lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <202601231921.xwlp2ei1-lkp@intel.com>
Date: Fri, 23 Jan 2026 19:53:43 +0800
From: kernel test robot <lkp@...el.com>
To: Thomas Gleixner <tglx@...utronix.de>
Cc: oe-kbuild-all@...ts.linux.dev, linux-kernel@...r.kernel.org,
 Ingo Molnar <mingo@...nel.org>,
 "Peter Zijlstra (Intel)" <peterz@...radead.org>
Subject: kernel/futex/core.c:604:23: error: cannot jump from this asm
 goto statement to one of its possible targets

Hi Thomas,

FYI, the error/warning was bisected to this commit, please ignore it if it's irrelevant.

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head:   c072629f05d7bca1148ab17690d7922a31423984
commit: e4e28fd6986e8cf963ec4137e6c0b95403f636ab futex: Convert to get/put_user_inline()
date:   3 months ago
config: arm64-randconfig-r111-20260123 (https://download.01.org/0day-ci/archive/20260123/202601231921.xwlp2ei1-lkp@intel.com/config)
compiler: clang version 16.0.6 (https://github.com/llvm/llvm-project 7cbf1a2591520c2491aa35339f227775f4d3adf6)
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20260123/202601231921.xwlp2ei1-lkp@intel.com/reproduce)

If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@...el.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202601231921.xwlp2ei1-lkp@intel.com/

All errors (new ones prefixed by >>):

>> kernel/futex/core.c:604:23: error: cannot jump from this asm goto statement to one of its possible targets
                   if (node_updated && put_user_inline(node, naddr))
                                       ^
   include/linux/uaccess.h:870:3: note: expanded from macro 'put_user_inline'
                   unsafe_put_user(val, _tmpdst, efault);          \
                   ^
   include/linux/uaccess.h:616:2: note: expanded from macro 'unsafe_put_user'
           arch_unsafe_put_user(x, ptr, local_label);      \
           ^
   arch/arm64/include/asm/uaccess.h:426:2: note: expanded from macro 'arch_unsafe_put_user'
           __raw_put_mem("sttr", x, uaccess_mask_ptr(ptr), label, U)
           ^
   arch/arm64/include/asm/uaccess.h:309:3: note: expanded from macro '__raw_put_mem'
                   __put_mem_asm(str "b", "%w", __pu_val, (ptr), label, type);     \
                   ^
   arch/arm64/include/asm/uaccess.h:298:2: note: expanded from macro '__put_mem_asm'
           asm goto(                                                       \
           ^
   kernel/futex/core.c:604:23: note: possible target of asm goto statement
   include/linux/uaccess.h:870:3: note: expanded from macro 'put_user_inline'
                   unsafe_put_user(val, _tmpdst, efault);          \
                   ^
   include/linux/uaccess.h:618:2: note: expanded from macro 'unsafe_put_user'
           local_label:                                    \
           ^
   kernel/futex/core.c:604:23: note: jump exits scope of variable with __attribute__((cleanup))
   include/linux/uaccess.h:869:2: note: expanded from macro 'put_user_inline'
           scoped_user_write_access(_tmpdst, efault)               \
           ^
   include/linux/uaccess.h:803:2: note: expanded from macro 'scoped_user_write_access'
           scoped_user_write_access_size(udst, sizeof(*(udst)), elbl)
           ^
   include/linux/uaccess.h:791:2: note: expanded from macro 'scoped_user_write_access_size'
           __scoped_user_access(write, udst, size, elbl)
           ^
   include/linux/uaccess.h:755:36: note: expanded from macro '__scoped_user_access'
                   for (CLASS(user_##mode##_access, scope)(_tmpptr); !done; done = true)   \
                                                    ^
   kernel/futex/core.c:604:23: note: jump bypasses initialization of variable with __attribute__((cleanup))
   include/linux/uaccess.h:869:2: note: expanded from macro 'put_user_inline'
           scoped_user_write_access(_tmpdst, efault)               \
           ^
   include/linux/uaccess.h:803:2: note: expanded from macro 'scoped_user_write_access'
           scoped_user_write_access_size(udst, sizeof(*(udst)), elbl)
           ^
   include/linux/uaccess.h:791:2: note: expanded from macro 'scoped_user_write_access_size'
           __scoped_user_access(write, udst, size, elbl)
