Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757353Ab3IMBko (ORCPT ); Thu, 12 Sep 2013 21:40:44 -0400 Received: from youngberry.canonical.com ([91.189.89.112]:49924 "EHLO youngberry.canonical.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756187Ab3IMBkn (ORCPT ); Thu, 12 Sep 2013 21:40:43 -0400 Message-ID: <52326D14.40006@canonical.com> Date: Thu, 12 Sep 2013 18:40:36 -0700 From: John Johansen Organization: Canonical User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130803 Thunderbird/17.0.8 MIME-Version: 1.0 To: paulmck@linux.vnet.ibm.com CC: Miles Lane , LKML , apparmor@lists.ubuntu.com Subject: Re: Linus Git (3.11.0+) - security/apparmor/include/policy.h:363 suspicious rcu_dereference_check() usage! References: <20130912173450.GU3966@linux.vnet.ibm.com> In-Reply-To: <20130912173450.GU3966@linux.vnet.ibm.com> X-Enigmail-Version: 1.4.6 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 4647 Lines: 98 On 09/12/2013 10:34 AM, Paul E. McKenney wrote: > On Wed, Sep 11, 2013 at 11:39:31PM -0400, Miles Lane wrote: >> [ 29.804534] [ INFO: suspicious RCU usage. ] >> [ 29.804539] 3.11.0+ #5 Not tainted >> [ 29.804541] ------------------------------- >> [ 29.804545] security/apparmor/include/policy.h:363 suspicious >> rcu_dereference_check() usage! > > Adding the AppArmor maintainer and list on CC, looks like one for them. > yep, I'm looking into it thanks for the heads up > Thanx, Paul > >> [ 29.804548] >> [ 29.804548] other info that might help us debug this: >> [ 29.804548] >> [ 29.804553] >> [ 29.804553] rcu_scheduler_active = 1, debug_locks = 1 >> [ 29.804558] 2 locks held by apparmor_parser/1268: >> [ 29.804560] #0: (sb_writers#9){.+.+.+}, at: [] >> file_start_write+0x27/0x29 >> [ 29.804576] #1: (&ns->lock){+.+.+.}, at: [] >> aa_replace_profiles+0x166/0x57c >> [ 29.804589] >> [ 29.804589] stack backtrace: >> [ 29.804595] CPU: 0 PID: 1268 Comm: apparmor_parser Not tainted 3.11.0+ #5 >> [ 29.804599] Hardware name: ASUSTeK Computer Inc. UL50VT >> /UL50VT , BIOS 217 03/01/2010 >> [ 29.804602] 0000000000000000 ffff8800b95a1d90 ffffffff8144eb9b >> ffff8800b94db540 >> [ 29.804611] ffff8800b95a1dc0 ffffffff81087439 ffff880138cc3a18 >> ffff880138cc3a18 >> [ 29.804619] ffff8800b9464a90 ffff880138cc3a38 ffff8800b95a1df0 >> ffffffff811f5084 >> [ 29.804628] Call Trace: >> [ 29.804636] [] dump_stack+0x4e/0x82 >> [ 29.804642] [] lockdep_rcu_suspicious+0xfc/0x105 >> [ 29.804649] [] __aa_update_replacedby+0x53/0x7f >> [ 29.804655] [] __replace_profile+0x11f/0x1ed >> [ 29.804661] [] aa_replace_profiles+0x410/0x57c >> [ 29.804668] [] profile_replace+0x35/0x4c >> [ 29.804674] [] vfs_write+0xad/0x113 >> [ 29.804680] [] SyS_write+0x44/0x7a >> [ 29.804687] [] system_call_fastpath+0x16/0x1b >> [ 29.804691] >> [ 29.804694] =============================== >> [ 29.804697] [ INFO: suspicious RCU usage. ] >> [ 29.804700] 3.11.0+ #5 Not tainted >> [ 29.804703] ------------------------------- >> [ 29.804706] security/apparmor/policy.c:566 suspicious >> rcu_dereference_check() usage! >> [ 29.804709] >> [ 29.804709] other info that might help us debug this: >> [ 29.804709] >> [ 29.804714] >> [ 29.804714] rcu_scheduler_active = 1, debug_locks = 1 >> [ 29.804718] 2 locks held by apparmor_parser/1268: >> [ 29.804721] #0: (sb_writers#9){.+.+.+}, at: [] >> file_start_write+0x27/0x29 >> [ 29.804733] #1: (&ns->lock){+.+.+.}, at: [] >> aa_replace_profiles+0x166/0x57c >> [ 29.804744] >> [ 29.804744] stack backtrace: >> [ 29.804750] CPU: 0 PID: 1268 Comm: apparmor_parser Not tainted 3.11.0+ #5 >> [ 29.804753] Hardware name: ASUSTeK Computer Inc. UL50VT >> /UL50VT , BIOS 217 03/01/2010 >> [ 29.804756] 0000000000000000 ffff8800b95a1d80 ffffffff8144eb9b >> ffff8800b94db540 >> [ 29.804764] ffff8800b95a1db0 ffffffff81087439 ffff8800b95b02b0 >> 0000000000000000 >> [ 29.804772] ffff8800b9efba08 ffff880138cc3a38 ffff8800b95a1dd0 >> ffffffff811f4f94 >> [ 29.804779] Call Trace: >> [ 29.804786] [] dump_stack+0x4e/0x82 >> [ 29.804791] [] lockdep_rcu_suspicious+0xfc/0x105 >> [ 29.804798] [] aa_free_replacedby_kref+0x4d/0x62 >> [ 29.804804] [] ? aa_put_namespace+0x17/0x17 >> [ 29.804810] [] kref_put+0x36/0x40 >> [ 29.804816] [] __replace_profile+0x13a/0x1ed >> [ 29.804822] [] aa_replace_profiles+0x410/0x57c >> [ 29.804829] [] profile_replace+0x35/0x4c >> [ 29.804835] [] vfs_write+0xad/0x113 >> [ 29.804840] [] SyS_write+0x44/0x7a >> [ 29.804847] [] system_call_fastpath+0x16/0x1b >> -- >> To unsubscribe from this list: send the line "unsubscribe linux-kernel" in >> the body of a message to majordomo@vger.kernel.org >> More majordomo info at http://vger.kernel.org/majordomo-info.html >> Please read the FAQ at http://www.tux.org/lkml/ >> > -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/