Received: by 2002:a25:5b86:0:0:0:0:0 with SMTP id p128csp2114361ybb; Fri, 29 Mar 2019 19:37:37 -0700 (PDT) X-Google-Smtp-Source: APXvYqy3+1a1wk2K7bHSqoPhJjcq5Djh6R8FPEGAUE3iWHfoYt5AhRuAIM3wolAr8bRWbhZm/J97 X-Received: by 2002:aa7:8841:: with SMTP id k1mr50215663pfo.115.1553913456845; Fri, 29 Mar 2019 19:37:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1553913456; cv=none; d=google.com; s=arc-20160816; b=GmQ0jBSqsTMTYMb/VF6kkxSD57UXquDiDvc8cF7ufbnzaOcMpNRu1iLPZlfJXTJ1kW vREAYL/7eVVvZtH9Asf7hEfozxA5X0FNjyrAwBJ2ApggVyIOqbCjjRnS54tZUVl7vY3A wtxg9dGXdotNDHEhoAmV6wnleQoBc4b8K86fRiIYMvKoleC0rM8wCQA3jhh/bEhdpasQ 4lqwo9g0EjwL5/GesNIQ4Rm77VlN6xaTCR4AQPOB+oT1adkWUjdrTh94ypJe7Jwa5WhZ 2bkdWfOcd520Lq0cNYWZuPeddG85tqhqY+xIyDWajx63k5p/GPRH8j/t6a1mrSVRwTDp zpNw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=PgIWtuA5yB3xEpa60JIw+vnlt+2awLt6X3B/c39ow20=; b=hYMF3U0m7vDEf30aW6WmnHr1j376tx8rtY1REDdQUow31NErOqiHGxS1ZueefaI1gk OQaI/3wXwAcfzm9hNK6UlqDYquZsnGd1NnlRAH6EKa+qnMAA2rIDOQwkxwgRC9QVQSm3 ov8fIw6pbYVrRCKGNC+EDlgmkrzAO3ykUYfg6RQ6Ll6ZlfjMmZ9n3EWhrKfsh/xVUiPH yBZEfPlBXP9zeMm+iynJ9ONQH06Q9ThURN8u1EI0CBjuBA9kL/je9yhzFC+lagmhy7xW coTrXJPcaisscaGlfTyifY5WIjuLSgAkh2TONd9y4orDS1AgegJCxBNSReA5BPQn5I0r ocMA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=E2mc4NPk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w15si3297463pgj.427.2019.03.29.19.37.19; Fri, 29 Mar 2019 19:37:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@joelfernandes.org header.s=google header.b=E2mc4NPk; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730372AbfC3Cgo (ORCPT + 99 others); Fri, 29 Mar 2019 22:36:44 -0400 Received: from mail-pf1-f195.google.com ([209.85.210.195]:42856 "EHLO mail-pf1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730151AbfC3Cgn (ORCPT ); Fri, 29 Mar 2019 22:36:43 -0400 Received: by mail-pf1-f195.google.com with SMTP id r15so1875348pfn.9 for ; Fri, 29 Mar 2019 19:36:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=joelfernandes.org; s=google; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=PgIWtuA5yB3xEpa60JIw+vnlt+2awLt6X3B/c39ow20=; b=E2mc4NPkVBnBhClPgBYvg/S3udC7gEeNAxxEsn2Px1HiFWSY5oJSjA81vr/A9lrS4e 1YSXcZbyfaHzOX0F3WovbUXt3QcLqkPoJgyXKDvtUiy0qfV+K+I5Cw3pA2CaK3u2ljrK BxczT9ValMJp9uUP2kaFVdI2YYad+gfGUBMMk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=PgIWtuA5yB3xEpa60JIw+vnlt+2awLt6X3B/c39ow20=; b=gdMCwU4IJVF/8/rncWIqDIHFpy40CECgOssNfXLJfhjrRK+uy9Kd9Y9crvno/k7MfJ EP9tWWtPCF6pshoc5vapTW+GCJDgqdAvaCatmZGmqkOCxczbBAYzrtuCMYC24dKes47U LLnU+ctScZ5NlyEhJ0z2qR2rBCBWWUY1h6rJ96NRC7sjaJvM+bq7stWYUhydyJPY8gbH kZU+/DB4lr4wdzwYB1JQZSobXKtnN+dTkZjkyytEFhg9ISXdlU0RfxKKtkiJLiCPJeQa BC6RwqJdyJqM52SE9h2kXhGb0gPTPddmMDmd5aOYgpOzEdVkdsR4cFFUpHABc5uuPMl2 FS9w== X-Gm-Message-State: APjAAAVZCpBWQKYzzsQJblDCbw7jbeprMI8qrOnYbfbmFO32hgbiMFzs fhFz+hIH0fVx7WC55kE7bdbHaQ== X-Received: by 2002:aa7:8b4c:: with SMTP id i12mr50151580pfd.189.1553913401990; Fri, 29 Mar 2019 19:36:41 -0700 (PDT) Received: from localhost ([2620:15c:6:12:9c46:e0da:efbf:69cc]) by smtp.gmail.com with ESMTPSA id c3sm5790310pfg.88.2019.03.29.19.36.40 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Fri, 29 Mar 2019 19:36:40 -0700 (PDT) Date: Fri, 29 Mar 2019 22:36:39 -0400 From: Joel Fernandes To: "Paul E. McKenney" Cc: Oleg Nesterov , Jann Horn , Kees Cook , "Eric W. Biederman" , LKML , Android Kernel Team , Kernel Hardening , Andrew Morton , Matthew Wilcox , Michal Hocko , "Reshetova, Elena" , Alan Stern Subject: Re: [PATCH] Convert struct pid count to refcount_t Message-ID: <20190330023639.GA214473@google.com> References: <20190327145331.215360-1-joel@joelfernandes.org> <20190328023432.GA93275@google.com> <20190328143738.GA261521@google.com> <20190328162641.GC19441@redhat.com> <20190328173707.GP4102@linux.ibm.