           ^
   include/linux/uaccess.h:755:36: note: expanded from macro '__scoped_user_access'
                   for (CLASS(user_##mode##_access, scope)(_tmpptr); !done; done = true)   \
                                                    ^
>> kernel/futex/core.c:604:23: error: cannot jump from this asm goto statement to one of its possible targets
                   if (node_updated && put_user_inline(node, naddr))
                                       ^
   include/linux/uaccess.h:870:3: note: expanded from macro 'put_user_inline'
                   unsafe_put_user(val, _tmpdst, efault);          \
                   ^
   include/linux/uaccess.h:616:2: note: expanded from macro 'unsafe_put_user'
           arch_unsafe_put_user(x, ptr, local_label);      \
           ^
   arch/arm64/include/asm/uaccess.h:426:2: note: expanded from macro 'arch_unsafe_put_user'
           __raw_put_mem("sttr", x, uaccess_mask_ptr(ptr), label, U)
           ^
   arch/arm64/include/asm/uaccess.h:309:3: note: expanded from macro '__raw_put_mem'
                   __put_mem_asm(str "b", "%w", __pu_val, (ptr), label, type);     \
                   ^
   arch/arm64/include/asm/uaccess.h:298:2: note: expanded from macro '__put_mem_asm'
           asm goto(                                                       \
           ^
   kernel/futex/core.c:604:23: note: possible target of asm goto statement
   include/linux/uaccess.h:870:3: note: expanded from macro 'put_user_inline'
                   unsafe_put_user(val, _tmpdst, efault);          \
                   ^
   include/linux/uaccess.h:618:2: note: expanded from macro 'unsafe_put_user'
           local_label:                                    \
           ^
   kernel/futex/core.c:604:23: note: jump exits scope of variable with __attribute__((cleanup))
   include/linux/uaccess.h:869:2: note: expanded from macro 'put_user_inline'
           scoped_user_write_access(_tmpdst, efault)               \
           ^
   include/linux/uaccess.h:803:2: note: expanded from macro 'scoped_user_write_access'
           scoped_user_write_access_size(udst, sizeof(*(udst)), elbl)
           ^
   include/linux/uaccess.h:791:2: note: expanded from macro 'scoped_user_write_access_size'
           __scoped_user_access(write, udst, size, elbl)
           ^
   include/linux/uaccess.h:755:36: note: expanded from macro '__scoped_user_access'
                   for (CLASS(user_##mode##_access, scope)(_tmpptr); !done; done = true)   \
                                                    ^
   kernel/futex/core.c:604:23: note: jump bypasses initialization of variable with __attribute__((cleanup))
   include/linux/uaccess.h:869:2: note: expanded from macro 'put_user_inline'
           scoped_user_write_access(_tmpdst, efault)               \
           ^
   include/linux/uaccess.h:803:2: note: expanded from macro 'scoped_user_write_access'
           scoped_user_write_access_size(udst, sizeof(*(udst)), elbl)
           ^
   include/linux/uaccess.h:791:2: note: expanded from macro 'scoped_user_write_access_size'
           __scoped_user_access(write, udst, size, elbl)
           ^
   include/linux/uaccess.h:755:36: note: expanded from macro '__scoped_user_access'
                   for (CLASS(user_##mode##_access, scope)(_tmpptr); !done; done = true)   \
                                                    ^
>> kernel/futex/core.c:604:23: error: cannot jump from this asm goto statement to one of its possible targets
                   if (node_updated && put_user_inline(node, naddr))
                                       ^
   include/linux/uaccess.h:870:3: note: expanded from macro 'put_user_inline'
                   unsafe_put_user(val, _tmpdst, efault);          \
                   ^
   include/linux/uaccess.h:616:2: note: expanded from macro 'unsafe_put_user'
           arch_unsafe_put_user(x, ptr, local_label);      \
           ^
   arch/arm64/include/asm/uaccess.h:426:2: note: expanded from macro 'arch_unsafe_put_user'
           __raw_put_mem("sttr", x, uaccess_mask_ptr(ptr), label, U)
           ^
   arch/arm64/include/asm/uaccess.h:309:3: note: expanded from macro '__raw_put_mem'
                   __put_mem_asm(str "b", "%w", __pu_val, (ptr), label, type);     \
