Received: by 2002:ab2:6a05:0:b0:1f8:1780:a4ed with SMTP id w5csp2721721lqo; Tue, 14 May 2024 07:22:57 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCUGHsAatZjFUyo1vHaNd3p/1EjSj6Oi1UbZ4p/ea2QYu75MCeP30rjMt8SfFwyAoxngTb5Vy9OhR26OM85YrIo2AClnZzpKm8ejLkyd7A== X-Google-Smtp-Source: AGHT+IG5fzt3c7APz9nH6OqH03bNguG+sxFShox8cToQpvZan9mG2NlEnlr3xdAE5IWIgtjOzblb X-Received: by 2002:a05:6a20:7f96:b0:1af:593a:c820 with SMTP id adf61e73a8af0-1afd14919a1mr20491983637.31.1715696576809; Tue, 14 May 2024 07:22:56 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1715696576; cv=pass; d=google.com; s=arc-20160816; b=JzfdOpJdJz0bogbwWnFC4fw+fABTl5J76NOn46vLqfFRmzu0P8TEcCELn/USz9oLmH zjokoyXzBLxEbv9CjrLyxDNW5d3lX/fRvVSml7j6ZIE0BrAva8SWtwNkkCts5rVg4Kxv giiEzKE/Wk9XcxWL8C9ckniR2A3MkDFkYJrL/1kQr2n6oEpH/JPmqfbBvKeb9WPFxg8h 3OEFG4bsAa7IkQDtnNApO0w11g4v5eDbCUZELCfilED4nGsSAx0QkgL97GN5XilmM95o VQLWKBaZaDXUyuwKRuYwdFJjymhKewmDphK6jLPBPRtsJJUMk2PYYch3UYHSLgB1XGI3 0ntA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=7RVNCZ58SSfW0Eus7bjU8Ojcpdr84/Teirw1IhHXVco=; fh=UiL34Q0WPCgH6CeLEH8QqGiCTPSI88HZOj/mxkc4gcY=; b=kaRxW+SczQYGPUMIP9xRgOZgacL2/GOBg9j7gETPK6HHbs/ZSrpRRArjRhKotEGg3/ giKe3j6tb6oB3bebFk6SyHLMZ2rQS/tgcKAkpTL/7lwp5hcB4Bju8szYkvL6lAaTRbvl YVgTGYnwD5uzPfQiNVevAz/ndnbqxiufypYFxTRgwU7u9H1fW97/KI+QXAA6sDFS8ERu z5Fv7eo0xQ278xcCOFhFkEsZgl4qfTr844/THRGG5bnNOX24bZKK/mAiaoxT1JgBLdLb 65lssmFKblBaRuGU1vkV4jW0zBsba0nqeJAkeChAFD4pIXYxziXKI5eW9ZtntnageStR JS3w==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=X6HDO94R; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-178797-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-178797-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id 41be03b00d2f7-6340b2a0d14si12065210a12.246.2024.05.14.07.22.56 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 14 May 2024 07:22:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-178797-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=X6HDO94R; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-178797-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-178797-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 656922810BE for ; Tue, 14 May 2024 14:22:56 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 448D0144D34; Tue, 14 May 2024 14:22:49 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="X6HDO94R" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 5273C139589; Tue, 14 May 2024 14:22:48 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715696568; cv=none; b=p5mWe8ecF7WLpwanXkYawhxQliMhVF/5BvaFMqVEMiCGbY8aobui9cmgfz87Eo+oiPONhuoKGB8ekyDCzerUbWZHqnE/+PUMM4PoBzPEwyDqWz/rnsvbZA2BVekFH+cmwFxTzTElVcfJOcxAIiP90AfhxwXFB32bRfLvVxqOdTI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1715696568; c=relaxed/simple; bh=aR6mJ0hUjWaoRL/cDKUePaTSaotEpb0u/n7K8LdoQ3M=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=Z5awuMo20Uzhfrh5S86a8Ganm5o1AQNwqObfo20HIBDfqIP9kl8QBg8C2d0B0NpxGlhAxYlFEKiwZUhOB7lDvXRuyR3HdMKxcdeVEhY9euiRyKnLECtOa/KmF8eSYYynamUFrT17zGo2NoK4WWbLZyyADuMhOJdgc4UQJ51u4gY= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=X6HDO94R; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 22987C2BD10; Tue, 14 May 2024 