Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp2318883imd; Fri, 2 Nov 2018 09:20:54 -0700 (PDT) X-Google-Smtp-Source: AJdET5eoFk2Y9T1G8h2amArbOQVZ9LE0p29SmOrs6Wf6PnFVRKayFqAYQ9D9RzA9fkNWLjvXQGKj X-Received: by 2002:a17:902:59d6:: with SMTP id d22-v6mr12320650plj.116.1541175654477; Fri, 02 Nov 2018 09:20:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1541175654; cv=none; d=google.com; s=arc-20160816; b=ZipUxnvotKxCkS9B0m93M2JzrpjbYWzneLFPBot5ZYMDxGzfntACRM6poyF+ZFUz0y WSJKWU0ovtB2dRMkCdj7o73r3MhHJq7NKjY2iiKE78udYRev5C2jcxvWHhbCM5DQHJE2 H2C2yMC+vunJ7IeXTGXoiUiqE4zgSQFqfotkey5MCUuwifZhaJXFMmfYxZYaVBfrxN8I WRZOWFWP9LJ0GNDkOpP0Hs3wiWZi8HwLaowz2jgzkzXkq1u/rm95poPTq+Z5ZsJE2d7R UPWxsI9oX5zrxYNa6QgGZEuIbvuUVg/QMXuaN0J8Zsy+z8VsdU8ICH2XUY59uEFZ5ytO os5w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=qPJy78/122IYTUHYahhNLdzvTo4yP/6UBX0aH09tmXw=; b=vJkydHfQIMGBDBa2ZD17+tUx4jD4tRd5IETdZH+R+18J8xGlifyRvztW3pk1tN19eo l7exblHvLQrFm0LUh28MeBhIvwl0sI3keRPWlqQel6aPnHREuK1Rw+lULn5qeY5eotZG 6iNXx/l57aWrNoq/xzbL8QN07gFKtvl1hTsJbXlNApIAzHdmOWXhwge6u3Dagdwos0gp OjVGC6nnnSdiSnVw3smrPpAsUzdUevF1DN8efysk2AbAzu8xGA91mb+aTcYNwv02J8AX jGG/X1Ltgs4uE8MU12EHRrSfVZEEBH7+YZ6BSg36anW8DPQJYHAcknmZr1+YvmRLUBaT GxPg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=virtuozzo.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t64-v6si17438606pfd.58.2018.11.02.09.20.37; Fri, 02 Nov 2018 09:20:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=virtuozzo.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728036AbeKCB0s (ORCPT + 99 others); Fri, 2 Nov 2018 21:26:48 -0400 Received: from relay.sw.ru ([185.231.240.75]:46780 "EHLO relay.sw.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726098AbeKCB0r (ORCPT ); Fri, 2 Nov 2018 21:26:47 -0400 Received: from [172.16.25.12] by relay.sw.ru with esmtp (Exim 4.90_1) (envelope-from ) id 1gIc9V-0006r7-Q8; Fri, 02 Nov 2018 19:18:30 +0300 Subject: Re: [RFC PATCH] lib: Introduce generic __cmpxchg_u64() and use it where needed To: Peter Zijlstra , Trond Myklebust Cc: "mark.rutland@arm.com" , "linux-kernel@vger.kernel.org" , "ralf@linux-mips.org" , "jlayton@kernel.org" , "linuxppc-dev@lists.ozlabs.org" , "bfields@fieldses.org" , "linux-mips@linux-mips.org" , "linux@roeck-us.net" , "linux-nfs@vger.kernel.org" , "akpm@linux-foundation.org" , "will.deacon@arm.com" , "boqun.feng@gmail.com" , "paul.burton@mips.com" , "anna.schumaker@netapp.com" , "jhogan@kernel.org" , "netdev@vger.kernel.org" , "davem@davemloft.net" , "arnd@arndb.de" , "paulus@samba.org" , "mpe@ellerman.id.au" , "benh@kernel.crashing.org" , Paul McKenney , dvyukov@google.com References: <1541015538-11382-1-git-send-email-linux@roeck-us.net> <20181031213240.zhh7dfcm47ucuyfl@pburton-laptop> <20181031220253.GA15505@roeck-us.net> <20181031233235.qbedw3pinxcuk7me@pburton-laptop> <4e2438a23d2edf03368950a72ec058d1d299c32e.camel@hammerspace.com> <20181101131846.biyilr2msonljmij@lakrids.cambridge.arm.com> <20181101145926.GE3178@hirez.programming.kicks-ass.net> <20181101163212.GF3159@hirez.programming.kicks-ass.net> From: Andrey Ryabinin Message-ID: <5a846924-e642-d9d1-4e0e-810bd4d01c26@virtuozzo.com> Date: Fri, 2 Nov 2018 19:19:15 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.9.1 MIME-Version: 1.0 In-Reply-To: <20181101163212.GF3159@hirez.programming.kicks-ass.net> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/01/2018 07:32 PM, Peter Zijlstra wrote: > On Thu, Nov 01, 2018 at 