Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp5169634ybp; Mon, 14 Oct 2019 16:52:10 -0700 (PDT) X-Google-Smtp-Source: APXvYqyWAqxl4PpIvxDD22WCilxmqrVSvfy1t5zVJiuJS2+YbWWpYtI2GQMggc3w8SgzIaPWahoH X-Received: by 2002:a17:906:218a:: with SMTP id 10mr31666562eju.38.1571097130720; Mon, 14 Oct 2019 16:52:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571097130; cv=none; d=google.com; s=arc-20160816; b=ZzSL8nnI1Dk7QbTfv1OuiVIK/fJ/dLh2QkopTz6oyBEawT8/Gmxh+G4ZgoC9Hj3IjO 2REaIsnPncv3V1E+05QzJn5yaWot11D0kA+XwIBEJS5rNt/7HR4DYdoU4+jaBVX18Uyr IMPnY3D9hHvCNAQb9HcYzk1rv/rcY4z16HTRH6R24jiKEwhHjentHyoK8rEYvhmnE/E+ 2SNIO88/UfDE5O3RqMdCjgLTuWz3/q4GnGdMhmOmHvYRY3ZCJ1Ndcf8Ia3LNL3aoUrYw WJJdgKBrbypUs0i3DVpk5GTrqva3e1SisBXai5Y+Prq4vfHooFp2lIMiiYB++pcm5oeZ pRtA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=Fe8V3WPh91ge7SfOH9HpoY+KfdQyjz/N53J28iGvI2s=; b=pJkSyc7zSvdBz3Ao+N5alPuT6bLcZvMEpsDzmhPDAZ16C3qiVkMfjr/aVsPXeDIJOb 3fuNfmd56J6qDLPPrXK+UngeqOmYj29nUlIy939rrH/IQM+voqpUmVqiuDyJ/qS76bKs LL5ufa3i7Dfp7kUzmO/D6QUAKbknX3tOiuZnxWkLuin389KummUuDE/4lTcmxfw4c+OX 1L/XBdheaXVFpfj9Byr6etr4A5ocLWJHksew1NdNddIIsoO6PhUDlVugUJMtW560SpJi HVulYmhAey3AyE9ZsvTt8ShGGlKFdOFn/fio2Bi1F/6Q5FiChoF683eSkwWMPizlbT5D Hc3Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=L5DLuXwj; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c24si12245143edt.364.2019.10.14.16.51.47; Mon, 14 Oct 2019 16:52:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=L5DLuXwj; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388431AbfJNTXV (ORCPT + 99 others); Mon, 14 Oct 2019 15:23:21 -0400 Received: from mail-oi1-f195.google.com ([209.85.167.195]:45687 "EHLO mail-oi1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732239AbfJNTXV (ORCPT ); Mon, 14 Oct 2019 15:23:21 -0400 Received: by mail-oi1-f195.google.com with SMTP id o205so14677564oib.12 for ; Mon, 14 Oct 2019 12:23:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Fe8V3WPh91ge7SfOH9HpoY+KfdQyjz/N53J28iGvI2s=; b=L5DLuXwjUqbbCtuaYcOives97MnwdQB39I9EjhHI/9l5mS917lU1PD+QRoLsT5jEQj XH/X4Xa6HWnYK+n7BN0ruSIUKqvWtru2VlWU8/6I0ZH35vqOzwgk5FOEZ0DpDU4PROj/ K42/BI/Xifzyedo7kHKJLd+u4hqcDttu0QVQ9bOhMiLjpToGD//Lc7EQFJPRCXk1TbrQ IFzt+acEr1vtABYpCl8WSBpfSBCerqNLMN/TTrHIU/wlrKtyzrmrHTw6L0116q9k/s/w GG8BsOFWjT3U7hu/Q/1mVqgM+ZhlbI3Res1iz7Ys1lL2uRGtQzbXfApFbtLu0f3iJyG9 YDyw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Fe8V3WPh91ge7SfOH9HpoY+KfdQyjz/N53J28iGvI2s=; b=d8VXDiAgCqUDtbcC41b/tUBiv+ciX7xwpmkHUDrUCbdWZk8Rj4nlNkZFTi0q7nWZuK ybsAooLDyp6HW7lLlxkg0IneATEpLBBpUkblFLLtxAjJegLl5fI8wGt7wDIRg53+5+cJ OOu/ltAIbHEPW2uwiIcFdR0o4fbGvHi6mLAoP9aHoXA4Hu0thSbS2L1+CqgxXMjfgfnl td1tJUEueNKHJJ2q+s5elosEuard9AxJ+uRwX4/MF/3rs/IMXqaSde3XlkQX4+Ql7Gu5 WAJUvVvKo5OATZ6NORocUAn4AiZ4kPb7aZ3mZk2aAgTglurs4FPFXh0q1z09+wF0j6Pz giZA== X-Gm-Message-State: APjAAAVBBVzn+itIBYllBBXqXhcjCJv2NKHED64UQ/wp0/kk5GXR3YHU mpg298bYns9zDjmIrRCLPQ+2ZdPm6rNn/tV4CcrKxg== X-Received: by 2002:a05:6808:4b:: with SMTP id v11mr25732948oic.70.1571080999447; Mon, 14 Oct 2019 12:23:19 -0700 (PDT) MIME-Version: 1.0 References: <5da2509f.1c69fb81.bb59c.b8e2SMTPIN_ADDED_BROKEN@mx.google.com> <20191014180039.GA89937@google.com> In-Reply-To: <20191014180039.GA89937@google.com> From: Marco Elver Date: Mon, 14 Oct 2019 21:23:07 +0200 Message-ID: Subject: Re: [PATCH] rcu: Fix data-race due to atomic_t copy-by-value To: Joel Fernandes Cc: "linux-kernel@vger.kernel.org" , "Paul E . McKenney" , Josh Triplett , Steven Rostedt , Mathieu Desnoyers , Lai Jiangshan , Ingo Molnar , Dmitry Vyukov , "rcu@vger.kernel.org" Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 14 Oct 2019 at 20:00, Joel Fernandes wrote: > > On Wed, Oct 09, 2019 at 05:57:43PM +0200, Marco Elver wrote: > > This fixes a data-race where `atomic_t dynticks` is copied by value. The > > copy is performed non-atomically, resulting in a data-race if `dynticks` > > is updated concurrently. > > > > This data-race was found with KCSAN: > > ================================================================== > > BUG: KCSAN: data-race in dyntick_save_progress_counter / rcu_irq_enter > > > > write to 0xffff989dbdbe98e0 of 4 bytes by task 10 on cpu 3: > > atomic_add_return include/asm-generic/atomic-instrumented.h:78 [inline] > > rcu_dynticks_snap kernel/rcu/tree.c:310 [inline] > > dyntick_save_progress_counter+0x43/0x1b0 kernel/rcu/tree.c:984 > > force_qs_rnp+0x183/0x200 kernel/rcu/tree.c:2286 > > rcu_gp_fqs kernel/rcu/tree.c:1601 [inline] > > rcu_gp_fqs_loop+0x71/0x880 kernel/rcu/tree.c:1653 > > rcu_gp_kthread+0x22c/0x3b0 kernel/rcu/tree.c:1799 > > kthread+0x1b5/0x200 kernel/kthread.c:255 > > > > > > read to 0xffff989dbdbe98e0 of 4 bytes by task 154 on cpu 7: > > rcu_nmi_enter_common kernel/rcu/tree.c:828 [inline] > > rcu_irq_enter+0xda/0x240 kernel/rcu/tree.c:870 > > irq_enter+0x5/0x50 kernel/softirq.c:347 > > > > > > Reported by Kernel Concurrency Sanitizer on: > > CPU: 7 PID: 154 Comm: kworker/7:1H Not tainted 5.3.0+ #5 > > Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 > > Workqueue: kblockd blk_mq_run_work_fn > > ================================================================== > > > > Signed-off-by: Marco Elver > > I believe Paul has already queued this, but anyway I have reviewed it as well > and it LGTM. > > Reviewed-by: Joel Fernandes (Google) Thank you! As an aside, I was wondering if there is a way to disallow copy-by-value for certain structs, such as atomic_t (in the absence of constructors). Presumably that'd be useful to have here to just let the type-system prevent similar cases in future. Thanks, -- Marco > thanks, > > - Joel > > > > --- > > include/trace/events/rcu.h | 4 ++-- > > kernel/rcu/tree.c | 11 ++++++----- > > 2 files changed, 8 insertions(+), 7 deletions(-) > > > > diff --git a/include/trace/events/rcu.h b/include/trace/events/rcu.h > > index 694bd040cf51..fdd31c5fd126 100644 > > --- a/include/trace/events/rcu.h > > +++ b/include/trace/events/rcu.h > > @@ -442,7 +442,7 @@ TRACE_EVENT_RCU(rcu_fqs, > > */ > > TRACE_EVENT_RCU(rcu_dyntick, > > > > - TP_PROTO(const