Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp4975285ybb; Tue, 24 Mar 2020 08:40:21 -0700 (PDT) X-Google-Smtp-Source: ADFU+vs5ScRD+Fm6Smm6ZCqP9Sb59pOlMtldaSkDhDJWT8bX3FB4lKEzH8qOCQS6FfujbuEFkmAe X-Received: by 2002:aca:b1d4:: with SMTP id a203mr3919184oif.91.1585064421819; Tue, 24 Mar 2020 08:40:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585064421; cv=none; d=google.com; s=arc-20160816; b=wEOSW2jpEyMXL50lQnkMyiA8Byv6TXjXYYaPT4/6lqG4zut71z5qLxHe2xCvYuiRMF bgyeOx0nQp7LJY3Dz8s5snGXYUqmg5v3l7jwaYtJHph7cQj6RoUMH1gWvEjb3vCSl8R+ XGvxCcXv1y03hIJf+GhOmlLOQIQgjPcIJjQ/dXX4VrFNXGnslkvYu8vAd8GyE0sBpggp D7NV8/F0pkZyohb1iFeHKgiERrmm7cf+MrH3osBCizriEDpbRX6vm9yhtgT3kWLR0Zww LLRThm1RYY3AfrbCj4GR4C1y0lacI4qgo7IAlb+3DSCKvM7Y90q+w5FhfYRZoLIrkEdx zD9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=dDwa/y/fHdO9uszXLYB2L6g7dGmOEb+NXHXq5PBNAEM=; b=dNIefVX4fz+H+4VTrLK4jJ3zXlMLK7q2GWxlsoXYtoolFj6cNFU/G+9ghjoL1MdKWe K2zfAokKCdDK/Oki6ZMRWuiw5fFRyrTAGA3YOcZ9fdYMys8JD9zPQr+7LGi1Gt0vSXv/ jVVIaUmwL3XlyXzx21qyksCF9Y9M4d9bbi/GqaGO6hGjuCVmEkb/jLkAPdmomp/C0nN8 TbOWDm5PG0WSVkEybji+BmrtYX1H/qYK28WId++DQ+HpowmYGy+E+Fcq/fLAB9hBdYp0 5o0GNr/kUfgOFyXo28Gl3WXa8G0baKqZNFhOwHuT74vSnBSuDcmiLYlqDZOjekrNlCV0 2euQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FC4e4Kub; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d63si9312180oib.224.2020.03.24.08.40.09; Tue, 24 Mar 2020 08:40:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=FC4e4Kub; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728732AbgCXPhj (ORCPT + 99 others); Tue, 24 Mar 2020 11:37:39 -0400 Received: from mail.kernel.org ([198.145.29.99]:60572 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728709AbgCXPhf (ORCPT ); Tue, 24 Mar 2020 11:37:35 -0400 Received: from localhost.localdomain (236.31.169.217.in-addr.arpa [217.169.31.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2CF882073E; Tue, 24 Mar 2020 15:37:33 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1585064255; bh=ieuN1NJTq+9heb9k5hJc1KkJB7zqBNtgCKe1hqkqObc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=FC4e4KubugDTpB2dTINNE4ZzmVzWoJ3zBo41BOOCCa60v3W4JTxEUmucW0IieqI4l wZBVBpH6WdYqZJFU8YUpcCq6bjh0Celqc9ggRZW4zOyKk4kEabDDXGKXOAm9utQybw ouCNAWXeOF7ZvMTnDx5Qm+mOiQ5cZ+619xCWIA6k= From: Will Deacon To: linux-kernel@vger.kernel.org Cc: Will Deacon , Eric Dumazet , Jann Horn , Kees Cook , Maddie Stone , Marco Elver , "Paul E . McKenney" , Peter Zijlstra , Thomas Gleixner , kernel-team@android.com, kernel-hardening@lists.openwall.com Subject: [RFC PATCH 18/21] list_bl: Move integrity checking out of line Date: Tue, 24 Mar 2020 15:36:40 +0000 Message-Id: <20200324153643.15527-19-will@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20200324153643.15527-1-will@kernel.org> References: <20200324153643.15527-1-will@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In preparation for adding full integrity checking to 'hlist_bl', move the checks out of line before they become more bloated. At the same, swap the argument order for __hlist_bl_add_head_valid() so that it follows the same convention as __hlist_add_head_valid(). Signed-off-by: Will Deacon --- include/linux/list_bl.h | 34 ++++++---------------------------- include/linux/rculist_bl.h | 2 +- lib/list_debug.c | 28 ++++++++++++++++++++++++++++ 3 files changed, 35 insertions(+), 29 deletions(-) diff --git a/include/linux/list_bl.h b/include/linux/list_bl.h index 0839c4f43e6d..dd74043ebae6 100644 --- a/include/linux/list_bl.h +++ b/include/linux/list_bl.h @@ -33,34 +33,12 @@ struct hlist_bl_node { }; #ifdef CONFIG_CHECK_INTEGRITY_LIST -static inline bool __hlist_bl_add_head_valid(struct hlist_bl_head *h, - struct hlist_bl_node *n) -{ - unsigned long hlock = (unsigned long)h->first & LIST_BL_LOCKMASK; - unsigned long nlock = (unsigned long)n & LIST_BL_LOCKMASK; - - return !