Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp5017029ybb; Tue, 24 Mar 2020 09:25:03 -0700 (PDT) X-Google-Smtp-Source: ADFU+vuibAMgmNntBVubj9Xa5mSDUSC/IMeG9GhYOcw1ISG9c2ru8ZS4UDkkrbljfSAktqH+64Tt X-Received: by 2002:aca:de84:: with SMTP id v126mr3634375oig.137.1585067103083; Tue, 24 Mar 2020 09:25:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585067103; cv=none; d=google.com; s=arc-20160816; b=O6DAPiV5N6WZhTAjtYtvVYL7JtJhrXVLKnpLArPG61yRR4tvTdQG7FGZEvg/j0NWwM yCtUlS1iJt/JCAnyyVQETC9uLyLMTDa319Hd3IWjL1iav28wjGl9u32IFnmPrACRZl2H fIeSenhkiuuHPpvsHTpQarNDZfKthJWVFVJQu+8Isn8yV0fG6C5bPyY505BKHyW4KcJL Dk1+L4sH5d53N/i5NsNmvDk77ASFboPSk7HbOYFhhUo36vcu6D0+319HTZiphUA+wyV+ ozQMEaQg7oC1IWVpapcwVL/oXQJyOZ1WkgE7UxRr1BCNmP/a/jeac61RKtKtjRBdT2l2 Gm0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=bmrR+6P0T9fHgGZsbiFrTmDeS2rx+GhVlz+ne+F87k4=; b=S7+Lo4plLtEJVP7CpfFy11PsgOAL85JC04AaaCz5BbsmRI8I8N+yluTYNu4s2LFq3b lcdpIQJlHEoojDAZoH359iujEXte4DWgcW8pxHcHEO0ycyngSEHlc9Y5aZGekYv4GhAy 5CjJ1JOLC76nN6vym1/BfzFDhV8e5f35OEnSZxcZZ/1+B7SuA1vvTjc9nMeTJKFYuV+X ovZnc5qIZAzffEffa0cBn48NolQ/7J49BxwwQfw/p4InqprQTXY04w10SxOfHzrSwUot MPU3YzLRgFrRuRiNf7DHxM/af8f/oJKOPLWPROtkBNumO5XLI9EAbFR+6v1NZjgbKkVz mG8Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=AlJXW4lv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c8si3578730otk.67.2020.03.24.09.24.49; Tue, 24 Mar 2020 09:25:03 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=AlJXW4lv; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727948AbgCXQXq (ORCPT + 99 others); Tue, 24 Mar 2020 12:23:46 -0400 Received: from mail-oi1-f195.google.com ([209.85.167.195]:40781 "EHLO mail-oi1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727133AbgCXQXp (ORCPT ); Tue, 24 Mar 2020 12:23:45 -0400 Received: by mail-oi1-f195.google.com with SMTP id y71so18990674oia.7 for ; Tue, 24 Mar 2020 09:23:43 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=bmrR+6P0T9fHgGZsbiFrTmDeS2rx+GhVlz+ne+F87k4=; b=AlJXW4lvwKjh98zDcnGMjWN/G2d4az2n2nwlYoLI/ymnLJqGIf8HJ+1yOfdljW7fse OPSIDDmHoTllb9HeQn3MSCu5uriWphlynSyeziolFUYakiZnaKJQ2CCpQJFTGinZ0IVB wStcyt7P6QwbH2r+sXzrkqGUTCL7h8/u2NjJmOhyWV/C3KcgUM0a6kOuoSd5g+Gm/Pfj zdNIgJK9bYporXWUgmqvNaBaMPRbWSse3BVWUQeJL71cYCO5f1zvILnPul09KFSTLDdB 1IM03y2ZlZSMhgJ0r9b7u3dwluYURW/Oazn13up86FjFSRy/+hr7IaInTJtcBs9eGwTo Aisg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=bmrR+6P0T9fHgGZsbiFrTmDeS2rx+GhVlz+ne+F87k4=; b=bUZuPlLsPS+cC2U5nqd/IcUbAiv6am5eX8rc47/x7itfndxigm8XoB8xNrHKxYQkf6 rP5jxTDRH+8M16QPvKDjIcudEpfNDF1POBGhozZa9Yf3zFI6FTic2nAedl8HauEESjjn D2RpBXm0g/EdRzKhqoH/wKof0OHSb0Cv3Hl0mpfBfYYsIbVBY45bgTyF7DmjTierEio4 Ld8kotUSNfAMnmUbArDo1dacjHwr0HM0tZ+zJQxY8JUyAnRHL+hMnFDeJGyxmzebFVYW UOEHEUKDtn79RjSkT5BRo3+yPfqxj/tFs4oCO/I8BqAStG9tv8Cn+LEhli9vKUBPVW67 azQw== X-Gm-Message-State: ANhLgQ3hxoyOEtXg7ishsiYEi3t/cAWDWnGH/LX3zROj2QlzU1DTsOhv mrJsw8Cyr+LUca6voLjgkZbxlcH8qTczDTp/jNrJPA== X-Received: by 2002:aca:3089:: with SMTP id w131mr4090746oiw.121.1585067023352; Tue, 24 Mar 2020 09:23:43 -0700 (PDT) MIME-Version: 1.0 References: <20200324153643.15527-1-will@kernel.org> <20200324153643.15527-4-will@kernel.org> In-Reply-To: <20200324153643.15527-4-will@kernel.org> From: Marco Elver Date: Tue, 24 Mar 2020 17:23:30 +0100 Message-ID: Subject: Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race() To: Will Deacon Cc: LKML , Eric Dumazet , Jann Horn , Kees Cook , Maddie Stone , "Paul E . McKenney" , Peter Zijlstra , Thomas Gleixner , kernel-team@android.com, kernel-hardening@lists.openwall.com Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 24 Mar 2020 at 16:37, Will Deacon wrote: > > Some list predicates can be used locklessly even with the non-RCU list > implementations, since they effectively boil down to a test against > NULL. For example, checking whether or not a list is empty is safe even > in the presence of a concurrent, tearing write to the list head pointer. > Similarly, checking whether or not an hlist node has been hashed is safe > as well. > > Annotate these lockless list predicates with data_race() and READ_ONCE() > so that KCSAN and the compiler are aware of what's going on. The writer > side can then avoid having to use WRITE_ONCE() in the non-RCU > implementation. > > Cc: Paul E. McKenney > Cc: Peter Zijlstra > Cc: Marco Elver > Signed-off-by: Will Deacon > --- > include/linux/list.h | 10 +++++----- > include/linux/list_bl.h | 5 +++-- > include/linux/list_nulls.h | 6 +++--- > include/linux/llist.h | 2 +- > 4 files changed, 12 insertions(+), 11 deletions(-) > > diff --git a/include/linux/list.h b/include/linux/list.h > index 4fed5a0f9b77..4d9f5f9ed1a8 100644 > --- a/include/linux/list.h > +++ b/include/linux/list.h > @@ -279,7 +279,7 @@ static inline int list_is_last(const struct list_head *list, > */ > static inline int list_empty(const struct list_head *head) > { > - return READ_ONCE(head->next) == head; > + return data_race(READ_ONCE(head->next) == head); Double-marking should never be necessary, at least if you want to make KCSAN happy. From what I gather there is an unmarked write somewhere, correct? In that case, KCSAN will still complain because if it sees a race between this read and the other write, then at least one is still plain (the write). Then, my suggestion would be to mark the write with data_race() and just leave this as a READ_ONCE(). Having a data_race() somewhere only makes KCSAN stop reporting the race if the paired access is also marked (be it with data_race() or _ONCE, etc.). Alternatively, if marking the write is impossible, you can surround the access with kcsan_disable_current()/kcsan_enable_current(). Or, as a last resort, just leaving as-is is fine too, because KCSAN's default config (still) has KCSAN_ASSUME_PLAIN_WRITES_ATOMIC selected. Thanks, -- Marco > } > > /** > @@ -524,7 +524,7 @@ static inline void list_splice_tail_init(struct list_head *list, > */ > #define list_first_entry_or_null(ptr, type, member) ({ \ > struct list_head *head__ = (ptr); \ > - struct list_head *pos__ = READ_ONCE(head__->next); \ > + struct list_head *pos__ = data_race(READ_ONCE(head__->next)); \ > pos__ != head__ ? list_entry(pos__, type, member) : NULL; \ > }) > > @@ -772,13 +772,13 @@ static inline void INIT_HLIST_NODE(struct hlist_node *h) > * hlist_unhashed - Has node been removed from list and reinitialized? > * @h: Node to be checked > * > - * Not