From: "Paul E. McKenney" <paulmck@linux.vnet.ibm.com>
To: Dmitry Vyukov <dvyukov@google.com>
Cc: tip-bot for Andrey Ryabinin <tipbot@zytor.com>,
linux-tip-commits@vger.kernel.org,
kasan-dev <kasan-dev@googlegroups.com>,
Ingo Molnar <mingo@kernel.org>,
Kostya Serebryany <kcc@google.com>,
Borislav Petkov <bp@alien8.de>,
Andrey Ryabinin <aryabinin@virtuozzo.com>,
Andrew Morton <akpm@linux-foundation.org>,
LKML <linux-kernel@vger.kernel.org>,
Peter Zijlstra <peterz@infradead.org>,
Andy Lutomirski <luto@amacapital.net>,
Linus Torvalds <torvalds@linux-foundation.org>,
Thomas Gleixner <tglx@linutronix.de>,
Sasha Levin <sasha.levin@oracle.com>,
Denys Vlasenko <dvlasenk@redhat.com>,
Wolfram Gloger <wmglo@dent.med.uni-muenchen.de>,
Andrey Konovalov <andreyknvl@google.com>,
"H. Peter Anvin" <hpa@zytor.com>,
Alexander Potapenko <glider@google.com>
Subject: Re: [tip:locking/urgent] compiler, atomics: Provide READ_ONCE_NOCHECK ()
Date: Wed, 14 Oct 2015 10:34:50 -0700 [thread overview]
Message-ID: <20151014173450.GA3910@linux.vnet.ibm.com> (raw)
In-Reply-To: <CACT4Y+ZA4ywAnccYWYnuf=vXG7A8S0KRJVc9qAdfOUFaT6m0hw@mail.gmail.com>
On Wed, Oct 14, 2015 at 07:23:02PM +0200, Dmitry Vyukov wrote:
> On Wed, Oct 14, 2015 at 7:04 PM, Paul E. McKenney
> <paulmck@linux.vnet.ibm.com> wrote:
> >> >> >> > On Wed, Oct 14, 2015 at 08:28:43AM -0700, tip-bot for Andrey Ryabinin wrote:
> >> >> >> >> Commit-ID: 4115ffdf4d6f8986a7abe1dd522c163f599bc0e6
> >> >> >> >> Gitweb: http://git.kernel.org/tip/4115ffdf4d6f8986a7abe1dd522c163f599bc0e6
> >> >> >> >> Author: Andrey Ryabinin <aryabinin@virtuozzo.com>
> >> >> >> >> AuthorDate: Tue, 13 Oct 2015 18:28:07 +0300
> >> >> >> >> Committer: Ingo Molnar <mingo@kernel.org>
> >> >> >> >> CommitDate: Wed, 14 Oct 2015 16:44:06 +0200
> >> >> >> >>
> >> >> >> >> compiler, atomics: Provide READ_ONCE_NOCHECK()
> >> >> >> >>
> >> >> >> >> Some code may perform racy by design memory reads. This could be
> >> >> >> >> harmless, yet such code may produce KASAN warnings.
> >> >> >> >>
> >> >> >> >> To hide such accesses from KASAN this patch introduces
> >> >> >> >> READ_ONCE_NOCHECK() macro. KASAN will not check the memory
> >> >> >> >> accessed by READ_ONCE_NOCHECK().
> >> >> >> >>
> >> >> >> >> This patch creates __read_once_size_nocheck() a clone of
> >> >> >> >> __read_once_size_check() (renamed __read_once_size()).
> >> >> >> >> The only difference between them is 'no_sanitized_address'
> >> >> >> >> attribute appended to '*_nocheck' function. This attribute tells
> >> >> >> >> the compiler that instrumentation of memory accesses should not
> >> >> >> >> be applied to that function. We declare it as static
> >> >> >> >> '__maybe_unsed' because GCC is not capable to inline such
> >> >> >> >> function: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=67368
> >> >> >> >>
> >> >> >> >> With KASAN=n READ_ONCE_NOCHECK() is just a clone of READ_ONCE().
> >> >> >> >
> >> >> >> > So I add READ_ONCE_NOCHECK() for accesses for which the compiler cannot
> >> >> >> > prove safe address for KASAN's benefit, but READ_ONCE() suffices for
> >> >> >> > the data-race-detection logic in KTSAN, correct?