14:22:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1715696568; bh=aR6mJ0hUjWaoRL/cDKUePaTSaotEpb0u/n7K8LdoQ3M=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=X6HDO94R7j4ypeQaRVkDn24Pr4VzbzT8R2HaIhlmkRZLmwdoMqpcGP0ZbCTWdUoEg kS6TbpF1bgmHdjOk30BdwnXs4RS9c9QGTc/HVqRxFNdEQ8UMQHeVa9IOtpu4QSsdT1 4NnZJQQIZb33AtBdZyMTMHOjACthEc7xek+GQn9DUa+OjYQrm9YLCJZOfvd/ivsSFM j/lkqdRnYl0msMarGPjn1r3hvR6nPdHn1UThOE4JpPv8q8tKLlyZeFA5wZZCSUq5HG u7ZUBFCWk+eguVIUxQvn1+gVb8QABIf5g2r2rC4maeUJzIjIKMc+I/BeTzyZmGbcet UseGxl4WawBTA== Received: by paulmck-ThinkPad-P17-Gen-1.home (Postfix, from userid 1000) id 5764DCE0443; Tue, 14 May 2024 07:22:47 -0700 (PDT) Date: Tue, 14 May 2024 07:22:47 -0700 From: "Paul E. McKenney" To: Boqun Feng Cc: linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, elver@google.com, akpm@linux-foundation.org, tglx@linutronix.de, peterz@infradead.org, dianders@chromium.org, pmladek@suse.com, arnd@arndb.de, torvalds@linux-foundation.org, kernel-team@meta.com, Mark Rutland Subject: Re: [PATCH v2 cmpxchg 09/13] lib: Add one-byte emulation function Message-ID: <29f1d801-9fb4-4ecb-8d5e-cecb7d7a76e1@paulmck-laptop> Reply-To: paulmck@kernel.org References: <20240501230130.1111603-9-paulmck@kernel.org> <9f0ff126-2806-488e-97cc-7258eff0c574@paulmck-laptop> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Mon, May 13, 2024 at 02:19:37PM -0700, Boqun Feng wrote: > On Mon, May 13, 2024 at 08:57:16AM -0700, Boqun Feng wrote: > > On Mon, May 13, 2024 at 08:41:27AM -0700, Paul E. McKenney wrote: > > [...] > > > > > +#include > > > > > +#include > > > > > +#include > > > > > +#include > > > > > +#include > > > > > +#include > > > > > +#include > > > > > +#include > > > > > + > > > > > +union u8_32 { > > > > > + u8 b[4]; > > > > > + u32 w; > > > > > +}; > > > > > + > > > > > +/* Emulate one-byte cmpxchg() in terms of 4-byte cmpxchg. */ > > > > > +uintptr_t cmpxchg_emu_u8(volatile u8 *p, uintptr_t old, uintptr_t new) > > > > > +{ > > > > > + u32 *p32 = (u32 *)(((uintptr_t)p) & ~0x3); > > > > > + int i = ((uintptr_t)p) & 0x3; > > > > > + union u8_32 old32; > > > > > + union u8_32 new32; > > > > > + u32 ret; > > > > > + > > > > > + ret = READ_ONCE(*p32); > > > > > + do { > > > > > + old32.w = ret; > > > > > + if (old32.b[i] != old) > > > > > + return old32.b[i]; > > > > > + new32.w = old32.w; > > > > > + new32.b[i] = new; > > > > > + instrument_atomic_read_write(p, 1); > > > > > + ret = data_race(cmpxchg(p32, old32.w, new32.w)); // Overridden above. > > > > > > > > Just out of curiosity, why is this `data_race` needed? cmpxchg is atomic > > > > so there should be no chance for a data race? > > > > > > That is what I thought, too. ;-) > > > > > > The problem is that the cmpxchg() covers 32 bits, and so without that > > > data_race(), KCSAN would complain about data races with perfectly > > > legitimate concurrent accesses to the other three bytes. > > > > > > The instrument_atomic_read_write(p, 1) beforehand tells KCSAN to complain > > > about concurrent accesses, but only to that one byte. > > > > > > > Oh, I see. For that purpose, maybe we can just use raw_cmpxchg() here, > > i.e. a cmpxchg() without any instrument in it. Cc Mark in case I'm > > missing something. > > > > I just realized that the KCSAN instrumentation is already done in > cmpxchg() layer: > > #define cmpxchg(ptr, ...) \ > ({ \ > typeof(ptr) __ai_ptr = (ptr); \ > kcsan_mb(); \ > instrument_atomic_read_write(__ai_ptr, sizeof(*__ai_ptr)); \ > raw_cmpxchg(__ai_ptr, __VA_ARGS__); \ > }) > > and, this function is lower in the layer, so it shouldn't have the > instrumentation itself. How about the following (based on today's RCU > dev branch)? The raw_cmpxchg() looks nicer than the added data_race()! One question below, though. Thanx, Paul > Regards, > Boqun > > -------------------------------------------->8 > Subject: [PATCH] lib: cmpxchg-emu: Make cmpxchg_emu_u8() noinstr > > Currently, cmpxchg_emu_u8() is called via cmpxchg() or raw_cmpxchg() > which already makes the instrumentation decision: > > * cmpxchg() case: > > cmpxchg(): > kcsan_mb(); > instrument_atomic_read_write(...); > raw_cmpxchg(): > arch_cmpxchg(): > cmpxchg_emu_u8(); > > ... should have KCSAN instrumentation. > > * raw_cmpxchg() case: > > raw_cmpxchg(): > arch_cmpxchg(): > cmpxchg_emu_u8(); > > ... shouldn't have KCSAN instrumentation. > > Therefore it's redundant to put KCSAN instrumentation in > cmpxchg_emu_u8() (along with the data_race() to get away the > instrumentation). > > So make cmpxchg_emu_u8() a noinstr function, and remove the KCSAN > instrumentation inside it. > > Signed-off-by: Boqun Feng > --- > include/linux/cmpxchg-emu.h | 4 +++- > lib/cmpxchg-emu.c | 14 ++++++++++---- > 2 files changed, 13 insertions(+), 5 deletions(-) > > diff --git a/include/linux/cmpxchg-emu.h b/include/linux/cmpxchg-emu.h > index 998deec67740..c4c85f41d9f4 100644 > --- a/include/linux/cmpxchg-emu.h > +++ b/include/linux/cmpxchg-emu.h > @@ -10,6 +10,8 @@ > #ifndef __LINUX_CMPXCHG_EMU_H > #define __LINUX_CMPXCHG_EMU_H > > -uintptr_t cmpxchg_emu_u8(volatile u8 *p, uintptr_t old, uintptr_t new); > +#include > + > +noinstr uintptr_t cmpxchg_emu_u8(volatile u8 *p, uintptr_t old, uintptr_t new); > > #endif /* __LINUX_CMPXCHG_EMU_H */ > diff --git a/lib/cmpxchg-emu.c b/lib/cmpxchg-emu.c > index 27f6f97cb60d..788c22cd4462 100644 > --- a/lib/cmpxchg-emu.c > +++ b/lib/cmpxchg-emu.c > @@ -21,8 +21,13 @@ union u8_32 { > u32 w; > }; > > -/* Emulate one-byte cmpxchg() in terms of 4-byte cmpxchg. */ > -uintptr_t cmpxchg_emu_u8(volatile u8 *p, uintptr_t old, uintptr_t new) > +/* > + * Emulate one-byte cmpxchg() in terms of 4-byte cmpxchg. > + * > + * This function is marked as 'noinstr' as the instrumentation should be done at > + * outer layer. > + */ > +noinstr uintptr_t cmpxchg_emu_u8(volatile u8 *p, uintptr_t old, uintptr_t new) > { > u32 *p32 = (u32 *)(((uintptr_t)p) & ~0x3); > int i = ((uintptr_t)p) & 0x3; > @@ -37,8 +42,9 @@ uintptr_t cmpxchg_emu_u8(volatile u8 *p, uintptr_t old, uintptr_t new) > return old32.b[i]; > new32.w = old32.w; > new32.b[i] = new; > - instrument_atomic_read_write(p, 1); Don't we need to keep that instrument_atomic_read_write() in order to allow KCSAN to detect data races with plain C-language reads? Or is that being handled some other way? > - ret = data_race(cmpxchg(p32, old32.w, new32.w)); // Overridden above. > + > + // raw_cmpxchg() is used here to avoid instrumentation. > + ret = raw_cmpxchg(p32, old32.w, new32.w); // Overridden above. > } while (ret != old32.w); > return old; > } > -- > 2.44.0 >