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190328173707.GP4102@linux.ibm.com> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Mar 28, 2019 at 10:37:07AM -0700, Paul E. McKenney wrote: > On Thu, Mar 28, 2019 at 05:26:42PM +0100, Oleg Nesterov wrote: > > On 03/28, Jann Horn wrote: > > > > > > Since we're just talking about RCU stuff now, adding Paul McKenney to > > > the thread. > > > > Since you added Paul let me add more confusion to this thread ;) > > Woo-hoo!!! More confusion! Bring it on!!! ;-) Nice to take part in the confusion fun too!!! ;-) > > There were some concerns about the lack of barriers in put_pid(), but I can't > > find that old discussion and I forgot the result of that discussion... > > > > Paul, could you confirm that this code > > > > CPU_0 CPU_1 > > > > X = 1; if (READ_ONCE(Y)) > > mb(); X = 2; > > Y = 1; BUG_ON(X != 2); > > > > > > is correct? I think it is, control dependency pairs with mb(), right? > > The BUG_ON() is supposed to happen at the end of time, correct? > As written, there is (in the strict sense) a data race between the load > of X in the BUG_ON() and CPU_0's store to X. In a less strict sense, > you could of course argue that this data race is harmless, especially > if X is a single byte. But the more I talk to compiler writers, the > less comfortable I become with data races in general. :-/ > > So I would also feel better if the "Y = 1" was WRITE_ONCE(). > > On the other hand, this is a great opportunity to try out Alan Stern's > prototype plain-accesses patch to the Linux Kernel Memory Model (LKMM)! > > https://lkml.kernel.org/r/Pine.LNX.4.44L0.1903191459270.1593-200000@iolanthe.rowland.org > > Also adding Alan on CC. > > Here is what I believe is the litmus test that your are interested in: > > ------------------------------------------------------------------------ > C OlegNesterov-put_pid > > {} > > P0(int *x, int *y) > { > *x = 1; > smp_mb(); > *y = 1; > } > > P1(int *x, int *y) > { > int r1; > > r1 = READ_ONCE(*y); > if (r1) > *x = 2; > } > > exists (1:r1=1 /\ ~x=2) > ------------------------------------------------------------------------ > > Running this through herd with Alan's patch detects the data race > and says that the undesired outcome is allowed: > > $ herd7 -conf linux-kernel.cfg /tmp/OlegNesterov-put_pid.litmus > Test OlegNesterov-put_pid Allowed > States 3 > 1:r1=0; x=1; > 1:r1=1; x=1; > 1:r1=1; x=2; > Ok > Witnesses > Positive: 1 Negative: 2 > Flag data-race > Condition exists (1:r1=1 /\ not (x=2)) > Observation OlegNesterov-put_pid Sometimes 1 2 > Time OlegNesterov-put_pid 0.00 > Hash=a3e0043ad753effa860fea37eeba0a76 > > Using WRITE_ONCE() for P0()'s store to y still allows this outcome, > although it does remove the "Flag data-race". > > Using WRITE_ONCE() for both P0()'s store to y and P1()'s store to x > gets rid of both the "Flag data-race" and the undesired outcome: > > $ herd7 -conf linux-kernel.cfg /tmp/OlegNesterov-put_pid-WO-WO.litmus > Test OlegNesterov-put_pid-WO-WO Allowed > States 2 > 1:r1=0; x=1; > 1:r1=1; x=2; > No > Witnesses > Positive: 0 Negative: 2 > Condition exists (1:r1=1 /\ not (x=2)) > Observation OlegNesterov-put_pid-WO-WO Never 0 2 > Time OlegNesterov-put_pid-WO-WO 