that not all removal functions will leave a node in unhashed > + * Note that not all removal functions will leave a node in unhashed > * state. For example, hlist_nulls_del_init_rcu() does leave the > * node in unhashed state, but hlist_nulls_del() does not. > */ > static inline int hlist_unhashed(const struct hlist_node *h) > { > - return !READ_ONCE(h->pprev); > + return data_race(!READ_ONCE(h->pprev)); > } > > /** > @@ -787,7 +787,7 @@ static inline int hlist_unhashed(const struct hlist_node *h) > */ > static inline int hlist_empty(const struct hlist_head *h) > { > - return !READ_ONCE(h->first); > + return data_race(!READ_ONCE(h->first)); > } > > static inline void __hlist_del(struct hlist_node *n) > diff --git a/include/linux/list_bl.h b/include/linux/list_bl.h > index ae1b541446c9..1804fdb84dda 100644 > --- a/include/linux/list_bl.h > +++ b/include/linux/list_bl.h > @@ -51,7 +51,7 @@ static inline void INIT_HLIST_BL_NODE(struct hlist_bl_node *h) > > static inline bool hlist_bl_unhashed(const struct hlist_bl_node *h) > { > - return !h->pprev; > + return data_race(!READ_ONCE(h->pprev)); > } > > static inline struct hlist_bl_node *hlist_bl_first(struct hlist_bl_head *h) > @@ -71,7 +71,8 @@ static inline void hlist_bl_set_first(struct hlist_bl_head *h, > > static inline bool hlist_bl_empty(const struct hlist_bl_head *h) > { > - return !((unsigned long)READ_ONCE(h->first) & ~LIST_BL_LOCKMASK); > + unsigned long first = data_race((unsigned long)READ_ONCE(h->first)); > + return !(first & ~LIST_BL_LOCKMASK); > } > > static inline void hlist_bl_add_head(struct hlist_bl_node *n, > diff --git a/include/linux/list_nulls.h b/include/linux/list_nulls.h > index 3a9ff01e9a11..fa51a801bf32 100644 > --- a/include/linux/list_nulls.h > +++ b/include/linux/list_nulls.h > @@ -60,18 +60,18 @@ static inline unsigned long get_nulls_value(const struct hlist_nulls_node *ptr) > * hlist_nulls_unhashed - Has node been removed and reinitialized? > * @h: Node to be checked > * > - * Not that not all removal functions will leave a node in unhashed state. > + * Note that not all removal functions will leave a node in unhashed state. > * For example, hlist_del_init_rcu() leaves the node in unhashed state, > * but hlist_nulls_del() does not. > */ > static inline int hlist_nulls_unhashed(const struct hlist_nulls_node *h) > { > - return !READ_ONCE(h->pprev); > + return data_race(!READ_ONCE(h->pprev)); > } > > static inline int hlist_nulls_empty(const struct hlist_nulls_head *h) > { > - return is_a_nulls(READ_ONCE(h->first)); > + return data_race(is_a_nulls(READ_ONCE(h->first))); > } > > static inline void hlist_nulls_add_head(struct hlist_nulls_node *n, > diff --git a/include/linux/llist.h b/include/linux/llist.h > index 2e9c7215882b..c7f042b73899 100644 > --- a/include/linux/llist.h > +++ b/include/linux/llist.h > @@ -186,7 +186,7 @@ static inline void init_llist_head(struct llist_head *list) > */ > static inline bool llist_empty(const struct llist_head *head) > { > - return READ_ONCE(head->first) == NULL; > + return data_race(READ_ONCE(head->first) == NULL); > } > > static inline struct llist_node *llist_next(struct llist_node *node) > -- > 2.20.1 >