Paul E. McKenney wrote:
> On Sat, Nov 12, 2016 at 11:26:15PM +0900, Tetsuo Handa wrote:
> > Both head->r.acl and 
> > &tomoyo_kernel_namespace.policy_list[TOMOYO_ID_MANAGER]->next
> > refer normal kernel address space. Thus, I think that this warning is a 
> > false positive.
> > 
> > This warning goes away if I disable rcu_dereference_sparse() call in
> > __rcu_dereference_check() from srcu_dereference_check() from 
> > srcu_dereference().
> > 
> > --- a/include/linux/rcupdate.h
> > +++ b/include/linux/rcupdate.h
> > @@ -605,7 +605,7 @@ static inline void rcu_preempt_sleep_check(void)
> >         /* Dependency order vs. p above. */ \
> >         typeof(*p) *________p1 = (typeof(*p) 
> > *__force)lockless_dereference(p); \
> >         RCU_LOCKDEP_WARN(!(c), "suspicious rcu_dereference_check() usage"); 
> > \
> > -       rcu_dereference_sparse(p, space); \
> > +       /*rcu_dereference_sparse(p, space); */                          \
> >         ((typeof(*p) __force __kernel *)(________p1)); \
> >  })
> >  #define __rcu_dereference_protected(p, c, space) \
> 
> OK.
> 
> One approach would be for you to replace your:
> 
>       pos =  srcu_dereference((head)->next, &tomoyo_ss);
> 
> with:
> 
>       pos =  ecu_dereference_raw((head)->next);
> 
> This will suppress the sparse complaint, but would also suppress the
> lockdep complaint about using list_for_each_cookie() unprotected by an
> SRCU read-side critical section.  But this can be handled by placing an
> appropriate RCU_LOCKDEP_WARN() in list_for_each_cookie().
> 
> Does that work for you?

Yes, I can use below approach. Thank you.

--- a/security/tomoyo/common.h
+++ b/security/tomoyo/common.h
@@ -1317,14 +1317,20 @@ static inline int tomoyo_round2(size_t size)
 
 #endif
 
+static inline void tomoyo_read_lock_check(void)
+{
+       RCU_LOCKDEP_WARN(!srcu_read_lock_held(&tomoyo_ss),
+                        "tomoyo_ss lock is not held.");
+}
+
 /**
  * list_for_each_cookie - iterate over a list with cookie.
  * @pos:        the &struct list_head to use as a loop cursor.
  * @head:       the head for your list.
  */
 #define list_for_each_cookie(pos, head)                                        
\
-       if (!pos)                                                       \
-               pos =  srcu_dereference((head)->next, &tomoyo_ss);      \
-       for ( ; pos != (head); pos = srcu_dereference(pos->next, &tomoyo_ss))
+       for (pos = pos ? pos : rcu_dereference_raw((head)->next);       \
+            tomoyo_read_lock_check(), pos != (head);                   \
+            pos = rcu_dereference_raw(pos->next))
 
 #endif /* !defined(_SECURITY_TOMOYO_COMMON_H) */

Reply via email to