lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CADxym3YhwQ=2z8u2RNoEK3iM2KwafeM-aB8OAspCyOaLy+iu=g@mail.gmail.com>
Date: Fri, 29 Aug 2025 08:47:01 +0800
From: Menglong Dong <menglong8.dong@...il.com>
To: Steven Rostedt <rostedt@...dmis.org>
Cc: Masami Hiramatsu <mhiramat@...nel.org>, oe-lkp@...ts.linux.dev, 
	kernel test robot <oliver.sang@...el.com>, lkp@...el.com, 
	Menglong Dong <dongml2@...natelecom.cn>, linux-kernel@...r.kernel.org, 
	linux-trace-kernel@...r.kernel.org
Subject: Re: [linux-next:master] [tracing] dfe0d675df: WARNING:suspicious_RCU_usage

On Thu, Aug 28, 2025 at 10:34 PM Steven Rostedt <rostedt@...dmis.org> wrote:
>
> On Thu, 28 Aug 2025 17:09:35 +0800
> Menglong Dong <menglong8.dong@...il.com> wrote:
>
> > > [  354.955971][ T4652]  dump_stack_lvl+0x7c/0x90
> > > [  354.955978][ T4652]  lockdep_rcu_suspicious+0x14f/0x1c0
> > > [  354.955987][ T4652]  __rhashtable_lookup+0x1e0/0x260
> >
> > rcu_read_lock() is not needed in fprobe_entry, but
> > rcu_dereference_check() is used in rhltable_lookup(), which
> > causes this warning.
>
> Why is rcu_read_lock() not needed in fprobe_entry()?

This is how it worked previously. In ftrace_test_recursion_trylock(),
preemption will be disabled, which ensure the RCU read-side
critical section.


Thanks!
Menglong Dong

>
> -- Steve
>
> >
> > Adding rcu_read_lock() here is able to suppress this warning.
> > Maybe we need only rcu_lock_acquire(&rcu_lock_map) here,
> > but it's not a common usage. What do you think, Masami?
>

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