> >> >> >>
> >> >> >> KTSAN also needs READ_ONCE_NOCHECK() here. KTSAN will flag races
> >> >> >> between get_wchan() and the thread accesses to own stack even more
> >> >> >> aggressively than KASAN, because KTSAN won't like get_wchan() accesses
> >> >> >> even to non-poisoned areas of other thread stack.
> >> >> >
> >> >> > So to keep KTSAN happy, any read from some other thread's stack requires
> >> >> > READ_ONCE_NOCHECK()? What if the access is via a locking primitive or
> >> >> > read-modify-write atomic operation?
> >> >> >
> >> >> > This is of some interest in RCU, which implements synchronous grace
> >> >> > periods using completions that are allocated on the calling task's stack
> >> >> > and manipulated by RCU callbacks that are likely executing elsewhere.
> >> >>
> >> >> KTSAN does not have any special logic for stacks. It just generally
> >> >> flags pairs of accesses when (1) at least one access is not atomic,
> >> >> (2) at least one access is a write and (3) these accesses are not
> >> >> synchronized by means of other synchronization.
> >> >> There is a bunch of cases when kernel code allocates objects on stack
> >> >> and then passes them to other threads, but as far as there is proper
> >> >> synchronization it is OK.
> >> >
> >> > OK, so let me see if I understand this. ;-)
> >> >
> >> > KASAN requires READ_ONCE_NOCHECK() for get_wchan(). KTSAN would be
> >> > just as happy with READ_ONCE(), but READ_ONCE_NOCHECK() works for
> >> > both.
> >> >
> >> > Did I get it right?
> >>
> >>
> >> No, KTSAN also needs READ_ONCE_NOCHECK.
> >> READ_ONCE in get_wchan can lead to a data race report.
> >> Consider:
> >>
> >> // the other thead
> >> some_stack_var = ...;
> >>
> >> // get_wchan
> >> bp = READ_ONCE(p); // where p happens to point to some_stack_var in
> >> the other thread
> >>
> >> This is generally not atomic and not safe. And this is a data race by
> >> all possible definitions.
> >> Only READ_ONCE on reading side is not enough to ensure atomicity, also
> >> all concurrent writes must be done with atomic operations.
> >
> > OK. However, this is specific to get_wchan()'s out-of-bounds stack, right?
>
> Yes... and no.
> This is specific to racy accesses, not necessary to out-of-bounds
> stack. If you have a data race in-bounds, it is also not OK :)
But a non-data-race out of bounds would presumably trigger KASAN but not
KTSAN.
> > If I have multiple tasks accessing some other task's on-stack variable,
> > then as long as all other potentially concurrent accesses use atomic
> > operations, READ_ONCE() suffices. Or am I still missing something here?
>
> This is correct.
> Generally, the idea is that KTSAN flags what you think is a bug, and
> does not flag what you think is not a bug. If you have all proper
> synchronization in place, then KTSAN should not flag that; whether the
> object is on stack or not is irrelevant.
Good!
Thanx, Paul
next prev parent reply other threads:[~2015-10-14 17:34 UTC|newest]
Thread overview: 62+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-10-13 12:35 [PATCH v2 0/2] Silence KASAN warnings in get_wchan() Andrey Ryabinin
2015-10-13 12:35 ` [PATCH v2 1/2] Provide READ_ONCE_NOCHECK() Andrey Ryabinin
2015-10-13 14:16 ` Ingo Molnar
2015-10-13 16:02 ` kbuild test robot
2015-10-13 16:31 ` Andrey Ryabinin
2015-10-14 13:40 ` Ingo Molnar
2015-10-14 14:11 ` Andrey Ryabinin
2015-10-13 12:35 ` [PATCH v2 2/2] x86/process: Silence KASAN warnings in get_wchan() Andrey Ryabinin
