Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp9043010ybl; Fri, 17 Jan 2020 05:29:29 -0800 (PST) X-Google-Smtp-Source: APXvYqzLcn+VWsD7x6G+ugL8qQOKw2aLsZiPvQino5gEL8T5MH+iaMkAMfB/hKTcYUyzVZg1M4Ha X-Received: by 2002:a9d:7e8a:: with SMTP id m10mr5715106otp.27.1579267769768; Fri, 17 Jan 2020 05:29:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579267769; cv=none; d=google.com; s=arc-20160816; b=ZZBiVqS749j8OcMv9CkwbNTqJTNRe7/8Eng5ha4tZVJnIJavMAgAZ3KCsf18kFeakI rDmmUSaEXytDlPCk/gjt9Napod/E+3kP8pxK6WY3teahf5aLdaOIWTvuxLz6LmVhpTVQ rNhojHLu+jPhkmelrEOF7sYIU7nw3rpOxHY/j8XfTInHoJtc9iy76093lxuTqIZHsjZF p+5I1ngJJaQwnABQbCEBFSooutONEobeayXWbqF5KqAt6BsPsk+R9NlqxuFMwyIrs0WD sOwLnYcDlckZyHQHpY6FhbRqM/Iz7pOY4/1pSFDRPCiVruG+eaiBtKIMIDXrJNoA39I+ vJEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=0Uq9w8KRDPv2naiVGbzo1YruGuVK6eQQzWbOQYDeecw=; b=LIsQZjUGsH24EK2OWXhE6bAMzHf6by9Eqfe1EuLu+BjY5+/hLfP1hd9yywlL0si5DO 2/H+GeflOYXAFx3ukbJiJ8Ltyzp/slaTi7b+OkOOdZ7fIypt+fhsI70h5V/HvxRM3u7+ KrQbN341fiz+21Uj4CeBSeS9Y4sLPyHlItv7XQdRQOi6883DNh3V25/VDQxA0OQf1cj3 1yeKBGBlodLd0nxntcqT9ddLOK3iJF3KXa3uk+W27O5RD7Xj2WkoMr0HcLdw67vp4muf qjGeSHB6JbCtFDPG++T1q8ef0rqeyYf2+7SznuQB2SLxa5v9/rZzAPrJK2P7gA+wpxIC iYjA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=KGwKWFKU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u18si16735708otg.201.2020.01.17.05.29.17; Fri, 17 Jan 2020 05:29:29 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=KGwKWFKU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726982AbgAQN2U (ORCPT + 99 others); Fri, 17 Jan 2020 08:28:20 -0500 Received: from mail-pf1-f193.google.com ([209.85.210.193]:42967 "EHLO mail-pf1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726329AbgAQN2U (ORCPT ); Fri, 17 Jan 2020 08:28:20 -0500 Received: by mail-pf1-f193.google.com with SMTP id 4so11969385pfz.9 for ; Fri, 17 Jan 2020 05:28:20 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=0Uq9w8KRDPv2naiVGbzo1YruGuVK6eQQzWbOQYDeecw=; b=KGwKWFKU8LpyyRPZZIjn241CT5YAMcsFkRMS+vcUU6Je9CLIHqi9KEsRG4O9zYbk/K CTzDWNvPcyEppR+1PrMUEclVDew8SRrSgPmu2kKu8VJRoZ9zPOWucfSNBDxyEL3QvIAn nOkR5Hwn6wa/UYgS+dyHidzR8Y5c9EQf7wORozmG5TEGsoSZCWZWX37qeWxU0tCx+OnT nv0wcfy3+xUicbIu1uTVyRU/jyZ2sIGQTZxnZhJMjwmUXAj+s3dR3lgUkcdNnRCPxLYL bLjfBjTD9xJl45zF+TnjXx/v73Vnh/tgZbjdVJD8JBisXrb2v/P2AsVANsj6YkWyrvJN YhPw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=0Uq9w8KRDPv2naiVGbzo1YruGuVK6eQQzWbOQYDeecw=; b=A3uWlbN/XNkvb3xKdBRS1S0EdPeEZrCGAsUW0LItjOERsrJ0okMxw2i8NqvDxf4MWB qxCqFq6BV5MIJHFOSmMrduJebed0YzblPGjHFe2/1l6dkcmcGdRvDcC20vflWVGNDFeS QQT2in5UhCz3wB4781szCsSZHfbbD/7uUDFBanenBl5CsRSlaS5p1IO4PRX+9f51sPtr ukuz2+R/Sm6SwLhEjzM23xH4XVheuLwJ7KOndID0F1AaQeyRv5O94PI6Ob7u3/t3mQkf Fp/lxvy1t32BljgieGjMXLbrFzByBZ/k39JvgjuYKGYkKLt1iV35WK/cRUWmtklMplAI BRVA== X-Gm-Message-State: APjAAAWQ4xjJNhlr56d9HUPOR8X0NBSsRAJcgq9EI+mKwI8GlphV7ipS i21L+g2PAIEKMnD9Uk/iouM= X-Received: by 2002:a63:28c7:: with SMTP id o190mr44013043pgo.394.1579267699670; Fri, 17 Jan 2020 05:28:19 -0800 (PST) Received: from localhost.localdomain ([103.211.17.168]) by smtp.googlemail.com with ESMTPSA id i3sm30798353pfo.72.2020.01.17.05.28.