lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20200720195939.GU9247@paulmck-ThinkPad-P72>
Date:   Mon, 20 Jul 2020 12:59:39 -0700
From:   "Paul E. McKenney" <paulmck@...nel.org>
To:     Stephen Rothwell <sfr@...b.auug.org.au>
Cc:     Randy Dunlap <rdunlap@...radead.org>,
        Linux Next Mailing List <linux-next@...r.kernel.org>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        KVM <kvm@...r.kernel.org>, Paolo Bonzini <pbonzini@...hat.com>,
        Madhuparna Bhowmik <madhuparnabhowmik10@...il.com>
Subject: Re: linux-next: Tree for Jul 20 (arch/x86/kvm/)

On Tue, Jul 21, 2020 at 04:43:07AM +1000, Stephen Rothwell wrote:
> Hi Randy,
> 
> On Mon, 20 Jul 2020 09:56:08 -0700 Randy Dunlap <rdunlap@...radead.org> wrote:
> >
> > on x86_64:
> > 
> >   CC [M]  arch/x86/kvm/mmu/page_track.o
> > In file included from ../include/linux/pid.h:5:0,
> >                  from ../include/linux/sched.h:14,
> >                  from ../include/linux/kvm_host.h:12,
> >                  from ../arch/x86/kvm/mmu/page_track.c:14:
> > ../arch/x86/kvm/mmu/page_track.c: In function ‘kvm_page_track_write’:
> > ../include/linux/rculist.h:727:30: error: left-hand operand of comma expression has no effect [-Werror=unused-value]
> >   for (__list_check_srcu(cond),     \
> >                               ^
> > ../arch/x86/kvm/mmu/page_track.c:232:2: note: in expansion of macro ‘hlist_for_each_entry_srcu’
> >   hlist_for_each_entry_srcu(n, &head->track_notifier_list, node,
> >   ^~~~~~~~~~~~~~~~~~~~~~~~~
> > ../arch/x86/kvm/mmu/page_track.c: In function ‘kvm_page_track_flush_slot’:
> > ../include/linux/rculist.h:727:30: error: left-hand operand of comma expression has no effect [-Werror=unused-value]
> >   for (__list_check_srcu(cond),     \
> >                               ^
> > ../arch/x86/kvm/mmu/page_track.c:258:2: note: in expansion of macro ‘hlist_for_each_entry_srcu’
> >   hlist_for_each_entry_srcu(n, &head->track_notifier_list, node,
> >   ^~~~~~~~~~~~~~~~~~~~~~~~~
> > cc1: all warnings being treated as errors
> 
> Caused by commit
> 
>   bd4444c47de9 ("rculist : Introduce list/hlist_for_each_entry_srcu() macros")
> 
> presumably with CONFIG_PROVE_RCU_LIST not set.

This commit has been obsoleted by the commit shown below, which should
be included in -rcu branch "rcu/next" as of a few hours ago.  The commit
below eliminates this error in my local builds.

So as far as I know, this one is not Randy's fault, fun though it might
be to blame him.  ;-)

							Thanx, Paul

------------------------------------------------------------------------

commit ddd3f0494784e63546816888ba3fbc5aac9d9a54
Author: Madhuparna Bhowmik <madhuparnabhowmik10@...il.com>
Date:   Sun Jul 12 18:40:02 2020 +0530

    rculist : Introduce list/hlist_for_each_entry_srcu() macros
    
    list/hlist_for_each_entry_rcu() provides an optional cond argument
    to specify the lock held in the updater side.
    However for SRCU read side, not providing the cond argument results
    into false positive as whether srcu_read_lock is held or not is not
    checked implicitly. Therefore, on read side the lockdep expression
    srcu_read_lock_held(srcu struct) can solve this issue.
    
    However, the function still fails to check the cases where srcu
    protected list is traversed with rcu_read_lock() instead of
    srcu_read_lock(). Therefore, to remove the false negative,
    this patch introduces two new list traversal primitives :
    list_for_each_entry_srcu() and hlist_for_each_entry_srcu().
    
    Both of the functions have non-optional cond argument
    as it is required for both read and update side, and simply checks
    if the cond is true. For regular read side the lockdep expression
    srcu_read_lock_head() can be passed as the cond argument to
    list/hlist_for_each_entry_srcu().
    