0.01 > Hash=6e1643e3c5e4739b590bde0a8e8a918e > > Here is the corresponding litmus test, in case I messed something up: > > ------------------------------------------------------------------------ > C OlegNesterov-put_pid-WO-WO > > {} > > P0(int *x, int *y) > { > *x = 1; > smp_mb(); > WRITE_ONCE(*y, 1); > } > > P1(int *x, int *y) > { > int r1; > > r1 = READ_ONCE(*y); > if (r1) > WRITE_ONCE(*x, 2); > } > > exists (1:r1=1 /\ ~x=2) I ran the above examples too. Its a bit confusing to me why the WRITE_ONCE in P0() is required, and why would the READ_ONCE / WRITE_ONCE in P1() not be sufficient to prevent the exists condition. Shouldn't the compiler know that, in P0(), it should not reorder the store to y=1 before the x=1 because there is an explicit barrier between the 2 stores? Looks me to me like a broken compiler :-|. So I would have expected the following litmus to result in Never, but it doesn't with Alan's patch: P0(int *x, int *y) { *x = 1; smp_mb(); *y = 1; } P1(int *x, int *y) { int r1; r1 = READ_ONCE(*y); if (r1) WRITE_ONCE(*x, 2); } exists (1:r1=1 /\ ~x=2) > ------------------------------------------------------------------------ > > > If not, then put_pid() needs atomic_read_acquire() as it was proposed in that > > discussion. > > Good point, let's try with smp_load_acquire() in P1(): > > $ herd7 -conf linux-kernel.cfg /tmp/OlegNesterov-put_pid-WO-sla.litmus > Test OlegNesterov-put_pid-WO-sla Allowed > States 2 > 1:r1=0; x=1; > 1:r1=1; x=2; > No > Witnesses > Positive: 0 Negative: 2 > Condition exists (1:r1=1 /\ not (x=2)) > Observation OlegNesterov-put_pid-WO-sla Never 0 2 > Time OlegNesterov-put_pid-WO-sla 0.01 > Hash=4fb0276eabf924793dec1970199db3a6 > > This also works. Here is the litmus test: > > ------------------------------------------------------------------------ > C OlegNesterov-put_pid-WO-sla > > {} > > P0(int *x, int *y) > { > *x = 1; > smp_mb(); > WRITE_ONCE(*y, 1); > } > > P1(int *x, int *y) > { > int r1; > > r1 = smp_load_acquire(y); > if (r1) > *x = 2; > } > > exists (1:r1=1 /\ ~x=2) > ------------------------------------------------------------------------ > > Demoting P0()'s WRITE_ONCE() to a plain write while leaving P1()'s > smp_load_acquire() gets us a data race and allows the undesired > outcome: Yeah, I think this is also what I was confused about above, is why is that WRITE_ONCE required in P0() because there's already an smp_mb there. Surely I'm missing something. ;-) > > $ herd7 -conf linux-kernel.cfg /tmp/OlegNesterov-put_pid-sla.litmus > Test OlegNesterov-put_pid-sla Allowed > States 3 > 1:r1=0; x=1; > 1:r1=1; x=1; > 1:r1=1; x=2; > Ok > Witnesses > Positive: 1 Negative: 2 > Flag data-race > Condition exists (1:r1=1 /\ not (x=2)) > Observation OlegNesterov-put_pid-sla Sometimes 1 2 > Time OlegNesterov-put_pid-sla 0.01 > Hash=ec6f71f3d9f7cd6e45a874c872e3d946 > > But what if you are certain that the compiler cannot mess up your use > of plain C-language loads and stores? Then simply tell LKMM that they > are READ_ONCE() and WRITE_ONCE(), respectively. LKMM is admittedly > somewhat paranoid, but real C compilers really do tear stores of certain > constants on systems (like x86) that have store-immediate instructions, > so a bit of paranoia is not misplaced here. ;-) > > Plus please note that this patch to LKMM is prototype and thus subject > to change. Ah I see. Appreciate if Alan can also CC me on future posting of this since I'm quite interested. ;-) thanks, - Joel > Thanx, Paul >