                   ^
   arch/arm64/include/asm/uaccess.h:298:2: note: expanded from macro '__put_mem_asm'
           asm goto(                                                       \
           ^
   kernel/futex/core.c:604:23: note: possible target of asm goto statement
   include/linux/uaccess.h:870:3: note: expanded from macro 'put_user_inline'
                   unsafe_put_user(val, _tmpdst, efault);          \
                   ^
   include/linux/uaccess.h:618:2: note: expanded from macro 'unsafe_put_user'
           local_label:                                    \
           ^
   kernel/futex/core.c:604:23: note: jump exits scope of variable with __attribute__((cleanup))
   include/linux/uaccess.h:869:2: note: expanded from macro 'put_user_inline'
           scoped_user_write_access(_tmpdst, efault)               \
           ^
   include/linux/uaccess.h:803:2: note: expanded from macro 'scoped_user_write_access'
           scoped_user_write_access_size(udst, sizeof(*(udst)), elbl)
           ^
   include/linux/uaccess.h:791:2: note: expanded from macro 'scoped_user_write_access_size'
           __scoped_user_access(write, udst, size, elbl)
           ^
   include/linux/uaccess.h:755:36: note: expanded from macro '__scoped_user_access'
                   for (CLASS(user_##mode##_access, scope)(_tmpptr); !done; done = true)   \
                                                    ^
   kernel/futex/core.c:604:23: note: jump bypasses initialization of variable with __attribute__((cleanup))
   include/linux/uaccess.h:869:2: note: expanded from macro 'put_user_inline'
           scoped_user_write_access(_tmpdst, efault)               \
           ^
   include/linux/uaccess.h:803:2: note: expanded from macro 'scoped_user_write_access'
           scoped_user_write_access_size(udst, sizeof(*(udst)), elbl)
           ^
   include/linux/uaccess.h:791:2: note: expanded from macro 'scoped_user_write_access_size'
           __scoped_user_access(write, udst, size, elbl)
           ^
   include/linux/uaccess.h:755:36: note: expanded from macro '__scoped_user_access'
                   for (CLASS(user_##mode##_access, scope)(_tmpptr); !done; done = true)   \
                                                    ^
>> kernel/futex/core.c:604:23: error: cannot jump from this asm goto statement to one of its possible targets
                   if (node_updated && put_user_inline(node, naddr))
                                       ^
   include/linux/uaccess.h:870:3: note: expanded from macro 'put_user_inline'
                   unsafe_put_user(val, _tmpdst, efault);          \
                   ^
   include/linux/uaccess.h:616:2: note: expanded from macro 'unsafe_put_user'
           arch_unsafe_put_user(x, ptr, local_label);      \
           ^
   arch/arm64/include/asm/uaccess.h:426:2: note: expanded from macro 'arch_unsafe_put_user'
           __raw_put_mem("sttr", x, uaccess_mask_ptr(ptr), label, U)
           ^
   arch/arm64/include/asm/uaccess.h:309:3: note: expanded from macro '__raw_put_mem'
                   __put_mem_asm(str "b", "%w", __pu_val, (ptr), label, type);     \
                   ^
   arch/arm64/include/asm/uaccess.h:298:2: note: expanded from macro '__put_mem_asm'
           asm goto(                                                       \
           ^
   kernel/futex/core.c:604:23: note: possible target of asm goto statement
   include/linux/uaccess.h:870:3: note: expanded from macro 'put_user_inline'
                   unsafe_put_user(val, _tmpdst, efault);          \
                   ^
   include/linux/uaccess.h:618:2: note: expanded from macro 'unsafe_put_user'
           local_label:                                    \
           ^
   kernel/futex/core.c:604:23: note: jump exits scope of variable with __attribute__((cleanup))
   include/linux/uaccess.h:869:2: note: expanded from macro 'put_user_inline'
           scoped_user_write_access(_tmpdst, efault)               \
           ^
   include/linux/uaccess.h:803:2: note: expanded from macro 'scoped_user_write_access'
           scoped_user_write_access_size(udst, sizeof(*(udst)), elbl)
           ^
   include/linux/uaccess.h:791:2: note: expanded from macro 'scoped_user_write_access_size'