    Suggested-by: Paolo Bonzini <pbonzini@...hat.com>
    Tested-by: Suraj Upadhyay <usuraj35@...il.com>
    Tested-by: Naresh Kamboju <naresh.kamboju@...aro.org>
    [ paulmck: Add "true" per kbuild test robot feedback. ]
    Signed-off-by: Madhuparna Bhowmik <madhuparnabhowmik10@...il.com>
    Signed-off-by: Paul E. McKenney <paulmck@...nel.org>

diff --git a/include/linux/rculist.h b/include/linux/rculist.h
index 7a6fc99..f8633d3 100644
--- a/include/linux/rculist.h
+++ b/include/linux/rculist.h
@@ -63,9 +63,17 @@ static inline void INIT_LIST_HEAD_RCU(struct list_head *list)
 	RCU_LOCKDEP_WARN(!(cond) && !rcu_read_lock_any_held(),		\
 			 "RCU-list traversed in non-reader section!");	\
 	})
+
+#define __list_check_srcu(cond)					 \
+	({								 \
+	RCU_LOCKDEP_WARN(!(cond),					 \
+		"RCU-list traversed without holding the required lock!");\
+	})
 #else
 #define __list_check_rcu(dummy, cond, extra...)				\
 	({ check_arg_count_one(extra); })
+
+#define __list_check_srcu(cond) ({ })
 #endif
 
 /*
@@ -386,6 +394,25 @@ static inline void list_splice_tail_init_rcu(struct list_head *list,
 		pos = list_entry_rcu(pos->member.next, typeof(*pos), member))
 
 /**
+ * list_for_each_entry_srcu	-	iterate over rcu list of given type
+ * @pos:	the type * to use as a loop cursor.
+ * @head:	the head for your list.
+ * @member:	the name of the list_head within the struct.
+ * @cond:	lockdep expression for the lock required to traverse the list.
+ *
+ * This list-traversal primitive may safely run concurrently with
+ * the _rcu list-mutation primitives such as list_add_rcu()
+ * as long as the traversal is guarded by srcu_read_lock().
+ * The lockdep expression srcu_read_lock_held() can be passed as the
+ * cond argument from read side.
+ */
+#define list_for_each_entry_srcu(pos, head, member, cond)		\
+	for (__list_check_srcu(cond),					\
+	     pos = list_entry_rcu((head)->next, typeof(*pos), member);	\
+		&pos->member != (head);					\
+		pos = list_entry_rcu(pos->member.next, typeof(*pos), member))
+
+/**
  * list_entry_lockless - get the struct for this entry
  * @ptr:        the &struct list_head pointer.
  * @type:       the type of the struct this is embedded in.
@@ -684,6 +711,27 @@ static inline void hlist_add_behind_rcu(struct hlist_node *n,
 			&(pos)->member)), typeof(*(pos)), member))
 
 /**
+ * hlist_for_each_entry_srcu - iterate over rcu list of given type
+ * @pos:	the type * to use as a loop cursor.
+ * @head:	the head for your list.
+ * @member:	the name of the hlist_node within the struct.
+ * @cond:	lockdep expression for the lock required to traverse the list.
+ *
+ * This list-traversal primitive may safely run concurrently with
+ * the _rcu list-mutation primitives such as hlist_add_head_rcu()
+ * as long as the traversal is guarded by srcu_read_lock().
+ * The lockdep expression srcu_read_lock_held() can be passed as the
+ * cond argument from read side.
+ */
+#define hlist_for_each_entry_srcu(pos, head, member, cond)		\
+	for (__list_check_srcu(cond),					\
+	     pos = hlist_entry_safe(rcu_dereference_raw(hlist_first_rcu(head)),\
+			typeof(*(pos)), member);			\
+		pos;							\
+		pos = hlist_entry_safe(rcu_dereference_raw(hlist_next_rcu(\
+			&(pos)->member)), typeof(*(pos)), member))
+
+/**
  * hlist_for_each_entry_rcu_notrace - iterate over rcu list of given type (for tracing)
  * @pos:	the type * to use as a loop cursor.
  * @head:	the head for your list.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