2015-10-13 13:48 ` Ingo Molnar
2015-10-13 13:57 ` Andrey Ryabinin
2015-10-13 13:57 ` Dmitry Vyukov
2015-10-13 14:15 ` Andrey Ryabinin
2015-10-13 14:19 ` Ingo Molnar
2015-10-13 15:28 ` [PATCH v3 0/2] " Andrey Ryabinin
2015-10-13 15:28 ` [PATCH v3 1/2] Provide READ_ONCE_NOCHECK() Andrey Ryabinin
2015-10-14 15:28 ` [tip:locking/urgent] compiler, atomics: Provide READ_ONCE_NOCHECK () tip-bot for Andrey Ryabinin
2015-10-14 15:45 ` Paul E. McKenney
2015-10-14 15:50 ` Dmitry Vyukov
2015-10-14 16:01 ` Paul E. McKenney
2015-10-14 16:08 ` Dmitry Vyukov
2015-10-14 16:16 ` Peter Zijlstra
2015-10-14 16:18 ` Dmitry Vyukov
2015-10-14 16:20 ` Peter Zijlstra
2015-10-14 16:23 ` Andy Lutomirski
2015-10-14 16:34 ` Peter Zijlstra
2015-10-14 17:48 ` Ingo Molnar
2015-10-14 17:57 ` Andy Lutomirski
2015-10-14 16:34 ` Dmitry Vyukov
2015-10-14 16:54 ` Peter Zijlstra
2015-10-14 16:20 ` Paul E. McKenney
2015-10-14 16:32 ` Dmitry Vyukov
2015-10-14 17:04 ` Paul E. McKenney
2015-10-14 17:23 ` Dmitry Vyukov
2015-10-14 17:34 ` Paul E. McKenney [this message]
2015-10-14 16:19 ` Andrey Ryabinin
2015-10-14 16:29 ` Dmitry Vyukov
2015-10-14 17:06 ` Paul E. McKenney
2015-10-15 9:18 ` linux-next: build problems (Was: [PATCH v3 1/2] Provide READ_ONCE_NOCHECK()) Stephen Rothwell
2015-10-15 9:18 ` Stephen Rothwell
2015-10-15 10:03 ` Andrey Ryabinin
2015-10-15 10:03 ` Andrey Ryabinin
2015-10-15 10:19 ` [PATCH] compiler, READ_ONCE: Fix build failure with some older GCC Andrey Ryabinin
2015-10-15 10:19 ` Andrey Ryabinin
2015-10-15 11:30 ` Ingo Molnar
2015-10-13 15:28 ` [PATCH v3 2/2] x86/process: Silence KASAN warnings in get_wchan() Andrey Ryabinin
2015-10-14 15:29 ` [tip:locking/urgent] x86/mm: Silence KASAN warnings in get_wchan( ) tip-bot for Andrey Ryabinin
2015-10-16 9:44 ` [PATCH v4 0/2] Andrey Ryabinin
2015-10-16 9:44 ` [PATCH v4 1/2] compiler, atomics: Provide READ_ONCE_NOKSAN() Andrey Ryabinin
2015-10-16 10:00 ` Peter Zijlstra
2015-10-16 10:54 ` Andrey Ryabinin
2015-10-16 11:08 ` Peter Zijlstra
2015-10-16 10:33 ` Borislav Petkov
2015-10-16 11:58 ` Andrey Ryabinin
2015-10-18 7:24 ` Ingo Molnar
2015-10-16 16:05 ` Paul E. McKenney
2015-10-16 9:44 ` [PATCH v4 2/2] x86/mm: Silence KASAN warnings in get_wchan() Andrey Ryabinin
2015-10-16 9:47 ` [PATCH v4 0/2] " Andrey Ryabinin
2015-10-19 8:37 ` [PATCH v5 " Andrey Ryabinin
2015-10-19 8:37 ` [PATCH v5 1/2] compiler, atomics: Provide READ_ONCE_NOCHECK() Andrey Ryabinin
2015-10-20 9:37 ` [tip:x86/urgent] compiler, atomics, kasan: " tip-bot for Andrey Ryabinin
2015-10-19 8:37 ` [PATCH v5 2/2] x86/mm: Silence KASAN warnings in get_wchan() Andrey Ryabinin
2015-10-20 9:37 ` [tip:x86/urgent] x86/mm, kasan: " tip-bot for Andrey Ryabinin
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20151014173450.GA3910@linux.vnet.ibm.com \
--to=paulmck@linux.vnet.ibm.com \
--cc=akpm@linux-foundation.org \
--cc=andreyknvl@google.com \
--cc=aryabinin@virtuozzo.com \
--cc=bp@alien8.de \
--cc=dvlasenk@redhat.com \
--cc=dvyukov@google.com \
--cc=glider@google.com \
--cc=hpa@zytor.com \
--cc=kasan-dev@googlegroups.com \
--cc=kcc@google.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-tip-commits@vger.kernel.org \
--cc=luto@amacapital.net \
--cc=mingo@kernel.org \
--cc=peterz@infradead.org \
--cc=sasha.levin@oracle.com \
--cc=tglx@linutronix.de \
--cc=tipbot@zytor.com \
--cc=torvalds@linux-foundation.org \
--cc=wmglo@dent.med.uni-muenchen.de \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.