03:22:15PM +0000, Trond Myklebust wrote: >> On Thu, 2018-11-01 at 15:59 +0100, Peter Zijlstra wrote: >>> On Thu, Nov 01, 2018 at 01:18:46PM +0000, Mark Rutland wrote: > >>>>> My one question (and the reason why I went with cmpxchg() in the >>>>> first place) would be about the overflow behaviour for >>>>> atomic_fetch_inc() and friends. I believe those functions should >>>>> be OK on x86, so that when we overflow the counter, it behaves >>>>> like an unsigned value and wraps back around. Is that the case >>>>> for all architectures? >>>>> >>>>> i.e. are atomic_t/atomic64_t always guaranteed to behave like >>>>> u32/u64 on increment? >>>>> >>>>> I could not find any documentation that explicitly stated that >>>>> they should. >>>> >>>> Peter, Will, I understand that the atomic_t/atomic64_t ops are >>>> required to wrap per 2's-complement. IIUC the refcount code relies >>>> on this. >>>> >>>> Can you confirm? >>> >>> There is quite a bit of core code that hard assumes 2s-complement. >>> Not only for atomics but for any signed integer type. Also see the >>> kernel using -fno-strict-overflow which implies -fwrapv, which >>> defines signed overflow to behave like 2s-complement (and rids us of >>> that particular UB). >> >> Fair enough, but there have also been bugfixes to explicitly fix unsafe >> C standards assumptions for signed integers. See, for instance commit >> 5a581b367b5d "jiffies: Avoid undefined behavior from signed overflow" >> from Paul McKenney. > > Yes, I feel Paul has been to too many C/C++ committee meetings and got > properly paranoid. Which isn't always a bad thing :-) > > But for us using -fno-strict-overflow which actually defines signed > overflow, I myself am really not worried. I'm also not sure if KASAN has > been taught about this, or if it will still (incorrectly) warn about UB > for signed types. > UBSAN warns about signed overflows despite -fno-strict-overflow if gcc version is < 8. I have learned recently that UBSAN in GCC 8 ignores signed overflows if -fno-strict-overflow of fwrapv is used. $ cat signed_overflow.c #include __attribute__((noinline)) int foo(int a, int b) { return a+b; } int main(void) { int a = 0x7fffffff; int b = 2; printf("%d\n", foo(a,b)); return 0; } $ gcc-8.2.0 -fsanitize=signed-integer-overflow signed_overflow.c && ./a.out signed_overflow.c:6:10: runtime error: signed integer overflow: 2147483647 + 2 cannot be represented in type 'int' -2147483647 $ gcc-8.2.0 -fno-strict-overflow -fsanitize=signed-integer-overflow signed_overflow.c && ./a.out -2147483647 $ gcc-7.3.0 -fsanitize=signed-integer-overflow signed_overflow.c && ./a.out signed_overflow.c:6:10: runtime error: signed integer overflow: 2147483647 + 2 cannot be represented in type 'int' -2147483647 $ gcc-7.3.0 -fno-strict-overflow -fsanitize=signed-integer-overflow signed_overflow.c && ./a.out signed_overflow.c:6:10: runtime error: signed integer overflow: 2147483647 + 2 cannot be represented in type 'int' -2147483647 clang behaves the same way as GCC 8: $ clang -fsanitize=signed-integer-overflow signed_overflow.c && ./a.out signed_overflow.c:6:10: runtime error: signed integer overflow: 2147483647 + 2 cannot be represented in type 'int' -2147483647 $ clang -fno-strict-overflow -fsanitize=signed-integer-overflow signed_overflow.c && ./a.out -2147483647 We can always just drop -fsanitize=signed-integer-overflow if it considered too noisy. Although it did catch some real bugs.