. Any kernels
which contain either c2c737a0461e or 2caacaa82a51 are likely to need
a399b29dfbaa ("ipc,shm: fix shm_file deletion races").
--
To unsubscribe from this list: send the line "unsubscribe stable" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html