lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20140428211343.GJ4430@linux.vnet.ibm.com>
Date:	Mon, 28 Apr 2014 14:13:43 -0700
From:	"Paul E. McKenney" <paulmck@...ux.vnet.ibm.com>
To:	Pranith Kumar <pranith@...ech.edu>
Cc:	linux-kernel@...r.kernel.org
Subject: Re: usage of rcu_dereference_raw

On Mon, Apr 21, 2014 at 06:47:34PM -0400, Pranith Kumar wrote:
> 
> On Mon, Apr 21, 2014 at 6:03 PM, Paul E. McKenney <paulmck@...ux.vnet.ibm.com> wrote:
> >>   do most of the uses of rcu_dereference_raw() need to be changed to use other
> >>   dereference functions or are there cases where its usage is valid?
> >
> > The second call from iwl_op_mode_dvm_stop() -might- be valid.  For it
> > to be valid, there must be a grace period between the time that the
> > field was made inaccessible to readers and the time that iwl_uninit_drv()
> > was called.  Usually something like synchronize_rcu() waits for the
> > needed grace period.
> 
> So there are valid use cases of the rcu_dereference_raw() in scenarios where
> we can verify that a grace period has passed.
> 
> Thank you for the info. Mind adding it as a comment as in the patch below?
> 
> add comment for rcu_dereference_raw
> 
> Signed-off-by: Pranith Kumar <bobby.prani@...il.com>

If we are going to do that, we should probably have a complete list:

1.	The pointer has not yet been made available to readers,
	for example, the access happens during initialization.

2.	A grace period has elapsed since the last time that this
	pointer was available to readers, for example, this access
	happens during clean-up processing within an RCU callback
	function.

3.	Code that is shared among multiple flavors of RCU cannot
	say which flavor of RCU to specify.  Given SRCU, there might
	be an unbounded number to choose from.  This is the reason
	for use of rcu_dereference_raw() in list_for_each_entry_rcu()
	and similar RCU list-traversal macros.

4.	Code that uses a combination of RCU and per-data-structure
	locking, but where a given lock guards not just the data
	structure containing it, but a number of subordinate linked
	structures as well.  Code operating on one of the subordinate
	structures might not know which lock is protecting it.

There probably are others, but that is what comes to mind at the
moment.  Ah, and we should ask that uses of rcu_dereference_raw()
be commented.

							Thanx, Paul

> ---
>  include/linux/rcupdate.h |    8 +++++++-
>  1 file changed, 7 insertions(+), 1 deletion(-)
> 
> diff --git a/include/linux/rcupdate.h b/include/linux/rcupdate.h
> index 00a7fd6..af40a86 100644
> --- a/include/linux/rcupdate.h
> +++ b/include/linux/rcupdate.h
> @@ -662,7 +662,13 @@ static inline void rcu_preempt_sleep_check(void)
>      __rcu_dereference_check((p), rcu_read_lock_sched_held() || (c), \
>                  __rcu)
> 
> -#define rcu_dereference_raw(p) rcu_dereference_check(p, 1) /*@@@ needed? @@@*/
> +/* rcu_dereference_raw() - rcu_dereference with no checking
> + * @p: The pointer to read, prior to dereferencing
> + *
> + * Use this to dereference a rcu pointer if you are sure that there exists a
> + * grace period between the time this pointer was made inaccessible to readers
> + */
> +#define rcu_dereference_raw(p) rcu_dereference_check(p, 1)
> 
>  /*
>   * The tracing infrastructure traces RCU (we want that), but unfortunately
> -- 
> 1.7.9.5
> 
> 
> -- 
> Pranith
> 

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