Hi all,

On Mon, 6 Apr 2020 16:29:50 +0530 Amol Grover <frextr...@gmail.com> wrote:
>
> exceptions may be traversed using list_for_each_entry_rcu()
> outside of an RCU read side critical section BUT under the
> protection of decgroup_mutex. Hence add the corresponding
> lockdep expression to fix the following false-positive
> warning:
> 
> [    2.304417] =============================
> [    2.304418] WARNING: suspicious RCU usage
> [    2.304420] 5.5.4-stable #17 Tainted: G            E
> [    2.304422] -----------------------------
> [    2.304424] security/device_cgroup.c:355 RCU-list traversed in non-reader 
> section!!
> 
> Signed-off-by: Amol Grover <frextr...@gmail.com>
> ---
>  security/device_cgroup.c | 3 ++-
>  1 file changed, 2 insertions(+), 1 deletion(-)
> 
> diff --git a/security/device_cgroup.c b/security/device_cgroup.c
> index 7d0f8f7431ff..b7da9e0970d9 100644
> --- a/security/device_cgroup.c
> +++ b/security/device_cgroup.c
> @@ -352,7 +352,8 @@ static bool match_exception_partial(struct list_head 
> *exceptions, short type,
>  {
>       struct dev_exception_item *ex;
>  
> -     list_for_each_entry_rcu(ex, exceptions, list) {
> +     list_for_each_entry_rcu(ex, exceptions, list,
> +                             lockdep_is_held(&devcgroup_mutex)) {
>               if ((type & DEVCG_DEV_BLOCK) && !(ex->type & DEVCG_DEV_BLOCK))
>                       continue;
>               if ((type & DEVCG_DEV_CHAR) && !(ex->type & DEVCG_DEV_CHAR))
> -- 
> 2.24.1
> 

I have been carrying the above patch in linux-next for some time now.
I have been carrying it because it fixes problems for syzbot (see the
third warning in
https://lore.kernel.org/linux-next/cact4y+ynjk+kq0pfb5fe-q1bqe2t1jq_mvkhf--z80z3wky...@mail.gmail.com/).
Is there some reason it has not been applied to some tree?

-- 
Cheers,
Stephen Rothwell

Attachment: pgpAmuW2UkYbG.pgp
Description: OpenPGP digital signature

Reply via email to