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 17 Jan 2020 05:28:18 -0800 (PST) From: Amol Grover To: Corey Minyard , Arnd Bergmann , Greg Kroah-Hartman Cc: openipmi-developer@lists.sourceforge.net, linux-kernel@vger.kernel.org, linux-kernel-mentees@lists.linuxfoundation.org, Joel Fernandes , Madhuparna Bhowmik , "Paul E . McKenney" , Amol Grover Subject: [PATCH v3] drivers: char: ipmi: ipmi_msghandler: Pass lockdep expression to RCU lists Date: Fri, 17 Jan 2020 18:55:22 +0530 Message-Id: <20200117132521.31020-1-frextrite@gmail.com> X-Mailer: git-send-email 2.24.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org intf->cmd_rcvrs is traversed with list_for_each_entry_rcu outside an RCU read-side critical section but under the protection of intf->cmd_rcvrs_mutex. ipmi_interfaces is traversed using list_for_each_entry_rcu outside an RCU read-side critical section but under the protection of ipmi_interfaces_mutex. Hence, add the corresponding lockdep expression to the list traversal primitive to silence false-positive lockdep warnings, and harden RCU lists. Add macro for the corresponding lockdep expression to make the code clean and concise. Signed-off-by: Amol Grover --- v3: - Remove rcu_read_lock_held() from lockdep expression since it is implicitly checked. - Remove unintended macro usage. v2: - Fix sparse error CHECK: Alignment should match open parenthesis drivers/char/ipmi/ipmi_msghandler.c | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) diff --git a/drivers/char/ipmi/ipmi_msghandler.c b/drivers/char/ipmi/ipmi_msghandler.c index cad9563f8f48..64ba16dcb681 100644 --- a/drivers/char/ipmi/ipmi_msghandler.c +++ b/drivers/char/ipmi/ipmi_msghandler.c @@ -618,6 +618,8 @@ static DEFINE_MUTEX(ipmidriver_mutex); static LIST_HEAD(ipmi_interfaces); static DEFINE_MUTEX(ipmi_interfaces_mutex); +#define ipmi_interfaces_mutex_held() \ + lockdep_is_held(&ipmi_interfaces_mutex) static struct srcu_struct ipmi_interfaces_srcu; /* @@ -1321,7 +1323,8 @@ static void _ipmi_destroy_user(struct ipmi_user *user) * synchronize_srcu()) then free everything in that list. */ mutex_lock(&intf->cmd_rcvrs_mutex); - list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link) { + list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link, + lockdep_is_held(&intf->cmd_rcvrs_mutex)) { if (rcvr->user == user) { list_del_rcu(&rcvr->link); rcvr->next = rcvrs; @@ -1599,7 +1602,8 @@ static struct cmd_rcvr *find_cmd_rcvr(struct ipmi_smi *intf, { struct cmd_rcvr *rcvr; - list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link) { + list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link, + lockdep_is_held(&intf->cmd_rcvrs_mutex)) { if ((rcvr->netfn == netfn) && (rcvr->cmd == cmd) && (rcvr->chans & (1 << chan))) return rcvr; @@ -1614,7 +1618,8 @@ static int is_cmd_rcvr_exclusive(struct ipmi_smi *intf, { struct cmd_rcvr *rcvr; - list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link) { + list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link, + lockdep_is_held(&intf->cmd_rcvrs_mutex)) { if ((rcvr->netfn == netfn) && (rcvr->cmd == cmd) && (rcvr->chans & chans)) return 0; @@ -3450,7 +3455,8 @@ int ipmi_add_smi(struct module *owner, /* Look for a hole in the numbers. */ i = 0; link = &ipmi_interfaces; - list_for_each_entry_rcu(tintf, &ipmi_interfaces, link) { + list_for_each_entry_rcu(tintf, &ipmi_interfaces, link, + ipmi_interfaces_mutex_held()) { if (tintf->intf_num != i) { link = &tintf->link; break; -- 2.24.1