Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp633316ybl; Fri, 10 Jan 2020 04:19:56 -0800 (PST) X-Google-Smtp-Source: APXvYqy1eTTZeRKAYmV2Zx3aIWXV9ed6NdN569DxhFWpnE6wLdzuhOpqPg0tUM+roNay4PIw8BUz X-Received: by 2002:aca:ed81:: with SMTP id l123mr2026070oih.129.1578658796101; Fri, 10 Jan 2020 04:19:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578658796; cv=none; d=google.com; s=arc-20160816; b=mzbmigj/pIUC0riaf8UV+xZcnb6mQyRuYfq0TcXyi+hbUAU83MeSvcYtELHtvILub7 qhJwDN+q4Z7LcgQkNYGW9yMyNLFkxWH0cLZu9YR56NZVbztTTAPb6krNY9D2FnKqDg3x RD+TPwCndNC1nqSdHmZ4Nf17icIqyvhW1Pcfnf/o3afKaKHHqWKcoXp7ULVSKCFQChAc caj/jB0ODO6uicc8zk0QK3QD42xKCdLhdqXT5nGMQLJP8VZYCZNWiV8szCZ4L3GPgyuF 06fLvSMc1keWAZ9lQKGekB2IHgYN+f6eVgwcgh0v4GQQ+oUpv8MW/TIOHCXT/Lmj0iwr hpqg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=34rCBCNBrLFlE6OZuubd6Z6OlOWhV0HGucVsYoePbqA=; b=dMN120X4zZfXPCRSF06pO3kQf4QGSlyhHgrzKLEKv6NBsWR2RQnt+jxVfKzWlzmbX8 7aSN3qMh+9KqTAJLjr8ZUjsJMUp7TBv9dulz8RohBYpD6OFck7ioxFRVngWHkvmf01n7 9FlACYbTe9u+AFOb386jQuPRj9idD9UTQ4mb4vDmzwgth7Z6MQ0GH6MeFgnuvtAkLJWx CHD+qe+7FudIHzz5GIPDvSkehSieDdHQEuPI+TLDqrCxV5z68Ve81iiKK+Glvvi+nXc3 dyNvY04GMh8pjLzZg7jVY4eqmcHlnw7ip6WtNzMiAGAGUduuHpXTuEuLqXcz9P+mB5xO k2zw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=AyJDmw1n; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z4si1261190oti.93.2020.01.10.04.19.43; Fri, 10 Jan 2020 04:19:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=AyJDmw1n; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728039AbgAJMSo (ORCPT + 99 others); Fri, 10 Jan 2020 07:18:44 -0500 Received: from mail-pl1-f194.google.com ([209.85.214.194]:35156 "EHLO mail-pl1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727720AbgAJMSn (ORCPT ); Fri, 10 Jan 2020 07:18:43 -0500 Received: by mail-pl1-f194.google.com with SMTP id g6so809792plt.2 for ; Fri, 10 Jan 2020 04:18:43 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=34rCBCNBrLFlE6OZuubd6Z6OlOWhV0HGucVsYoePbqA=; b=AyJDmw1nfTmU38bLxh+Zgeu6ZVenlE9iZh5wgKN+xTCCcVbRXd9o/heLIU/pN6gucy +x5Tsci0dO8ZhS0dQsBFg5t6DZIgfpU5hJ3dQgkh4Hr0FvQ3c1MCVSdIux67XzFt1JAN swqPk6+jTakkB2XfeIbBenGxQxjLc+3Vu0tDUnHnT0MFTrjWU9bMvxEumVbT2V0IH2k3 NKMn8E3yiX+w12LiWcL2SWzxnYU4T0LCidiwLYIKi9lxQzBvfqDxICtapnipP+9jxEuS TohB1N+FcisEX8rLBfH9FIqKIemfV8QvJoxW17SQIC8NKLfxpFYpoySyD9/uqs5nLHRv HPEQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=34rCBCNBrLFlE6OZuubd6Z6OlOWhV0HGucVsYoePbqA=; b=BKxksYhafmuwAt+6GT/rmpEJx04lLTeC5faIBmblfZMX4RDbQwLJcs+4EtgnElSJ3Y 4aX3y2nkj6rtkqaeVLHOnKn2Ouhq1/xLAqH2twIFfjBr48ZI6Wl30vNSTDdNshUVr2PY idFO6deBjUQNDJvEoIywwTAVOldtNykdBQl7raR28M9SNgAkUJZWThPcROJIzhp8fDnk lMsV8xttLTHCzZUpNo7U7GkHmt/4FyYgc6ZYB+aabm0L6uxSEZWjUqHKTtKwoMYwV73H 2mkD2K8Mqw72fCt4fmaGsKl3jTLaithVN45esKjct3xLxYbRzurNXa1ri6amM12bJoC9 VbDQ== X-Gm-Message-State: APjAAAXKuXjE0t++QjOjjwIotzjK89t/mTqAcORRAI/FXEtt0LhH2+UH QFxRSulqsTPpg7QN7vQXGuc= X-Received: by 2002:a17:90a:10c8:: with SMTP id b8mr4336581pje.92.1578658722987; Fri, 10 Jan 2020 04:18:42 -0800 (PST) Received: from localhost.localdomain ([103.211.17.220]) by smtp.googlemail.com with ESMTPSA id m128sm2774523pfm.183.2020.01.10.04.18.39 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 10 Jan 2020 04:18:42 -0800 (PST) From: Amol Grover To: Corey Minyard , Arnd Bergmann , Greg Kroah-Hartman Cc: openipmi-developer@lists.sourceforge.net, linux-kernel@vger.kernel.org, linux-kernel-mentees@lists.linuxfoundation.org, Joel Fernandes , Madhuparna Bhowmik , "Paul E . McKenney" , Amol Grover Subject: [PATCH] drivers: char: ipmi: ipmi_msghandler: Pass lockdep expression to RCU lists Date: Fri, 10 Jan 2020 17:43:42 +0530 Message-Id: <20200110121341.31522-1-frextrite@gmail.com> X-Mailer: git-send-email 2.24.