char *polarity, long oldnesting, long newnesting, atomic_t dynticks), > > + TP_PROTO(const char *polarity, long oldnesting, long newnesting, int dynticks), > > > > TP_ARGS(polarity, oldnesting, newnesting, dynticks), > > > > @@ -457,7 +457,7 @@ TRACE_EVENT_RCU(rcu_dyntick, > > __entry->polarity = polarity; > > __entry->oldnesting = oldnesting; > > __entry->newnesting = newnesting; > > - __entry->dynticks = atomic_read(&dynticks); > > + __entry->dynticks = dynticks; > > ), > > > > TP_printk("%s %lx %lx %#3x", __entry->polarity, > > diff --git a/kernel/rcu/tree.c b/kernel/rcu/tree.c > > index 81105141b6a8..62e59596a30a 100644 > > --- a/kernel/rcu/tree.c > > +++ b/kernel/rcu/tree.c > > @@ -576,7 +576,7 @@ static void rcu_eqs_enter(bool user) > > } > > > > lockdep_assert_irqs_disabled(); > > - trace_rcu_dyntick(TPS("Start"), rdp->dynticks_nesting, 0, rdp->dynticks); > > + trace_rcu_dyntick(TPS("Start"), rdp->dynticks_nesting, 0, atomic_read(&rdp->dynticks)); > > WARN_ON_ONCE(IS_ENABLED(CONFIG_RCU_EQS_DEBUG) && !user && !is_idle_task(current)); > > rdp = this_cpu_ptr(&rcu_data); > > do_nocb_deferred_wakeup(rdp); > > @@ -649,14 +649,15 @@ static __always_inline void rcu_nmi_exit_common(bool irq) > > * leave it in non-RCU-idle state. > > */ > > if (rdp->dynticks_nmi_nesting != 1) { > > - trace_rcu_dyntick(TPS("--="), rdp->dynticks_nmi_nesting, rdp->dynticks_nmi_nesting - 2, rdp->dynticks); > > + trace_rcu_dyntick(TPS("--="), rdp->dynticks_nmi_nesting, rdp->dynticks_nmi_nesting - 2, > > + atomic_read(&rdp->dynticks)); > > WRITE_ONCE(rdp->dynticks_nmi_nesting, /* No store tearing. */ > > rdp->dynticks_nmi_nesting - 2); > > return; > > } > > > > /* This NMI interrupted an RCU-idle CPU, restore RCU-idleness. */ > > - trace_rcu_dyntick(TPS("Startirq"), rdp->dynticks_nmi_nesting, 0, rdp->dynticks); > > + trace_rcu_dyntick(TPS("Startirq"), rdp->dynticks_nmi_nesting, 0, atomic_read(&rdp->dynticks)); > > WRITE_ONCE(rdp->dynticks_nmi_nesting, 0); /* Avoid store tearing. */ > > > > if (irq) > > @@ -743,7 +744,7 @@ static void rcu_eqs_exit(bool user) > > rcu_dynticks_task_exit(); > > rcu_dynticks_eqs_exit(); > > rcu_cleanup_after_idle(); > > - trace_rcu_dyntick(TPS("End"), rdp->dynticks_nesting, 1, rdp->dynticks); > > + trace_rcu_dyntick(TPS("End"), rdp->dynticks_nesting, 1, atomic_read(&rdp->dynticks)); > > WARN_ON_ONCE(IS_ENABLED(CONFIG_RCU_EQS_DEBUG) && !user && !is_idle_task(current)); > > WRITE_ONCE(rdp->dynticks_nesting, 1); > > WARN_ON_ONCE(rdp->dynticks_nmi_nesting); > > @@ -827,7 +828,7 @@ static __always_inline void rcu_nmi_enter_common(bool irq) > > } > > trace_rcu_dyntick(incby == 1 ? TPS("Endirq") : TPS("++="), > > rdp->dynticks_nmi_nesting, > > - rdp->dynticks_nmi_nesting + incby, rdp->dynticks); > > + rdp->dynticks_nmi_nesting + incby, atomic_read(&rdp->dynticks)); > > WRITE_ONCE(rdp->dynticks_nmi_nesting, /* Prevent store tearing. */ > > rdp->dynticks_nmi_nesting + incby); > > barrier(); > > -- > > 2.23.0.581.g78d2f28ef7-goog > > > >