           __scoped_user_access(write, udst, size, elbl)
           ^
   include/linux/uaccess.h:755:36: note: expanded from macro '__scoped_user_access'
                   for (CLASS(user_##mode##_access, scope)(_tmpptr); !done; done = true)   \
                                                    ^
   kernel/futex/core.c:604:23: note: jump bypasses initialization of variable with __attribute__((cleanup))
   include/linux/uaccess.h:869:2: note: expanded from macro 'put_user_inline'
           scoped_user_write_access(_tmpdst, efault)               \
           ^
   include/linux/uaccess.h:803:2: note: expanded from macro 'scoped_user_write_access'
           scoped_user_write_access_size(udst, sizeof(*(udst)), elbl)
           ^
   include/linux/uaccess.h:791:2: note: expanded from macro 'scoped_user_write_access_size'
           __scoped_user_access(write, udst, size, elbl)
           ^
   include/linux/uaccess.h:755:36: note: expanded from macro '__scoped_user_access'
                   for (CLASS(user_##mode##_access, scope)(_tmpptr); !done; done = true)   \
                                                    ^
>> kernel/futex/core.c:604:23: error: cannot jump from this asm goto statement to one of its possible targets
                   if (node_updated && put_user_inline(node, naddr))
                                       ^
   include/linux/uaccess.h:870:3: note: expanded from macro 'put_user_inline'
                   unsafe_put_user(val, _tmpdst, efault);          \
                   ^
   include/linux/uaccess.h:616:2: note: expanded from macro 'unsafe_put_user'
           arch_unsafe_put_user(x, ptr, local_label);      \
           ^
   arch/arm64/include/asm/uaccess.h:426:2: note: expanded from macro 'arch_unsafe_put_user'
           __raw_put_mem("sttr", x, uaccess_mask_ptr(ptr), label, U)
           ^
   arch/arm64/include/asm/uaccess.h:309:3: note: expanded from macro '__raw_put_mem'
                   __put_mem_asm(str "b", "%w", __pu_val, (ptr), label, type);     \
                   ^
   arch/arm64/include/asm/uaccess.h:298:2: note: expanded from macro '__put_mem_asm'
           asm goto(                                                       \
           ^
   kernel/futex/core.c:604:23: note: possible target of asm goto statement
   include/linux/uaccess.h:870:3: note: expanded from macro 'put_user_inline'
                   unsafe_put_user(val, _tmpdst, efault);          \
                   ^
   include/linux/uaccess.h:618:2: note: expanded from macro 'unsafe_put_user'
           local_label:                                    \
           ^
   kernel/futex/core.c:604:23: note: jump exits scope of variable with __attribute__((cleanup))
   include/linux/uaccess.h:869:2: note: expanded from macro 'put_user_inline'
           scoped_user_write_access(_tmpdst, efault)               \
           ^
   include/linux/uaccess.h:803:2: note: expanded from macro 'scoped_user_write_access'
           scoped_user_write_access_size(udst, sizeof(*(udst)), elbl)
           ^
   include/linux/uaccess.h:791:2: note: expanded from macro 'scoped_user_write_access_size'
           __scoped_user_access(write, udst, size, elbl)
           ^
   include/linux/uaccess.h:755:36: note: expanded from macro '__scoped_user_access'
                   for (CLASS(user_##mode##_access, scope)(_tmpptr); !done; done = true)   \
                                                    ^
   kernel/futex/core.c:604:23: note: jump bypasses initialization of variable with __attribute__((cleanup))
   include/linux/uaccess.h:869:2: note: expanded from macro 'put_user_inline'
           scoped_user_write_access(_tmpdst, efault)               \
           ^
   include/linux/uaccess.h:803:2: note: expanded from macro 'scoped_user_write_access'
           scoped_user_write_access_size(udst, sizeof(*(udst)), elbl)
           ^
   include/linux/uaccess.h:791:2: note: expanded from macro 'scoped_user_write_access_size'
           __scoped_user_access(write, udst, size, elbl)
           ^
   include/linux/uaccess.h:755:36: note: expanded from macro '__scoped_user_access'
                   for (CLASS(user_##mode##_access, scope)(_tmpptr); !done; done = true)   \
