Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp6512228ybv; Wed, 12 Feb 2020 13:50:24 -0800 (PST) X-Google-Smtp-Source: APXvYqwWUpr+PreRLvTgfKQJ297/DTslZ9+IW/a1s8z+G0lMd9eTn1kXF4yyDH78dA/VRbTOo1rv X-Received: by 2002:aca:100e:: with SMTP id 14mr867177oiq.88.1581544223920; Wed, 12 Feb 2020 13:50:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581544223; cv=none; d=google.com; s=arc-20160816; b=rhqx5JEd07aBIi4ykuJo54q4uKgz8jOwrXkHQ4kicoj60IPLsCMFXNpz9YN4S3TV5O u0sXEmHrpTk+o+6uFuHNCVyuB3TO8N/qIlfilC3bFECxI89nAZJ/U0Q0AL08F6eNokqu J5xUg55kOpNVIu68kGbVPcs7/nvRFLOWGbewY78XSbQWUSKh2KBi25Eiw9u8btL9QENg x3dDl0KO6Yf3nJPj8kwqv+DNagUhhv4Z7Wd50KAn9n+/23k0lHldrJ8VI89Jepb0rkbD CL8RNSu4Ss7A8ifDxhfkpBowQ5iXFhVLaVRamO0+3Rkes8BRZ+TacXoDf5lfEY8tWR5x /lcw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=kTLdbYP0TnLL4cdY9FOU7cqal5cApCUlelRFKjS30zM=; b=YQaIOYL3xc3xvxVtqY8bpOfU7jEAqkEWun9MP3GMYiEJdmxn7xuAKh06Ul0iNv4Ovh LGqlrQgg3zUUL01jSjCOdur7D/92iLaUocnKpTPolD8Vq0t8l4PN97fd4Ltuab2ilwdc zpnlZu9BEAB5BlMtWNxADCDFqOvgocgeECDzNtb3a54qImg/VuwDAbmA6VCsOKuUGcmu f68852xDMykjxpIFSaKdvUBfngqZ8YaaBzHtYbXhniPAHDxN9Z0HC4RVnkljcKVkyLJj NXuU+ExAXZi/pESbt1eYNeZOglCoLXu6fWf0agcsFguBT6EWc+JOSUnDL/BoIsYHJrij JGdw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uyAwzvx2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v24si45958otn.125.2020.02.12.13.50.10; Wed, 12 Feb 2020 13:50:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uyAwzvx2; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729132AbgBLVt7 (ORCPT + 99 others); Wed, 12 Feb 2020 16:49:59 -0500 Received: from mail.kernel.org ([198.145.29.99]:40028 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728185AbgBLVt7 (ORCPT ); Wed, 12 Feb 2020 16:49:59 -0500 Received: from paulmck-ThinkPad-P72.home (unknown [62.84.152.189]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A5674206DB; Wed, 12 Feb 2020 21:49:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1581544197; bh=LPjM60eQv8EtzXOT2YUg9BXx/0uoNBO7Jj/3xF05eBY=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=uyAwzvx2h/Y/aOHrzUq8wWwPpCGBrY5p9R+FhoOHMh5ehPS7KmcFRMSZUVcMLDn2/ hvJAgnD0kgDkrQfRDr5vOU3rT+S6P2Wx9mOXWbrwnxn89u1MOnW5qiIZZsoG0StAzq 68kBjb3p/DRi9z9fD9kPTFyWY2/NA0hKr8wvGSnA= Received: by paulmck-ThinkPad-P72.home (Postfix, from userid 1000) id 2E2EF3522725; Wed, 12 Feb 2020 13:49:56 -0800 (PST) Date: Wed, 12 Feb 2020 13:49:56 -0800 From: "Paul E. McKenney" To: Corey Minyard Cc: Amol Grover , Arnd Bergmann , Greg Kroah-Hartman , openipmi-developer@lists.sourceforge.net, linux-kernel@vger.kernel.org, linux-kernel-mentees@lists.linuxfoundation.org, Joel Fernandes , Madhuparna Bhowmik Subject: Re: [PATCH v3] drivers: char: ipmi: ipmi_msghandler: Pass lockdep expression to RCU lists Message-ID: <20200212214956.GT2935@paulmck-ThinkPad-P72> Reply-To: paulmck@kernel.org References: <20200117132521.31020-1-frextrite@gmail.com> <20200212134552.GN7842@minyard.