lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date:	Mon, 23 May 2011 18:28:22 -0400
From:	Dave Jones <davej@...hat.com>
To:	Linux Kernel <linux-kernel@...r.kernel.org>
Cc:	mingo@...e.hu
Subject: suspicious rcu_dereference_check in post_schedule.

just noticed this on a build of Linus' tree from sometime yesterday.

	Dave

===================================================
[ INFO: suspicious rcu_dereference_check() usage. ]
---------------------------------------------------
kernel/sched_rt.c:1266 invoked rcu_dereference_check() without protection!

other info that might help us debug this:


rcu_scheduler_active = 1, debug_locks = 0
1 lock held by watchdog/0/12:
 #0:  (&rq->lock){-.-.-.}, at: [<ffffffff8104c460>] post_schedule.part.25+0x14/0x4a

stack backtrace:
Pid: 12, comm: watchdog/0 Not tainted 2.6.39+ #43
Call Trace:
 [<ffffffff8108c376>] lockdep_rcu_dereference+0xa7/0xaf
 [<ffffffff8104b7ee>] find_lowest_rq+0x11b/0x19a
 [<ffffffff81055667>] push_rt_task.part.69+0x7b/0x1d2
 [<ffffffff810558cc>] post_schedule_rt+0x1f/0x27
 [<ffffffff8104c47c>] post_schedule.part.25+0x30/0x4a
 [<ffffffff814c8ac9>] schedule+0x76e/0x7ca
 [<ffffffff810bf0af>] ? watchdog_enable+0x194/0x194
 [<ffffffff810bf0af>] ? watchdog_enable+0x194/0x194
 [<ffffffff810bf122>] watchdog+0x73/0xb6
 [<ffffffff810793e9>] kthread+0xa8/0xb0
 [<ffffffff814ce230>] ? sub_preempt_count+0xa1/0xb4
 [<ffffffff814d24a4>] kernel_thread_helper+0x4/0x10
 [<ffffffff814cb698>] ? retint_restore_args+0x13/0x13
 [<ffffffff81079341>] ? __init_kthread_worker+0x5a/0x5a
 [<ffffffff814d24a0>] ? gs_change+0x13/0x13

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