                                                    ^
>> kernel/futex/core.c:604:23: error: cannot jump from this asm goto statement to one of its possible targets
                   if (node_updated && put_user_inline(node, naddr))
                                       ^
   include/linux/uaccess.h:870:3: note: expanded from macro 'put_user_inline'
                   unsafe_put_user(val, _tmpdst, efault);          \
                   ^
   include/linux/uaccess.h:616:2: note: expanded from macro 'unsafe_put_user'
           arch_unsafe_put_user(x, ptr, local_label);      \
           ^
   arch/arm64/include/asm/uaccess.h:426:2: note: expanded from macro 'arch_unsafe_put_user'
           __raw_put_mem("sttr", x, uaccess_mask_ptr(ptr), label, U)
           ^
   arch/arm64/include/asm/uaccess.h:309:3: note: expanded from macro '__raw_put_mem'
                   __put_mem_asm(str "b", "%w", __pu_val, (ptr), label, type);     \
                   ^
   arch/arm64/include/asm/uaccess.h:298:2: note: expanded from macro '__put_mem_asm'
           asm goto(                                                       \
           ^
   kernel/futex/core.c:604:23: note: possible target of asm goto statement
   include/linux/uaccess.h:870:3: note: expanded from macro 'put_user_inline'
                   unsafe_put_user(val, _tmpdst, efault);          \
                   ^
   include/linux/uaccess.h:618:2: note: expanded from macro 'unsafe_put_user'
           local_label:                                    \
           ^
   kernel/futex/core.c:604:23: note: jump exits scope of variable with __attribute__((cleanup))
   include/linux/uaccess.h:869:2: note: expanded from macro 'put_user_inline'
           scoped_user_write_access(_tmpdst, efault)               \
           ^
   include/linux/uaccess.h:803:2: note: expanded from macro 'scoped_user_write_access'
           scoped_user_write_access_size(udst, sizeof(*(udst)), elbl)
           ^
   include/linux/uaccess.h:791:2: note: expanded from macro 'scoped_user_write_access_size'
           __scoped_user_access(write, udst, size, elbl)
           ^
   include/linux/uaccess.h:755:36: note: expanded from macro '__scoped_user_access'
                   for (CLASS(user_##mode##_access, scope)(_tmpptr); !done; done = true)   \
                                                    ^
   kernel/futex/core.c:604:23: note: jump bypasses initialization of variable with __attribute__((cleanup))
   include/linux/uaccess.h:869:2: note: expanded from macro 'put_user_inline'
           scoped_user_write_access(_tmpdst, efault)               \
           ^
   include/linux/uaccess.h:803:2: note: expanded from macro 'scoped_user_write_access'
           scoped_user_write_access_size(udst, sizeof(*(udst)), elbl)
           ^
   include/linux/uaccess.h:791:2: note: expanded from macro 'scoped_user_write_access_size'
           __scoped_user_access(write, udst, size, elbl)
           ^
   include/linux/uaccess.h:755:36: note: expanded from macro '__scoped_user_access'
                   for (CLASS(user_##mode##_access, scope)(_tmpptr); !done; done = true)   \
                                                    ^
   6 errors generated.


vim +604 kernel/futex/core.c

   520	
   521	/**
   522	 * get_futex_key() - Get parameters which are the keys for a futex
   523	 * @uaddr:	virtual address of the futex
   524	 * @flags:	FLAGS_*
   525	 * @key:	address where result is stored.
   526	 * @rw:		mapping needs to be read/write (values: FUTEX_READ,
   527	 *              FUTEX_WRITE)
   528	 *
   529	 * Return: a negative error code or 0
   530	 *
   531	 * The key words are stored in @key on success.
   532	 *
   533	 * For shared mappings (when @fshared), the key is:
   534	 *
   535	 *   ( inode->i_sequence, page offset within mapping, offset_within_page )
   536	 *
   537	 * [ also see get_inode_sequence_number() ]
   538	 *
   539	 * For private mappings (or when !@...ared), the key is:
   540	 *
   541	 *   ( current->mm, address, 0 )
   542	 *
   543	 * This allows (cross process, where applicable) identification of the futex
   544	 * without keeping the page pinned for the duration of the FUTEX_WAIT.
