Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp7033577ybf; Fri, 6 Mar 2020 09:06:02 -0800 (PST) X-Google-Smtp-Source: ADFU+vtgc7Js9ML+ohfPcDcrCTnUPe63/LSIIcaAlb0r1FWODClqFrPVdznA2i/5sy9mk6LWzUpH X-Received: by 2002:a05:6808:646:: with SMTP id z6mr3375489oih.163.1583514361935; Fri, 06 Mar 2020 09:06:01 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583514361; cv=none; d=google.com; s=arc-20160816; b=odUMpbmV7uD+zj6+V0q73QKXpCeGpfDQuCwsIeOYcC6CJPmnynn0b2jfJLAqUcMi0q ncUJFCdnGjt7JNUGqFaqDbnBTeQOt2omwJx6Enp2wKB9dJeTocbV++sywyGc4sdBm9qY AgxKWBmRw5pjh1icZRcJ/2An9pRhAgsvfX6y7TwAfUbdje7x+Xst0T22fahccxYcN12d jCF5UbxafKW9CMF5hHMd0LT+992VV+lhxB+00qOPZO7ZF3e2P3yf+ihSe7h6chg5ysjh RuSxwmX0WZrCxeqSqlti0NOrLYinBT03LEr08cXIIutZgUnx6UR+v9qVIkL6ebVseLjs Hizg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=O0O5EFC5sx0vzXbPvJ1vULxHyhFep5blREm0WiuE82E=; b=HqQpz4hw53UcvOatMNCZyP2cFa0krSaDXTxEirE6Ht6YYtYYfKrnhgsy9Rarq27aFa /2iwdVczPewb1sDILWX74J/KYyuohZwS0GL+4SH007sT0XG1aA96MXE5NGNOTmpSID1H n35d9Ug+GxRZ5lCchljNWBPZ+vhkaBOYXUQfYa8bLpYPmh5c7FV5gozRpXBBt8b8Z3SA zebRQQWiXaKeFqsDzdSUIRrWhEYCWkebI0rcgJT0zO1Eb86X6BE3uAeDngLaOASES3R2 6IwGtvWswXx0ujF6ixWAlpPWWJC1Dz/2CXfBgcKOU+dkiqmswRfvhFNVufkTm6FaMMVu ZWew== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mYeSYKg3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v26si1980166otn.318.2020.03.06.09.05.41; Fri, 06 Mar 2020 09:06:01 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=mYeSYKg3; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726485AbgCFRDS (ORCPT + 99 others); Fri, 6 Mar 2020 12:03:18 -0500 Received: from mail.kernel.org ([198.145.29.99]:55654 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725873AbgCFRDR (ORCPT ); Fri, 6 Mar 2020 12:03:17 -0500 Received: from paulmck-ThinkPad-P72.home (50-39-105-78.bvtn.or.frontiernet.net [50.39.105.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id ED957206E2; Fri, 6 Mar 2020 17:03:16 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1583514197; bh=1Yte6UkWxsbNdREhiZiPbohyajzUvT2/4rsnl6dsz1Y=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=mYeSYKg31vdljHcXbKlFIy3YdbtnKEG4+Tb7u5PDzHV9AJZ6oKo0Y5zCbY+DXznej HG16mI/cwhqjSeTqoh6lWsWLvZ70AzkeurqhmXfIkaeUL2lIgKjBS7eyPTETcLcezQ 6y9bFghK6KiRqmhEw7Hbw2W7XM3yncLpLA143M3U= Received: by paulmck-ThinkPad-P72.home (Postfix, from userid 1000) id CEB6735226BF; Fri, 6 Mar 2020 09:03:16 -0800 (PST) Date: Fri, 6 Mar 2020 09:03:16 -0800 From: "Paul E. McKenney" To: Matthew Wilcox Cc: Marco Elver , Qian Cai , LKML Subject: Re: [PATCH -next] lib: disable KCSAN for XArray Message-ID: <20200306170316.GX2935@paulmck-ThinkPad-P72> Reply-To: paulmck@kernel.org References: <20200304031551.1326-1-cai@lca.pw> <20200304033329.GZ29971@bombadil.infradead.org> <20200304040515.GX2935@paulmck-ThinkPad-P72> <20200304043356.GC29971@bombadil.infradead.org> <20200304141021.GY2935@paulmck-ThinkPad-P72> <20200305151831.GM29971@bombadil.infradead.org> <20200305213946.GL2935@paulmck-ThinkPad-P72> <20200306165300.GC25710@bombadil.infradead.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200306165300.GC25710@bombadil.infradead.org> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Mar 06, 2020 at 08:53:00AM -0800, Matthew Wilcox wrote: > On Fri, Mar 06, 2020 at 02:38:39PM +0100, Marco Elver wrote: > > On Thu, 5 Mar 2020 at 22:39, Paul E. McKenney wrote: > > > On Thu, Mar 05, 2020 at 07:18:31AM -0800, Matthew Wilcox wrote: > > > > I have found three locations where we use the ->marks array: > > > > > > > > 1. > > > > unsigned long data = *addr & (~0UL << offset); > > > > if (data) > > > > return __ffs(data); > > > > > > > > 2. > > > > return find_next_bit(addr, XA_CHUNK_SIZE, offset); > > > > 3. > > > > return test_bit(offset, node_marks(node, mark)); > > > > > > > > The modifications -- all done with the spinlock held -- use the non-atomic > > > > bitops: > > > > return __test_and_set_bit(offset, node_marks(node, mark)); > > > > return __test_and_clear_bit(offset, node_marks(node, mark)); > > > > bitmap_fill(node_marks(node, mark), XA_CHUNK_SIZE); > > > > (that last one doesn't really count -- it's done prior to placing the node > > > > in the tree) > > > > > > > > The first read seems straightforward; I can place a READ_ONCE around > > > > *addr. The second & third reads are rather less straightforward. > > > > find_next_bit() and test_bit() are common code and use plain loads today. > > > > > > Yes, those last two are a bit annoying, aren't they? I guess the first > > > thing would be placing READ_ONCE() inside them, and if that results in > > > regressions, have an alternative API for concurrent access? > > > > FWIW test_bit() is an "atomic" bitop (per atomic_bitops.txt), and > > KCSAN treats it as such. On x86 arch_test_bit() is not instrumented, > > and then in asm-generic/bitops/instrumented-non-atomic.h test_bit() is > > instrumented with instrument_atomic_read(). So on x86, things should > > already be fine for test_bit(). Not sure about other architectures. > > Hum. It may well be documented as atomic, but is it? Here's the > generic implementation: > > static inline int test_bit(int nr, const volatile unsigned long *addr) > { > return 1UL & (addr[BIT_WORD(nr)] >> (nr & (BITS_PER_LONG-1))); > } > > arch_test_bit is only used by the instrumented variants: > > $ git grep arch_test_bit include > include/asm-generic/bitops/instrumented-non-atomic.h: return arch_test_bit(nr, addr); > > As far as I can tell, the generic version is what's used on x86. Does > the 'volatile' qualifier save us here? > > find_next_bit() doesn't have the 'volatile' qualifier, so may still be > a problem? One approach would be to add the needed READ_ONCE(). Another, if someone is crazy enough to do the work, would be to verify that the code output is as if there was a READ_ONCE(). Thoughts? Thanx, Paul