(CHECK_DATA_CORRUPTION(nlock, - "hlist_bl_add_head: node is locked\n") || - CHECK_DATA_CORRUPTION(hlock != LIST_BL_LOCKMASK, - "hlist_bl_add_head: head is unlocked\n")); -} - -static inline bool __hlist_bl_del_valid(struct hlist_bl_node *n) -{ - unsigned long nlock = (unsigned long)n & LIST_BL_LOCKMASK; - - return !(CHECK_DATA_CORRUPTION(nlock, - "hlist_bl_del_valid: node locked") || - CHECK_DATA_CORRUPTION(n->next == LIST_POISON1, - "hlist_bl_del corruption, %px->next is LIST_POISON1 (%px)\n", - n, LIST_POISON1) || - CHECK_DATA_CORRUPTION(n->pprev == LIST_POISON2, - "hlist_bl_del corruption, %px->pprev is LIST_POISON2 (%px)\n", - n, LIST_POISON2)); -} +extern bool __hlist_bl_add_head_valid(struct hlist_bl_node *n, + struct hlist_bl_head *h); +extern bool __hlist_bl_del_valid(struct hlist_bl_node *node); #else -static inline bool __hlist_bl_add_head_valid(struct hlist_bl_head *h, - struct hlist_bl_node *n) +static inline bool __hlist_bl_add_head_valid(struct hlist_bl_node *n, + struct hlist_bl_head *h) { return true; } @@ -103,7 +81,7 @@ static inline void hlist_bl_add_head(struct hlist_bl_node *n, { struct hlist_bl_node *first = hlist_bl_first(h); - if (!__hlist_bl_add_head_valid(h, n)) + if (!__hlist_bl_add_head_valid(n, h)) return; n->next = first; diff --git a/include/linux/rculist_bl.h b/include/linux/rculist_bl.h index 553ce3cde104..9356e7283ff0 100644 --- a/include/linux/rculist_bl.h +++ b/include/linux/rculist_bl.h @@ -63,7 +63,7 @@ static inline void hlist_bl_add_head_rcu(struct hlist_bl_node *n, { struct hlist_bl_node *first; - if (!__hlist_bl_add_head_valid(h, n)) + if (!__hlist_bl_add_head_valid(n, h)) return; /* don't need hlist_bl_first_rcu because we're under lock */ diff --git a/lib/list_debug.c b/lib/list_debug.c index b3560de4accc..9591fa6c9337 100644 --- a/lib/list_debug.c +++ b/lib/list_debug.c @@ -186,3 +186,31 @@ bool __hlist_nulls_del_valid(struct hlist_nulls_node *node) return true; } EXPORT_SYMBOL(__hlist_nulls_del_valid); + +bool __hlist_bl_add_head_valid(struct hlist_bl_node *new, + struct hlist_bl_head *head) +{ + unsigned long hlock = (unsigned long)head->first & LIST_BL_LOCKMASK; + unsigned long nlock = (unsigned long)new & LIST_BL_LOCKMASK; + + return !(CHECK_DATA_CORRUPTION(nlock, + "hlist_bl_add_head: node is locked\n") || + CHECK_DATA_CORRUPTION(hlock != LIST_BL_LOCKMASK, + "hlist_bl_add_head: head is unlocked\n")); +} +EXPORT_SYMBOL(__hlist_bl_add_head_valid); + +bool __hlist_bl_del_valid(struct hlist_bl_node *node) +{ + unsigned long nlock = (unsigned long)node & LIST_BL_LOCKMASK; + + return !(CHECK_DATA_CORRUPTION(nlock, + "hlist_bl_del_valid: node locked") || + CHECK_DATA_CORRUPTION(node->next == LIST_POISON1, + "hlist_bl_del corruption, %px->next is LIST_POISON1 (%px)\n", + node, LIST_POISON1) || + CHECK_DATA_CORRUPTION(node->pprev == LIST_POISON2, + "hlist_bl_del corruption, %px->pprev is LIST_POISON2 (%px)\n", + node, LIST_POISON2)); +} +EXPORT_SYMBOL(__hlist_bl_del_valid); -- 2.20.1