[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Y2qBVZQDYnxv1af0@alley>
Date: Tue, 8 Nov 2022 17:18:29 +0100
From: Petr Mladek <pmladek@...e.com>
To: John Ogness <john.ogness@...utronix.de>
Cc: Sergey Senozhatsky <senozhatsky@...omium.org>,
Steven Rostedt <rostedt@...dmis.org>,
Thomas Gleixner <tglx@...utronix.de>,
linux-kernel@...r.kernel.org,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>
Subject: Re: [PATCH printk v3 07/40] console: introduce console_is_enabled()
wrapper
On Mon 2022-11-07 15:22:05, John Ogness wrote:
> After switching to SRCU for console list iteration, some readers
> will begin readings console->flags as a data race. Locklessly
> reading console->flags provides a consistent value because there
> is at most one CPU modifying console->flags and that CPU is
> using only read-modify-write operations.
>
> The primary reason for readers to access console->flags is to
> check if the console is enabled. Introduce console_is_enabled()
> to mark such access as a data race.
>
> Signed-off-by: John Ogness <john.ogness@...utronix.de>
> ---
> include/linux/console.h | 27 +++++++++++++++++++++++++++
> kernel/printk/printk.c | 10 +++++-----
> 2 files changed, 32 insertions(+), 5 deletions(-)
>
> diff --git a/include/linux/console.h b/include/linux/console.h
> index f4f0c9523835..d9c636011364 100644
> --- a/include/linux/console.h
> +++ b/include/linux/console.h
> @@ -172,6 +172,33 @@ extern void console_srcu_read_unlock(int cookie);
>
> extern struct hlist_head console_list;
>
> +/**
> + * console_is_enabled - Locklessly check if the console is enabled
> + * @con: struct console pointer of console to check
> + *
> + * Unless the caller is explicitly synchronizing against the console
> + * register/unregister/stop/start functions, this function should be
> + * used instead of manually readings console->flags and testing for
> + * the CON_ENABLED bit.
> + *
> + * This function provides the necessary READ_ONCE() and data_race()
> + * notation for locklessly reading the console flags. The READ_ONCE()
> + * in this function matches the WRITE_ONCE() when @flags are modified
> + * for registered consoles.
> + *
> + * Context: Any context.
> + */
> +static inline bool console_is_enabled(const struct console *con)
> +{
> + /*
> + * Locklessly reading console->flags provides a consistent
> + * read value because there is at most one CPU modifying
> + * console->flags and that CPU is using only read-modify-write
> + * operations to do so.
> + */
> + return (data_race(READ_ONCE(con->flags)) & CON_ENABLED);
This API is step into the right direction, definitely. I am just not
sure about all the related READ_WRITE() calls, see below. It is not
easy to check and maintain.
> +}
> +
> /**
> * for_each_console_srcu() - Iterator over registered consoles
> * @con: struct console pointer used as loop cursor
> diff --git a/kernel/printk/printk.c b/kernel/printk/printk.c
> index 8974523f3107..79811984da34 100644
> --- a/kernel/printk/printk.c
> +++ b/kernel/printk/printk.c
> @@ -3021,7 +3021,7 @@ void console_stop(struct console *console)
> {
> __pr_flush(console, 1000, true);
> console_lock();
> - console->flags &= ~CON_ENABLED;
> + WRITE_ONCE(console->flags, console->flags & ~CON_ENABLED);
My first reaction is that using the atomic operation only for the
store side is suspicious. It is correct because the read is serialized
by console_lock(). But it is far from obvious why we need and can do it
this way.
It would deserve a comment. But there are several other writes.
Also it is not obvious why many other con->flags modifications
do not need this.
I think about hiding this into an API. We could also add some
checks that it is used the right way. Also it might make sense
to avoid using the READ_ONCE()/WRITE_ONCE by using
set_bit()/test_bit().
I mean the following:
/**
* console_set_flag - set the given console flag
*
* @con: A pointer to struct console
* @flag_bit: Number of the bit that will be set
*
* Must be called under console_lock() when the console
* is registered. Serialization for non-registered
* console is up to the related console driver code.
*
* Never access console->flags directly.
*/
void console_set_flag(struct console *con, int flag_nr)
{
WARN_ON_ONCE(console_is_registered(con) && !held_console_lock());
if (WARN_ON_ONCE(flag_nr) >= sizeof(con->flags);
return;
set_bit(flag_nr, &con->flags);
}
bool console_check_flag(const struct console *con, int flag_nr)
{
WARN_ON_ONCE(console_is_registered(con) && !held_console_lock());
if (WARN_ON_ONCE(flag_nr) >= sizeof(con->flags);
return;
return test_bit(flag_nr, &con->flags);
}
We could then use it directly:
if (console_check_flag(con, CON_ENABLED_BIT))
...
or we could hide it into a wrapper. Safe access:
static inline bool console_is_enabled(const struct console *con)
{
return console_check_bit(con, CON_ENABLED_BIT);
}
The above is for the safe access. Another wrapper would be needed
for the unsafe access.
/**
* console_check_flag_unsafe - check console flag without
* synchronization
*
* @con: A pointer to struct console
* @flag_bit: Number of the bit that will be set
*
* Must be called under console_srcu_read_lock() when the console
* is registered. Use console_check_flag() in all other situations.
*
* Never access console->flags directly.
*/
bool console_check_flag_unsafe(const struct console *con, int flag_nr)
{
WARN_ON_ONCE(console_is_registered(con) && !console_srcu_read_lock_is_held());
if (WARN_ON_ONCE(flag_nr) >= sizeof(con->flags);
return;
return data_race(test_bit(flag_nr, &con->flags));
}
Most callers should use the safe variant. It will even check that it
is really used the safe way. Only the few users of _unsafe() variant
would need an extra comment why it is acceptable.
I know that it is more work. There seem to be 49 locations that would
need update at this point. Some of them are touched by the patchset
anyway. There are "only" 39 accesses at the end of the patchset.
I used the following query:
$> git grep -e "\->flags.*CON_" | grep -v "\.flags" | grep -E "(c|con|cons|console)->flags" | wc -l
39
> console_unlock();
>
> /*
I would prefer to use the proposed API because it should make all accesses more
clear and safe. And most importantly, it would help use to catch bugs.
But I do not resist on it. The patch looks correct and we could do
this later. I could live with it if we add some comments
above the WRITE_ONCE() calls.
Best Regards,
Petr
Powered by blists - more mailing lists