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200212134552.GN7842@minyard.net> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Feb 12, 2020 at 07:45:52AM -0600, Corey Minyard wrote: > On Fri, Jan 17, 2020 at 06:55:22PM +0530, Amol Grover wrote: > > intf->cmd_rcvrs is traversed with list_for_each_entry_rcu > > outside an RCU read-side critical section but under the > > protection of intf->cmd_rcvrs_mutex. > > > > ipmi_interfaces is traversed using list_for_each_entry_rcu > > outside an RCU read-side critical section but under the protection > > of ipmi_interfaces_mutex. > > > > Hence, add the corresponding lockdep expression to the list traversal > > primitive to silence false-positive lockdep warnings, and > > harden RCU lists. > > > > Add macro for the corresponding lockdep expression to make the code > > clean and concise. > > > > Signed-off-by: Amol Grover > > After reading everything, I think this is correct, but I would like > Paul's stamp of approval on this. Acked-by: Paul E. McKenney But note that I did not trace the locking in the case of ipmi_add_smi(). I did the others, so lockdep can do the last one. ;-) Thanx, Paul > Thanks, > > -corey > > > --- > > v3: > > - Remove rcu_read_lock_held() from lockdep expression since it is > > implicitly checked. > > - Remove unintended macro usage. > > > > v2: > > - Fix sparse error > > CHECK: Alignment should match open parenthesis > > > > drivers/char/ipmi/ipmi_msghandler.c | 14 ++++++++++---- > > 1 file changed, 10 insertions(+), 4 deletions(-) > > > > diff --git a/drivers/char/ipmi/ipmi_msghandler.c b/drivers/char/ipmi/ipmi_msghandler.c > > index cad9563f8f48..64ba16dcb681 100644 > > --- a/drivers/char/ipmi/ipmi_msghandler.c > > +++ b/drivers/char/ipmi/ipmi_msghandler.c > > @@ -618,6 +618,8 @@ static DEFINE_MUTEX(ipmidriver_mutex); > > > > static LIST_HEAD(ipmi_interfaces); > > static DEFINE_MUTEX(ipmi_interfaces_mutex); > > +#define ipmi_interfaces_mutex_held() \ > > + lockdep_is_held(&ipmi_interfaces_mutex) > > static struct srcu_struct ipmi_interfaces_srcu; > > > > /* > > @@ -1321,7 +1323,8 @@ static void _ipmi_destroy_user(struct ipmi_user *user) > > * synchronize_srcu()) then free everything in that list. > > */ > > mutex_lock(&intf->cmd_rcvrs_mutex); > > - list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link) { > > + list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link, > > + lockdep_is_held(&intf->cmd_rcvrs_mutex)) { > > if (rcvr->user == user) { > > list_del_rcu(&rcvr->link); > > rcvr->next = rcvrs; > > @@ -1599,7 +1602,8 @@ static struct cmd_rcvr *find_cmd_rcvr(struct ipmi_smi *intf, > > { > > struct cmd_rcvr *rcvr; > > > > - list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link) { > > + list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link, > > + lockdep_is_held(&intf->cmd_rcvrs_mutex)) { > > if ((rcvr->netfn == netfn) && (rcvr->cmd == cmd) > > && (rcvr->chans & (1 << chan))) > > return rcvr; > > @@ -1614,7 +1618,8 @@ static int is_cmd_rcvr_exclusive(struct ipmi_smi *intf, > > { > > struct cmd_rcvr *rcvr; > > > > - list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link) { > > + list_for_each_entry_rcu(rcvr, &intf->cmd_rcvrs, link, > > + lockdep_is_held(&intf->cmd_rcvrs_mutex)) { > > if ((rcvr->netfn == netfn) && (rcvr->cmd == cmd) > > && (rcvr->chans & chans)) > > return 0; > > @@ -3450,7 +3455,8 @@ int ipmi_add_smi(struct module *owner, > > /* Look for a hole in the numbers. */ > > i = 0; > > link = &ipmi_interfaces; > > - list_for_each_entry_rcu(tintf, &ipmi_interfaces, link) { > > + list_for_each_entry_rcu(tintf, &ipmi_interfaces, link, > > + ipmi_interfaces_mutex_held()) { > > if (tintf->intf_num != i) { > > link = &tintf->link; > > break; > > -- > > 2.24.1 > >