diff options
author | Chengming Zhou <[email protected]> | 2022-03-05 11:41:03 +0800 |
---|---|---|
committer | Peter Zijlstra <[email protected]> | 2022-03-12 13:22:11 +0100 |
commit | f2aa197e4794bf4c2c0c9570684f86e6fa103e8b (patch) | |
tree | c323b08b3aac444c3cd794a2ce1f260c083572a1 /lib/test_fortify/write_overflow-strlcpy-src.c | |
parent | a0a7e453b502cbbf7ff372f907a4e27a2ebf5445 (diff) |
cgroup: Fix suspicious rcu_dereference_check() usage warning
task_css_set_check() will use rcu_dereference_check() to check for
rcu_read_lock_held() on the read-side, which is not true after commit
dc6e0818bc9a ("sched/cpuacct: Optimize away RCU read lock"). This
commit drop explicit rcu_read_lock(), change to RCU-sched read-side
critical section. So fix the RCU warning by adding check for
rcu_read_lock_sched_held().
Fixes: dc6e0818bc9a ("sched/cpuacct: Optimize away RCU read lock")
Reported-by: Linux Kernel Functional Testing <[email protected]>
Reported-by: [email protected]
Signed-off-by: Chengming Zhou <[email protected]>
Signed-off-by: Peter Zijlstra (Intel) <[email protected]>
Acked-by: Tejun Heo <[email protected]>
Tested-by: Zhouyi Zhou <[email protected]>
Tested-by: Marek Szyprowski <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Diffstat (limited to 'lib/test_fortify/write_overflow-strlcpy-src.c')
0 files changed, 0 insertions, 0 deletions