lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202207131026.3B0WbQwF-lkp@intel.com>
Date:   Wed, 13 Jul 2022 10:42:36 +0800
From:   kernel test robot <lkp@...el.com>
To:     "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>
Cc:     kbuild-all@...ts.01.org, linux-kernel@...r.kernel.org
Subject: [kas:lam 4/13] arch/x86/mm/tlb.c:496:23: warning: unused variable
 'prev_lam'

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/kas/linux.git lam
head:   ca9762d59aa41bc0a580c2f7668038d31c991f59
commit: ce8762cf0c572b53a82a08a369376c28cfb6fda4 [4/13] x86/mm: Handle LAM on context switch
config: i386-defconfig (https://download.01.org/0day-ci/archive/20220713/202207131026.3B0WbQwF-lkp@intel.com/config)
compiler: gcc-11 (Debian 11.3.0-3) 11.3.0
reproduce (this is a W=1 build):
        # https://git.kernel.org/pub/scm/linux/kernel/git/kas/linux.git/commit/?id=ce8762cf0c572b53a82a08a369376c28cfb6fda4
        git remote add kas https://git.kernel.org/pub/scm/linux/kernel/git/kas/linux.git
        git fetch --no-tags kas lam
        git checkout ce8762cf0c572b53a82a08a369376c28cfb6fda4
        # save the config file
        mkdir build_dir && cp config build_dir/.config
        make W=1 O=build_dir ARCH=i386 SHELL=/bin/bash arch/x86/mm/

If you fix the issue, kindly add following tag where applicable
Reported-by: kernel test robot <lkp@...el.com>

All warnings (new ones prefixed by >>):

   arch/x86/mm/tlb.c: In function 'switch_mm_irqs_off':
>> arch/x86/mm/tlb.c:496:23: warning: unused variable 'prev_lam' [-Wunused-variable]
     496 |         unsigned long prev_lam = tlbstate_lam_cr3_mask();
         |                       ^~~~~~~~