   545	 *
   546	 * lock_page() might sleep, the caller should not hold a spinlock.
   547	 */
   548	int get_futex_key(u32 __user *uaddr, unsigned int flags, union futex_key *key,
   549			  enum futex_access rw)
   550	{
   551		unsigned long address = (unsigned long)uaddr;
   552		struct mm_struct *mm = current->mm;
   553		struct page *page;
   554		struct folio *folio;
   555		struct address_space *mapping;
   556		int node, err, size, ro = 0;
   557		bool node_updated = false;
   558		bool fshared;
   559	
   560		fshared = flags & FLAGS_SHARED;
   561		size = futex_size(flags);
   562		if (flags & FLAGS_NUMA)
   563			size *= 2;
   564	
   565		/*
   566		 * The futex address must be "naturally" aligned.
   567		 */
   568		key->both.offset = address % PAGE_SIZE;
   569		if (unlikely((address % size) != 0))
   570			return -EINVAL;
   571		address -= key->both.offset;
   572	
   573		if (unlikely(!access_ok(uaddr, size)))
   574			return -EFAULT;
   575	
   576		if (unlikely(should_fail_futex(fshared)))
   577			return -EFAULT;
   578	
   579		node = FUTEX_NO_NODE;
   580	
   581		if (flags & FLAGS_NUMA) {
   582			u32 __user *naddr = (void *)uaddr + size / 2;
   583	
   584			if (get_user_inline(node, naddr))
   585				return -EFAULT;
   586	
   587			if ((node != FUTEX_NO_NODE) &&
   588			    ((unsigned int)node >= MAX_NUMNODES || !node_possible(node)))
   589				return -EINVAL;
   590		}
   591	
   592		if (node == FUTEX_NO_NODE && (flags & FLAGS_MPOL)) {
   593			node = futex_mpol(mm, address);
   594			node_updated = true;
   595		}
   596	
   597		if (flags & FLAGS_NUMA) {
   598			u32 __user *naddr = (void *)uaddr + size / 2;
   599	
   600			if (node == FUTEX_NO_NODE) {
   601				node = numa_node_id();
   602				node_updated = true;
   603			}
 > 604			if (node_updated && put_user_inline(node, naddr))
   605				return -EFAULT;
   606		}
   607	
   608		key->both.node = node;
   609	
   610		/*
   611		 * PROCESS_PRIVATE futexes are fast.
   612		 * As the mm cannot disappear under us and the 'key' only needs
   613		 * virtual address, we dont even have to find the underlying vma.
   614		 * Note : We do have to check 'uaddr' is a valid user address,
   615		 *        but access_ok() should be faster than find_vma()
   616		 */
   617		if (!fshared) {
   618			/*
   619			 * On no-MMU, shared futexes are treated as private, therefore
   620			 * we must not include the current process in the key. Since
   621			 * there is only one address space, the address is a unique key
   622			 * on its own.
   623			 */
   624			if (IS_ENABLED(CONFIG_MMU))
   625				key->private.mm = mm;
   626			else
   627				key->private.mm = NULL;
   628	
   629			key->private.address = address;
   630			return 0;
   631		}
   632	
   633	again:
   634		/* Ignore any VERIFY_READ mapping (futex common case) */
   635		if (unlikely(should_fail_futex(true)))
   636			return -EFAULT;
   637	
   638		err = get_user_pages_fast(address, 1, FOLL_WRITE, &page);
   639		/*
   640		 * If write access is not required (eg. FUTEX_WAIT), try
   641		 * and get read-only access.
   642		 */
   643		if (err == -EFAULT && rw == FUTEX_READ) {
   644			err = get_user_pages_fast(address, 1, 0, &page);
   645			ro = 1;
   646		}
   647		if (err < 0)
   648			return err;
   649		else
   650			err = 0;
   651	
   652		/*
   653		 * The treatment of mapping from this point on is critical. The folio
   654		 * lock protects many things but in this context the folio lock
   655		 * stabilizes mapping, prevents inode freeing in the shared
   656		 * file-backed region case and guards against movement to swap cache.
   657		 *
   658		 * Strictly speaking the folio lock is not needed in all cases being
   659		 * considered here and folio lock forces unnecessarily serialization.
