Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp4975283ybb; Tue, 24 Mar 2020 08:40:21 -0700 (PDT) X-Google-Smtp-Source: ADFU+vvsoU/dpY+6gns8NVtkxXeZTQoH6LKd4s7n0qA31bfoBlIS+UfmcfFrVydjR9DfYep1p6oo X-Received: by 2002:a9d:66d4:: with SMTP id t20mr4933830otm.275.1585064421770; Tue, 24 Mar 2020 08:40:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585064421; cv=none; d=google.com; s=arc-20160816; b=Jj2qTLiPa8YpNuwcT024IMm4au1VgSJNVWg6XlnljQX7TpHPhKHVqxg/8ZQ1vh4r2x Q1Yj+coJYAIsqAFBZ6flHI1E11MUcYw5ri95x4WI+8JJJ4/jDicy/xy09QCO7A0sk9P0 cTnDwxJmwJdhHRWIPZv7LqtnMWfQW6d9Q9K1fReFIUj96JOfI0MQaQJasBeXi6OcAR7V YpDCc1/+1vhevWwY3i0TGm7pVt6TOLXPOmIOBjYTpizilGnLCJ3FaKM4ykclc21F8h3j nqfiXo0nn3KUX27aZdUWyv0ygqxzt/kZuyk/itHOwayBTIoJgrWRuz8Q8aUkksPBX2zd T3jA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=3sxcizMKTAdUxrvSXf+1PTZWg+JjiOS9n7MKp7BpvcM=; b=Onnm1xPFpw0xiEU6uyLs+/Cxkkelxd5xURFCH7aowjMYbpTVttV5dsXG5CKkRsYvxF uyK7IAJxLvCdPPv5CYDE8ANx+zVLDGLpKp9P3+/QzJ+VpLiUcg+KSLFOf4lC6ClulgXF ARh/LclDuyHNW64unXgXo5k/g/i6YSZr94/H/TJrzfpxvTCgJ1+TgppxuJdD7Y4eZhKN S4YXsSb6HLgVEbEbw3ZiyhcA2Dk2wu2e8yj85CYLadfgiuuT0BuwtGd+zfevd5NWuh4V PyNwkv6GQ4uIkaZXxvRnVC2CDe8kohqBKA3+ExF6pfJ3RwkTwpfGWj+tmEJ86jbDkScC tw4w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Qr1GKvJa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 9si1503967oip.112.2020.03.24.08.40.09; Tue, 24 Mar 2020 08:40:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Qr1GKvJa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728614AbgCXPh2 (ORCPT + 99 others); Tue, 24 Mar 2020 11:37:28 -0400 Received: from mail.kernel.org ([198.145.29.99]:60152 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728554AbgCXPhU (ORCPT ); Tue, 24 Mar 2020 11:37:20 -0400 Received: from localhost.localdomain (236.31.169.217.in-addr.arpa [217.169.31.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id A02B9208C3; Tue, 24 Mar 2020 15:37:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1585064240; bh=NCj3N5oBB6pG2895MeRz7pky+XQDlDn73NrS+bYc6AM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Qr1GKvJaUyzDriW0KJU1HKC2q0FydemPOrJKXOPr5JKPucn0IzLnr3tNvkXG4/viU Utvi7LQHj9CsXJmlKMv/38ntVIUYwpRK5Dwr8UqXIIhyOffTODRpZPdtgLTshQwmb0 5yPgVBZGdMhl8GIjxKYAl5Nf/2eRzb9jWXyEiFpM= From: Will Deacon To: linux-kernel@vger.kernel.org Cc: Will Deacon , Eric Dumazet , Jann Horn , Kees Cook , Maddie Stone , Marco Elver , "Paul E . McKenney" , Peter Zijlstra , Thomas Gleixner , kernel-team@android.com, kernel-hardening@lists.openwall.com Subject: [RFC PATCH 12/21] list: Poison ->next pointer for non-RCU deletion of 'hlist_nulls_node' Date: Tue, 24 Mar 2020 15:36:34 +0000 Message-Id: <20200324153643.15527-13-will@kernel.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20200324153643.15527-1-will@kernel.org> References: <20200324153643.15527-1-will@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org hlist_nulls_del() is used for non-RCU deletion of an 'hlist_nulls_node' and so we can safely poison the ->next pointer without having to worry about concurrent readers, just like we do for other non-RCU list deletion primitives Cc: Paul E. McKenney Cc: Peter Zijlstra Signed-off-by: Will Deacon --- include/linux/list_nulls.h | 1 + 1 file changed, 1 insertion(+) diff --git a/include/linux/list_nulls.h b/include/linux/list_nulls.h index fd154ceb5b0d..48f33ae16381 100644 --- a/include/linux/list_nulls.h +++ b/include/linux/list_nulls.h @@ -99,6 +99,7 @@ static inline void __hlist_nulls_del(struct hlist_nulls_node *n) static inline void hlist_nulls_del(struct hlist_nulls_node *n) { __hlist_nulls_del(n); + n->next = LIST_POISON1; n->pprev = LIST_POISON2; } -- 2.20.1