vim +/prev_lam +496 arch/x86/mm/tlb.c

   490	
   491	void switch_mm_irqs_off(struct mm_struct *prev, struct mm_struct *next,
   492				struct task_struct *tsk)
   493	{
   494		struct mm_struct *real_prev = this_cpu_read(cpu_tlbstate.loaded_mm);
   495		u16 prev_asid = this_cpu_read(cpu_tlbstate.loaded_mm_asid);
 > 496		unsigned long prev_lam = tlbstate_lam_cr3_mask();
   497		unsigned long new_lam = mm_lam_cr3_mask(next);
   498		bool was_lazy = this_cpu_read(cpu_tlbstate_shared.is_lazy);
   499		unsigned cpu = smp_processor_id();
   500		u64 next_tlb_gen;
   501		bool need_flush;
   502		u16 new_asid;
   503	
   504		/*
   505		 * NB: The scheduler will call us with prev == next when switching
   506		 * from lazy TLB mode to normal mode if active_mm isn't changing.
   507		 * When this happens, we don't assume that CR3 (and hence
   508		 * cpu_tlbstate.loaded_mm) matches next.
   509		 *
   510		 * NB: leave_mm() calls us with prev == NULL and tsk == NULL.
   511		 */
   512	
   513		/* We don't want flush_tlb_func() to run concurrently with us. */
   514		if (IS_ENABLED(CONFIG_PROVE_LOCKING))
   515			WARN_ON_ONCE(!irqs_disabled());
   516	
   517		/*
   518		 * Verify that CR3 is what we think it is.  This will catch
   519		 * hypothetical buggy code that directly switches to swapper_pg_dir
   520		 * without going through leave_mm() / switch_mm_irqs_off() or that
   521		 * does something like write_cr3(read_cr3_pa()).
   522		 *
   523		 * Only do this check if CONFIG_DEBUG_VM=y because __read_cr3()
   524		 * isn't free.
   525		 */
   526	#ifdef CONFIG_DEBUG_VM
   527		if (WARN_ON_ONCE(__read_cr3() != build_cr3(real_prev->pgd, prev_asid, prev_lam))) {
   528			/*
   529			 * If we were to BUG here, we'd be very likely to kill
   530			 * the system so hard that we don't see the call trace.
   531			 * Try to recover instead by ignoring the error and doing
   532			 * a global flush to minimize the chance of corruption.
   533			 *
   534			 * (This is far from being a fully correct recovery.
   535			 *  Architecturally, the CPU could prefetch something
   536			 *  back into an incorrect ASID slot and leave it there
   537			 *  to cause trouble down the road.  It's better than
   538			 *  nothing, though.)
   539			 */
   540			__flush_tlb_all();
   541		}
   542	#endif
   543		if (was_lazy)
   544			this_cpu_write(cpu_tlbstate_shared.is_lazy, false);
   545	
   546		/*
   547		 * The membarrier system call requires a full memory barrier and
   548		 * core serialization before returning to user-space, after
   549		 * storing to rq->curr, when changing mm.  This is because
   550		 * membarrier() sends IPIs to all CPUs that are in the target mm
   551		 * to make them issue memory barriers.  However, if another CPU
   552		 * switches to/from the target mm concurrently with
   553		 * membarrier(), it can cause that CPU not to receive an IPI
   554		 * when it really should issue a memory barrier.  Writing to CR3
   555		 * provides that full memory barrier and core serializing
   556		 * instruction.
   557		 */
   558		if (real_prev == next) {
   559			VM_WARN_ON(this_cpu_read(cpu_tlbstate.ctxs[prev_asid].ctx_id) !=
   560				   next->context.ctx_id);
   561	
   562			/*
   563			 * Even in lazy TLB mode, the CPU should stay set in the
   564			 * mm_cpumask. The TLB shootdown code can figure out from
   565			 * cpu_tlbstate_shared.is_lazy whether or not to send an IPI.
   566			 */
   567			if (WARN_ON_ONCE(real_prev != &init_mm &&
   568					 !cpumask_test_cpu(cpu, mm_cpumask(next))))
   569				cpumask_set_cpu(cpu, mm_cpumask(next));
   570	
   571			/*
   572			 * If the CPU is not in lazy TLB mode, we are just switching
   573			 * from one thread in a process to another thread in the same
   574			 * process. No TLB flush required.
   575			 */
   576			if (!was_lazy)
   577				return;
   578	
   579			/*
   580			 * Read the tlb_gen to check whether a flush is needed.
   581			 * If the TLB is up to date, just use it.
   582			 * The barrier synchronizes with the tlb_gen increment in
   583			 * the TLB shootdown code.
   584			 */
   585			smp_mb();
   586			next_tlb_gen = atomic64_read(&next->context.tlb_gen);
   587			if (this_cpu_read(cpu_tlbstate.ctxs[prev_asid].tlb_gen) ==
   588					next_tlb_gen)
   589				return;
   590	
   591			/*
   592			 * TLB contents went out of date while we were in lazy
   593			 * mode. Fall through to the TLB switching code below.
   594			 */
   595			new_asid = prev_asid;
   596			need_flush = true;
   597		} else {
   598			/*
   599			 * Apply process to process speculation vulnerability
   600			 * mitigations if applicable.
   601			 */
   602			cond_mitigation(tsk);
   603	
   604			/*
   605			 * Stop remote flushes for the previous mm.
   606			 * Skip kernel threads; we never send init_mm TLB flushing IPIs,
   607			 * but the bitmap manipulation can cause cache line contention.
   608			 */
   609			if (real_prev != &init_mm) {
   610				VM_WARN_ON_ONCE(!cpumask_test_cpu(cpu,
   611							mm_cpumask(real_prev)));
   612				cpumask_clear_cpu(cpu, mm_cpumask(real_prev));
   613			}
   614	
   615			/*
   616			 * Start remote flushes and then read tlb_gen.
   617			 */
   618			if (next != &init_mm)
   619				cpumask_set_cpu(cpu, mm_cpumask(next));
   620			next_tlb_gen = atomic64_read(&next->context.tlb_gen);
   621	
   622			choose_new_asid(next, next_tlb_gen, &new_asid, &need_flush);
   623	
   624			/* Let nmi_uaccess_okay() know that we're changing CR3. */
   625			this_cpu_write(cpu_tlbstate.loaded_mm, LOADED_MM_SWITCHING);
   626			barrier();
   627		}
   628	
   629		set_tlbstate_cr3_lam_mask(new_lam);
   630		if (need_flush) {
   631			this_cpu_write(cpu_tlbstate.ctxs[new_asid].ctx_id, next->context.ctx_id);
   632			this_cpu_write(cpu_tlbstate.ctxs[new_asid].tlb_gen, next_tlb_gen);
   633			load_new_mm_cr3(next->pgd, new_asid, new_lam, true);
   634	
   635			trace_tlb_flush(TLB_FLUSH_ON_TASK_SWITCH, TLB_FLUSH_ALL);
   636		} else {
   637			/* The new ASID is already up to date. */
   638			load_new_mm_cr3(next->pgd, new_asid, new_lam, false);
   639	
   640			trace_tlb_flush(TLB_FLUSH_ON_TASK_SWITCH, 0);
   641		}
   642	
   643		/* Make sure we write CR3 before loaded_mm. */
   644		barrier();
   645	
   646		this_cpu_write(cpu_tlbstate.loaded_mm, next);
   647		this_cpu_write(cpu_tlbstate.loaded_mm_asid, new_asid);
   648	
   649		if (next != real_prev) {
   650			cr4_update_pce_mm(next);
   651			switch_ldt(real_prev, next);
   652		}
   653	}
   654	

-- 
0-DAY CI Kernel Test Service
https://01.org/lkp

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