Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp874675ybz; Fri, 24 Apr 2020 10:41:39 -0700 (PDT) X-Google-Smtp-Source: APiQypKFhfbAyszxR5HXE+yjbhhxkCDYUs6SHdNWzp/OT1cBNITxOfP/BPopHTIre7U9eK0N0SxF X-Received: by 2002:a05:6402:b2a:: with SMTP id bo10mr8729606edb.366.1587750099485; Fri, 24 Apr 2020 10:41:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1587750099; cv=none; d=google.com; s=arc-20160816; b=LLUZxdMHsQq/4WrdP7+u4uSuFG2AQ3MIcq2clQcqFkhu5fMPLizkl+cm5HpAJlQ+3w r3X1FqHe/4+PEnUQhZ1WQyUU3QOvH3VznK2R4K1lxz2iDUPpAem/+wkeqL5cV7XBkTqY NM6qO/mt5zWo/yyQ+gxTodf6Tkr6a/7DloBWuhnC/d19OEvTRHNlcSzyyFydzPUscKGn BQX3jhWyywqgSRr+4sPuPKOS0nOR2RKjiMP7LhAuHy0WmW+wB4tpuG8ibIE3pCEUy+Q0 YugU91URTcJvtxM8MOK4aRxySlLCLanrNIqnTKJor7/PV3GGMMsYflU2GteCZJN6simj edqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=LZO0eSlb7nXnjoxion/DOCE/paBUinhHhtTGtYB11+w=; b=a4oDisq+ci6SUwfcSlUaJSQasVMWwQV98v+dk/YexQxIGRK9+oYpveWwXhxhCGvCCm ssJPb9JBabVXCBJR15RsG8xXB8E05S20MtB0ETTpwRNzN+vNqlMH+WXf827aJmWN33YL dd51r7WLoV2kSSr3EB+sfxqZwc+SaqONdb+jufyS/RLMFTgaB7IjWVNRm3p1nUYD2a2n s5ypo5tadi0Q8RL4w49NXAq1gMJ0zKBNwg/oT8janQfl5cyjgrAg7glzbUJn/ggp/kSH 1+/Vhxw7TkyE4hKwOSTxQSRa51RhmOJ/5wUcr+Lsu1X3+WVd8yldxargwcMrAvqmxVBa v8Pg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Zm+H2R6y; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j18si3768278edj.12.2020.04.24.10.41.16; Fri, 24 Apr 2020 10:41:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Zm+H2R6y; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728912AbgDXRjl (ORCPT + 99 others); Fri, 24 Apr 2020 13:39:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:43620 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728826AbgDXRjj (ORCPT ); Fri, 24 Apr 2020 13:39:39 -0400 Received: from willie-the-truck (236.31.169.217.in-addr.arpa [217.169.31.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8755A20736; Fri, 24 Apr 2020 17:39:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1587749978; bh=ykdr8Ad8jl8gHvtaRn/WVhFxDPP4Du64k/eazMGYOcg=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=Zm+H2R6y6P9TayzzrFFqaP9FIGHRcB5Zf9vvEDfKBAa6HRNHevNmJoa9cD2B46+de ZI+jYRehLuoBGmabynajkJb7OUlD6KpgjQ8k0bDc8XQDc0QaY7FzSXVdr0j918B5gG dtpAwTMmv2RPzj/xWWZd7COR04RQ5XSNv7tuatCo= Date: Fri, 24 Apr 2020 18:39:33 +0100 From: Will Deacon To: "Paul E. McKenney" Cc: Jann Horn , Peter Zijlstra , kernel list , Eric Dumazet , Kees Cook , Maddie Stone , Marco Elver , Thomas Gleixner , kernel-team , Kernel Hardening , Oleg Nesterov Subject: Re: [RFC PATCH 03/21] list: Annotate lockless list primitives with data_race() Message-ID: <20200424173932.GK21141@willie-the-truck> References: <20200324153643.15527-1-will@kernel.org> <20200324153643.15527-4-will@kernel.org> <20200324165128.GS20696@hirez.programming.kicks-ass.net> <20200324213200.GA21176@willie-the-truck> <20200330231315.GZ19865@paulmck-ThinkPad-P72> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200330231315.GZ19865@paulmck-ThinkPad-P72> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Mar 30, 2020 at 04:13:15PM -0700, Paul E. McKenney wrote: > On Tue, Mar 24, 2020 at 09:32:01PM +0000, Will Deacon wrote: > > [mutt crashed while I was sending this; apologies if you receive it twice] > > > > On Tue, Mar 24, 2020 at 05:56:15PM +0100, Jann Horn wrote: > > > On Tue, Mar 24, 2020 at 5:51 PM Peter Zijlstra wrote: > > > > On Tue, Mar 24, 2020 at 03:36:25PM +0000, Will Deacon wrote: > > > > > diff --git a/include/linux/list.h b/include/linux/list.h > > > > > index 4fed5a0f9b77..4d9f5f9ed1a8 100644 > > > > > --- a/include/linux/list.h > > > > > +++ b/include/linux/list.h > > > > > @@ -279,7 +279,7 @@ static inline int list_is_last(const struct list_head *list, > > > > > */ > > > > > static inline int list_empty(const struct list_head *head) > > > > > { > > > > > - return READ_ONCE(head->next) == head; > > > > > + return data_race(READ_ONCE(head->next) == head); > > > > > } > > > > > > > > list_empty() isn't lockless safe, that's what we have > > > > list_empty_careful() for. > > > > > > That thing looks like it could also use some READ_ONCE() sprinkled in... > > > > Crikey, how did I miss that? I need to spend some time understanding the > > ordering there. > > > > So it sounds like the KCSAN splats relating to list_empty() and loosely > > referred to by 1c97be677f72 ("list: Use WRITE_ONCE() when adding to lists > > and hlists") are indicative of real bugs and we should actually restore > > list_empty() to its former glory prior to 1658d35ead5d ("list: Use > > READ_ONCE() when testing for empty lists"). Alternatively, assuming > > list_empty_careful() does what it says on the tin, we could just make that > > the default. > > The list_empty_careful() function (suitably annotated) returns false if > the list is non-empty, including when it is in the process of becoming > either empty or non-empty. It would be fine for the lockless use cases > I have come across. Hmm, I had a look at the implementation and I'm not at all convinced that it's correct. First of all, the comment above it states: * NOTE: using list_empty_careful() without synchronization * can only be safe if the only activity that can happen * to the list entry is list_del_init(). Eg. it cannot be used * if another CPU could re-list_add() it. but it seems that people disregard this note and instead use it as a general-purpose lockless test, taking a lock and rechecking if it returns non-empty. It would also mean we'd have to keep the WRITE_ONCE() in INIT_LIST_HEAD, which is something that I've been trying to remove. In the face of something like a concurrent list_add(); list_add_tail() sequence, then the tearing writes to the head->{prev,next} pointers could cause list_empty_careful() to indicate that the list is momentarily empty. I've started looking at whether we can use a NULL next pointer to indicate an empty list, which might allow us to kill the __list_del_clearprev() hack at the same time, but I've not found enough time to really get my teeth into it yet. Will