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org intf->cmd_rcvrs is traversed with list_for_each_entry_rcu outside an RCU read-side critical section but under the protection of intf->cmd_rcvrs_mutex. ipmi_interfaces is traversed using list_for_each_entry_rcu outside an RCU read-side critical section but under the protection of ipmi_interfaces_mutex. Hence, add the corresponding lockdep expression to the list traversal primitive to silence false-positive lockdep warnings, and harden RCU lists. Add macro for the corresponding lockdep expression to make the code clean and concise. Signed-off-by: Amol Grover --- drivers/char/ipmi/ipmi_msghandler.c | 16 ++++++++++++---- 1 file changed, 12 insertions(+), 4 deletions(-) diff --git a/drivers/char/ipmi/ipmi_msghandler.c b/drivers/char/ipmi/ipmi_msghandler.c index cad9563f8f48..7eff0335bc82 100644 --- a/drivers/char/ipmi/ipmi_msghandler.c +++ b/drivers/char/ipmi/ipmi_msghandler.c @@ -35,6 +35,8 @@ #include #define IPMI_DRIVER_VERSION "39.2" +#define cmd_rcvrs_mutex_held() \ + lockdep_is_held(&intf->cmd_rcvrs_mutex) static struct ipmi_recv_msg *ipmi_alloc_recv_msg(void); static int ipmi_init_msghandler(void); @@ -618,6 +620,8 @@ static DEFINE_MUTEX(ipmidriver_mutex); static LIST_HEAD(ipmi_interfaces); static DEFINE_MUTEX(ipmi_interfaces_mutex); +#define ipmi_interfaces_mutex_held() \ + lockdep_is_held(&ipmi_interfaces_mutex) static struct srcu_struct ipmi_interfaces_srcu; /* @@ -1321,7 +1325,8 @@ static void _ipmi_destroy_user(struct ipmi_user *user) * synchronize_srcu()) then free everything in that list. */ mutex_lock(&intf->cmd_rcvrs_mutex); - list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link) { + list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link, + cmd_rcvrs_mutex_held()) { if (rcvr->user == user) { list_del_rcu(&rcvr->link); rcvr->next = rcvrs; @@ -1599,7 +1604,8 @@ static struct cmd_rcvr *find_cmd_rcvr(struct ipmi_smi *intf, { struct cmd_rcvr *rcvr; - list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link) { + list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link, + rcu_read_lock_held() || cmd_rcvrs_mutex_held()) { if ((rcvr->netfn == netfn) && (rcvr->cmd == cmd) && (rcvr->chans & (1 << chan))) return rcvr; @@ -1614,7 +1620,8 @@ static int is_cmd_rcvr_exclusive(struct ipmi_smi *intf, { struct cmd_rcvr *rcvr; - list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link) { + list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link, + cmd_rcvrs_mutex_held()) { if ((rcvr->netfn == netfn) && (rcvr->cmd == cmd) && (rcvr->chans & chans)) return 0; @@ -3450,7 +3457,8 @@ int ipmi_add_smi(struct module *owner, /* Look for a hole in the numbers. */ i = 0; link = &ipmi_interfaces; - list_for_each_entry_rcu(tintf, &ipmi_interfaces, link) { + list_for_each_entry_rcu(tintf, &ipmi_interfaces, link, + ipmi_interfaces_mutex_held()) { if (tintf->intf_num != i) { link = &tintf->link; break; -- 2.24.1