Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp5291085ybb; Tue, 24 Mar 2020 14:35:50 -0700 (PDT) X-Google-Smtp-Source: ADFU+vv0znWwVMRdOMi6DPrDDWpuOSzf93Oc98NmxwVV+6xPgN+Iz47P5zSuK4Eogq5XjW6vlOeg X-Received: by 2002:a9d:3f49:: with SMTP id m67mr92131otc.315.1585085750408; Tue, 24 Mar 2020 14:35:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585085750; cv=none; d=google.com; s=arc-20160816; b=cML+kfZM8L1eCKJgDMw/sTFGp0CSex7L5icM81DtKXkkUGIrVw6r0msXrIHhzSfvO0 re+s3xof2c+0J43CH70pJXRGh6TfWtvNnuNcfcVjb6R2NFixmC62qw7yoB6ulCW7Br8z EAeK2dhSxfeDTsymn7dnupp/xn3KSwHVxMJ/DNrxXCpWklQhGO9sWpBxkoMW49LPNV58 b3FVYzxU9pVfnXQ0WESXy0DNh8DC1TwFv2y0skEMo+qQmO6iqYe5oMAWl/9t0BPzj9hp 54ivaDE5B4rAonh/KtAnoI6ajzvv740rwMG9MmRBTfwLfNqwZAjMzfhpwqu/oLmdBu4h AP4A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=VyW5JD6kq0MCj6T9/5PA/lnGHfZ8fJph4OXxRK611ag=; b=ja9ir9Bt1CRv3ZjHggZA+BcWccewJ1lW0Xg1xX2UuN+SgWvv5rPwXykK75i9gv8wOB hD5BCCNFdmgJXoib2zKWn9MA3Rh1Mh5R4DfT8h0EA4wuuM+WkYZC/MlFcGExf6dJ6Phm 6BHYVJn4NKYMK2EXQErRZxvnuLG2Y/eqjc2Qzr/mLQLYWmwFqqVZr9W1M/z/eSCpTymP McQZUwsdBbMQMl58/9YJzpTK3f1BxnoiTq/gZYA+1tDcw+Fl0McnfJhKSzSTKvCZ40kY bYbJgFYSOGzTdgarKBk0XGxD5u7CLbSRIV9Srptcc6bMiQSUunzt1+IczOxPuZnB0wYQ acRQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="iXKz/8wy"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r82si9727302oia.155.2020.03.24.14.35.36; Tue, 24 Mar 2020 14:35:50 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="iXKz/8wy"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728036AbgCXVd7 (ORCPT + 99 others); Tue, 24 Mar 2020 17:33:59 -0400 Received: from mail.kernel.org ([198.145.29.99]:57168 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727023AbgCXVd6 (ORCPT ); Tue, 24 Mar 2020 17:33:58 -0400 Received: from willie-the-truck (236.31.169.217.in-addr.arpa [217.169.31.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 41043206F6; Tue, 24 Mar 2020 21:33:56 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1585085638; bh=YSucMrRxtrynGJ/g9tDph2k08nv6kh3kh3Hl7TdUQPo=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=iXKz/8wy8p4KltD7XQjmmy52F9817kzLNOiw4klkv30Lpg690Ck3BR5pWPmOXvYTT 65/iPl6FiQNrWy8nDWzCtOh2lHQ2VCBp4DyOQADo7k+1qlTqsStcT0HN3HVZNR7MfY HZQqGk2p5wW29XzFJBh2XzyQ0tSzpezK2TzFy72Q= Date: Tue, 24 Mar 2020 21:33:53 +0000 From: Will Deacon To: Marco Elver Cc: LKML , Eric Dumazet , Jann Horn , Kees Cook , Maddie Stone , "Paul E . McKenney" , Peter Zijlstra , Thomas Gleixner , kernel-team@android.com, kernel-hardening@lists.openwall.com Subject: Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race() Message-ID: <20200324213352.GB21176@willie-the-truck> References: <20200324153643.15527-1-will@kernel.org> <20200324153643.15527-4-will@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Mar 24, 2020 at 05:23:30PM +0100, Marco Elver wrote: > On Tue, 24 Mar 2020 at 16:37, Will Deacon wrote: > > > > Some list predicates can be used locklessly even with the non-RCU list > > implementations, since they effectively boil down to a test against > > NULL. For example, checking whether or not a list is empty is safe even > > in the presence of a concurrent, tearing write to the list head pointer. > > Similarly, checking whether or not an hlist node has been hashed is safe > > as well. > > > > Annotate these lockless list predicates with data_race() and READ_ONCE() > > so that KCSAN and the compiler are aware of what's going on. The writer > > side can then avoid having to use WRITE_ONCE() in the non-RCU > > implementation. > > > > Cc: Paul E. McKenney > > Cc: Peter Zijlstra > > Cc: Marco Elver > > Signed-off-by: Will Deacon > > --- > > include/linux/list.h | 10 +++++----- > > include/linux/list_bl.h | 5 +++-- > > include/linux/list_nulls.h | 6 +++--- > > include/linux/llist.h | 2 +- > > 4 files changed, 12 insertions(+), 11 deletions(-) > > > > diff --git a/include/linux/list.h b/include/linux/list.h > > index 4fed5a0f9b77..4d9f5f9ed1a8 100644 > > --- a/include/linux/list.h > > +++ b/include/linux/list.h > > @@ -279,7 +279,7 @@ static inline int list_is_last(const struct list_head *list, > > */ > > static inline int list_empty(const struct list_head *head) > > { > > - return READ_ONCE(head->next) == head; > > + return data_race(READ_ONCE(head->next) == head); > > Double-marking should never be necessary, at least if you want to make > KCSAN happy. From what I gather there is an unmarked write somewhere, > correct? In that case, KCSAN will still complain because if it sees a > race between this read and the other write, then at least one is still > plain (the write). > > Then, my suggestion would be to mark the write with data_race() and > just leave this as a READ_ONCE(). Having a data_race() somewhere only > makes KCSAN stop reporting the race if the paired access is also > marked (be it with data_race() or _ONCE, etc.). > > Alternatively, if marking the write is impossible, you can surround > the access with kcsan_disable_current()/kcsan_enable_current(). Or, as > a last resort, just leaving as-is is fine too, because KCSAN's default > config (still) has KCSAN_ASSUME_PLAIN_WRITES_ATOMIC selected. Right, it looks like this is a bit of a smoking gun and we need to decide on whether list_empty() is actually usable without synchronisation first. Based on the outcome of that discussion, I'll update this patch accordingly. The main thing I want to avoid is marking parts of the non-RCU list implementation with data_race() or {READ,WRITE}_ONCE() because that's a sure-fire way to hide real bugs. Cheers, Will