[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANpmjNNkbWoqckyPfhq52W4WfJWR2=rt8WXzs+WXEZzv9xxL0g@mail.gmail.com>
Date: Wed, 13 Nov 2019 16:00:21 +0100
From: Marco Elver <elver@...gle.com>
To: Linus Torvalds <torvalds@...ux-foundation.org>
Cc: Eric Dumazet <edumazet@...gle.com>,
Alexei Starovoitov <alexei.starovoitov@...il.com>,
Alan Stern <stern@...land.harvard.edu>,
Eric Dumazet <eric.dumazet@...il.com>,
syzbot <syzbot+3ef049d50587836c0606@...kaller.appspotmail.com>,
linux-fsdevel <linux-fsdevel@...r.kernel.org>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
syzkaller-bugs <syzkaller-bugs@...glegroups.com>,
Al Viro <viro@...iv.linux.org.uk>,
Andrea Parri <parri.andrea@...il.com>,
"Paul E. McKenney" <paulmck@...nel.org>,
LKMM Maintainers -- Akira Yokosawa <akiyks@...il.com>
Subject: Re: KCSAN: data-race in __alloc_file / __alloc_file
On Wed, 13 Nov 2019 at 00:41, Linus Torvalds
<torvalds@...ux-foundation.org> wrote:
>
> On Tue, Nov 12, 2019 at 3:18 PM Eric Dumazet <edumazet@...gle.com> wrote:
> >
> > Hmm we have the ' volatile' attribute on jiffies, and it causes
> > confusion already :p
>
> The jiffies case is partly historical, but partly also because it's
> one of the very very few data structures where 99% of all uses are
> unlocked and for convenience reasons we really don't want to force
> those legacy cases to do anything special about it.
>
> "jiffies" really is very special for those kinds of legacy reasons.
> Look at the kinds of games we play with it on 32-bit architectures:
> the "real" storage is "jiffies_64", but nobody actually wants to use
> that, and because of load tearing issues it's actually hard to use
> too. So what everybody _uses_ is just the low 32 bits, and 'jiffies'
> isn't a real variable, it's done with linker tricks in our
> vmlinux.lds.S files. So, for example, on sparc32, you find this:
>
> jiffies = jiffies_64 + 4;
>
> in the vmlinux.lds.S file, because it's big-endian, and the lower 32
> bits are at offset 4 from the real 64-bit variable.
>
> Note that to actually read the "true" full 64-bit value, you have to
> then call a function that does the proper sequence counter stuff etc.
> But nobody really wants it, since what everybody actually _uses_ is
> the "time_after(x,jiffies+10)" kind of thing, which is only done in
> the wrapping "unsigned long" time base. So the odd "linker tricks with
> the atomic low bits marked as a volatile data structure" is actually
> exactly what we want, but people should realize that this is not
> normal.
>
> So 'jiffies' is really really special.
>
> And absolutely nothing else should use 'volatile' on data structures
> and be that special. In the case of jiffies, the rule ends up being
> that nobody should ever write to it (you write to the real
> jiffies_64), and the real jiffies_64 thing gets the real locking, and
> 'jiffies' is a read-only volatile thing.
>
> So "READ_ONCE()" is indeed unnecessary with jiffies, but it won't
> hurt. It's not really "confusion" - there's nothing _wrong_ with using
> READ_ONCE() on volatile data, but we just normally don't do volatile
> data in the kernel (because our normal model is that data is never
> really volatile in general - there may be locked and unlocked accesses
> to it, so it's stable or volatile depending on context, and thus the
> 'volatile' goes on the _code_, not on the data structure)
>
> But while jiffies READ_ONCE() accesses isn't _wrong_, it is also not
> really paired with any WRITE_ONCE(), because the real update is to
> technically not even to the same full data structure.
>
> So don't look to jiffies for how to do things. It's an odd one-off.
>
> That said, for "this might be used racily", if there are annotations
> for clang to just make it shut up about one particular field in a
> structure, than I think that would be ok. As long as it doesn't then
> imply special code generation (outside of the checking, of course).
There are annotations that work for globals only. This limitation is
because once you take a pointer of a variable, and just pass around
the address, the attribute will be lost. So sometimes you might do the
right thing, but other times you might not.
Just to summarize the options we've had so far:
1. Add a comment, and let the tool parse it somehow.
2. Add attribute to variables.
3. Add some new macro to use with expressions, which doesn't do
anything if the tool is disabled. E.g. "racy__(counter++)",
"lossy__(counter++);" or any suitable name.
1 and 3 are almost equivalent, except that 3 introduces "structured"
comments that are much easier to understand for tooling. Both 1 and 2
need compiler support.
Right now both gcc and clang support KCSAN, and doing 1 or 2 would
probably imply dropping one of them. Both 1 and 2 are also brittle: 1
because comments are not forced to be structured, and 2 because
attributes on variables do not propagate through pointers.
>From our perspective, macro-based annotations would be most reliable.
Thanks,
-- Marco
Powered by blists - more mailing lists