   660		 * From this point on, mapping will be re-verified if necessary and
   661		 * folio lock will be acquired only if it is unavoidable
   662		 *
   663		 * Mapping checks require the folio so it is looked up now. For
   664		 * anonymous pages, it does not matter if the folio is split
   665		 * in the future as the key is based on the address. For
   666		 * filesystem-backed pages, the precise page is required as the
   667		 * index of the page determines the key.
   668		 */
   669		folio = page_folio(page);
   670		mapping = READ_ONCE(folio->mapping);
   671	
   672		/*
   673		 * If folio->mapping is NULL, then it cannot be an anonymous
   674		 * page; but it might be the ZERO_PAGE or in the gate area or
   675		 * in a special mapping (all cases which we are happy to fail);
   676		 * or it may have been a good file page when get_user_pages_fast
   677		 * found it, but truncated or holepunched or subjected to
   678		 * invalidate_complete_page2 before we got the folio lock (also
   679		 * cases which we are happy to fail).  And we hold a reference,
   680		 * so refcount care in invalidate_inode_page's remove_mapping
   681		 * prevents drop_caches from setting mapping to NULL beneath us.
   682		 *
   683		 * The case we do have to guard against is when memory pressure made
   684		 * shmem_writepage move it from filecache to swapcache beneath us:
   685		 * an unlikely race, but we do need to retry for folio->mapping.
   686		 */
   687		if (unlikely(!mapping)) {
   688			int shmem_swizzled;
   689	
   690			/*
   691			 * Folio lock is required to identify which special case above
   692			 * applies. If this is really a shmem page then the folio lock
   693			 * will prevent unexpected transitions.
   694			 */
   695			folio_lock(folio);
   696			shmem_swizzled = folio_test_swapcache(folio) || folio->mapping;
   697			folio_unlock(folio);
   698			folio_put(folio);
   699	
   700			if (shmem_swizzled)
   701				goto again;
   702	
   703			return -EFAULT;
   704		}
   705	
   706		/*
   707		 * Private mappings are handled in a simple way.
   708		 *
   709		 * If the futex key is stored in anonymous memory, then the associated
   710		 * object is the mm which is implicitly pinned by the calling process.
   711		 *
   712		 * NOTE: When userspace waits on a MAP_SHARED mapping, even if
   713		 * it's a read-only handle, it's expected that futexes attach to
   714		 * the object not the particular process.
   715		 */
   716		if (folio_test_anon(folio)) {
   717			/*
   718			 * A RO anonymous page will never change and thus doesn't make
   719			 * sense for futex operations.
   720			 */
   721			if (unlikely(should_fail_futex(true)) || ro) {
   722				err = -EFAULT;
   723				goto out;
   724			}
   725	
   726			key->both.offset |= FUT_OFF_MMSHARED; /* ref taken on mm */
   727			key->private.mm = mm;
   728			key->private.address = address;
   729	
   730		} else {
   731			struct inode *inode;
   732	
   733			/*
   734			 * The associated futex object in this case is the inode and
   735			 * the folio->mapping must be traversed. Ordinarily this should
   736			 * be stabilised under folio lock but it's not strictly
   737			 * necessary in this case as we just want to pin the inode, not
   738			 * update i_pages or anything like that.
   739			 *
   740			 * The RCU read lock is taken as the inode is finally freed
   741			 * under RCU. If the mapping still matches expectations then the
   742			 * mapping->host can be safely accessed as being a valid inode.
   743			 */
   744			rcu_read_lock();
   745	
   746			if (READ_ONCE(folio->mapping) != mapping) {
   747				rcu_read_unlock();
   748				folio_put(folio);
   749	
   750				goto again;
   751			}
   752	
   753			inode = READ_ONCE(mapping->host);
   754			if (!inode) {
   755				rcu_read_unlock();
   756				folio_put(folio);
   757	
   758				goto again;
   759			}
   760	
   761			key->both.offset |= FUT_OFF_INODE; /* inode-based key */
   762			key->shared.i_seq = get_inode_sequence_number(inode);
   763			key->shared.pgoff = page_pgoff(folio, page);
   764			rcu_read_unlock();
   765		}
   766	
   767	out:
   768		folio_put(folio);
   769		return err;
   770	}
   771	

-- 
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