mirror of
				https://github.com/torvalds/linux.git
				synced 2025-11-04 02:30:34 +02:00 
			
		
		
		
	Given we have uninitialized list_heads being passed to list_add() it
will always be the case that those uninitialized values randomly trigger
the poison value.  Especially since a list_add() operation will seed the
stack with the poison value for later stack allocations to trip over.
For example, see these two false positive reports:
  list_add attempted on force-poisoned entry
  WARNING: at lib/list_debug.c:34
  [..]
  NIP [c00000000043c390] __list_add+0xb0/0x150
  LR [c00000000043c38c] __list_add+0xac/0x150
  Call Trace:
    __list_add+0xac/0x150 (unreliable)
    __down+0x4c/0xf8
    down+0x68/0x70
    xfs_buf_lock+0x4c/0x150 [xfs]
  list_add attempted on force-poisoned entry(0000000000000500),
   new->next == d0000000059ecdb0, new->prev == 0000000000000500
  WARNING: at lib/list_debug.c:33
  [..]
  NIP [c00000000042db78] __list_add+0xa8/0x140
  LR [c00000000042db74] __list_add+0xa4/0x140
  Call Trace:
    __list_add+0xa4/0x140 (unreliable)
    rwsem_down_read_failed+0x6c/0x1a0
    down_read+0x58/0x60
    xfs_log_commit_cil+0x7c/0x600 [xfs]
Fixes: commit 5c2c2587b1 ("mm, dax, pmem: introduce {get|put}_dev_pagemap() for dax-gup")
Signed-off-by: Dan Williams <dan.j.williams@intel.com>
Reported-by: Eryu Guan <eguan@redhat.com>
Tested-by: Eryu Guan <eguan@redhat.com>
Cc: Ross Zwisler <ross.zwisler@linux.intel.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
		
	
			
		
			
				
	
	
		
			100 lines
		
	
	
	
		
			2.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			100 lines
		
	
	
	
		
			2.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * Copyright 2006, Red Hat, Inc., Dave Jones
 | 
						|
 * Released under the General Public License (GPL).
 | 
						|
 *
 | 
						|
 * This file contains the linked list implementations for
 | 
						|
 * DEBUG_LIST.
 | 
						|
 */
 | 
						|
 | 
						|
#include <linux/export.h>
 | 
						|
#include <linux/list.h>
 | 
						|
#include <linux/bug.h>
 | 
						|
#include <linux/kernel.h>
 | 
						|
#include <linux/rculist.h>
 | 
						|
 | 
						|
/*
 | 
						|
 * Insert a new entry between two known consecutive entries.
 | 
						|
 *
 | 
						|
 * This is only for internal list manipulation where we know
 | 
						|
 * the prev/next entries already!
 | 
						|
 */
 | 
						|
 | 
						|
void __list_add(struct list_head *new,
 | 
						|
			      struct list_head *prev,
 | 
						|
			      struct list_head *next)
 | 
						|
{
 | 
						|
	WARN(next->prev != prev,
 | 
						|
		"list_add corruption. next->prev should be "
 | 
						|
		"prev (%p), but was %p. (next=%p).\n",
 | 
						|
		prev, next->prev, next);
 | 
						|
	WARN(prev->next != next,
 | 
						|
		"list_add corruption. prev->next should be "
 | 
						|
		"next (%p), but was %p. (prev=%p).\n",
 | 
						|
		next, prev->next, prev);
 | 
						|
	WARN(new == prev || new == next,
 | 
						|
	     "list_add double add: new=%p, prev=%p, next=%p.\n",
 | 
						|
	     new, prev, next);
 | 
						|
	next->prev = new;
 | 
						|
	new->next = next;
 | 
						|
	new->prev = prev;
 | 
						|
	WRITE_ONCE(prev->next, new);
 | 
						|
}
 | 
						|
EXPORT_SYMBOL(__list_add);
 | 
						|
 | 
						|
void __list_del_entry(struct list_head *entry)
 | 
						|
{
 | 
						|
	struct list_head *prev, *next;
 | 
						|
 | 
						|
	prev = entry->prev;
 | 
						|
	next = entry->next;
 | 
						|
 | 
						|
	if (WARN(next == LIST_POISON1,
 | 
						|
		"list_del corruption, %p->next is LIST_POISON1 (%p)\n",
 | 
						|
		entry, LIST_POISON1) ||
 | 
						|
	    WARN(prev == LIST_POISON2,
 | 
						|
		"list_del corruption, %p->prev is LIST_POISON2 (%p)\n",
 | 
						|
		entry, LIST_POISON2) ||
 | 
						|
	    WARN(prev->next != entry,
 | 
						|
		"list_del corruption. prev->next should be %p, "
 | 
						|
		"but was %p\n", entry, prev->next) ||
 | 
						|
	    WARN(next->prev != entry,
 | 
						|
		"list_del corruption. next->prev should be %p, "
 | 
						|
		"but was %p\n", entry, next->prev))
 | 
						|
		return;
 | 
						|
 | 
						|
	__list_del(prev, next);
 | 
						|
}
 | 
						|
EXPORT_SYMBOL(__list_del_entry);
 | 
						|
 | 
						|
/**
 | 
						|
 * list_del - deletes entry from list.
 | 
						|
 * @entry: the element to delete from the list.
 | 
						|
 * Note: list_empty on entry does not return true after this, the entry is
 | 
						|
 * in an undefined state.
 | 
						|
 */
 | 
						|
void list_del(struct list_head *entry)
 | 
						|
{
 | 
						|
	__list_del_entry(entry);
 | 
						|
	entry->next = LIST_POISON1;
 | 
						|
	entry->prev = LIST_POISON2;
 | 
						|
}
 | 
						|
EXPORT_SYMBOL(list_del);
 | 
						|
 | 
						|
/*
 | 
						|
 * RCU variants.
 | 
						|
 */
 | 
						|
void __list_add_rcu(struct list_head *new,
 | 
						|
		    struct list_head *prev, struct list_head *next)
 | 
						|
{
 | 
						|
	WARN(next->prev != prev,
 | 
						|
		"list_add_rcu corruption. next->prev should be prev (%p), but was %p. (next=%p).\n",
 | 
						|
		prev, next->prev, next);
 | 
						|
	WARN(prev->next != next,
 | 
						|
		"list_add_rcu corruption. prev->next should be next (%p), but was %p. (prev=%p).\n",
 | 
						|
		next, prev->next, prev);
 | 
						|
	new->next = next;
 | 
						|
	new->prev = prev;
 | 
						|
	rcu_assign_pointer(list_next_rcu(prev), new);
 | 
						|
	next->prev = new;
 | 
						|
}
 | 
						|
EXPORT_SYMBOL(__list_add_rcu);
 |