[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH] xen/x86: irq: Avoid a TOCTOU race in pirq_spin_lock_irq_desc()
On 23.07.2020 15:22, Julien Grall wrote: > On 23/07/2020 12:23, Jan Beulich wrote: >> On 22.07.2020 18:53, Julien Grall wrote: >>> --- a/xen/arch/x86/irq.c >>> +++ b/xen/arch/x86/irq.c >>> @@ -1187,7 +1187,7 @@ struct irq_desc *pirq_spin_lock_irq_desc( >>> >>> for ( ; ; ) >>> { >>> - int irq = pirq->arch.irq; >>> + int irq = read_atomic(&pirq->arch.irq); >> >> There we go - I'd be fine this way, but I'm pretty sure Andrew >> would want this to be ACCESS_ONCE(). So I guess now is the time >> to settle which one to prefer in new code (or which criteria >> there are to prefer one over the other). > > I would prefer if we have a single way to force the compiler to do a > single access (read/write). Ideally yes. I'm unconvinced though that either construct fits all needs (for {read,write}_atomic() there may be reasons why the compiler is allowed to produce multiple generated code instances from a single source instance, while for *_ONCE() the compiler may be allowed to split the access into pieces (as can be easily seen for an access to a uint64_t variable on 32-bit x86 at least, and by deduction I then can't see why it shouldn't be allowed to use byte-wise accesses). > The existing implementation of ACCESS_ONCE() can only work on scalar > type. The implementation is based on a Linux, although we have an extra > check. Looking through the Linux history, it looks like it is not > possible to make ACCESS_ONCE() work with non-scalar types: > > ACCESS_ONCE does not work reliably on non-scalar types. For > example gcc 4.6 and 4.7 might remove the volatile tag for such > accesses during the SRA (scalar replacement of aggregates) step > https://gcc.gnu.org/bugzilla/show_bug.cgi?id=58145) > > I understand that our implementation of read_atomic(), write_atomic() > would lead to less optimized code. I.e. you see ways for the compiler to be more clever than using a single "move" instruction for a single move? Or are you referring to insn scheduling by the compiler (which my gut feeling would say is impacted as much by an asm volatile() as by accessing a volatile object). > So maybe we want to import > READ_ONCE() and WRITE_ONCE() from Linux? So far I was under the impression that our ACCESS_ONCE() is the result of folding (older) Linux'es READ_ONCE() and WRITE_ONCE() into a single construct. > As a side note, I have seen suggestion only (see [1]) which suggest that > they those helpers wouldn't be portable: > > "One relatively unimportant misunderstanding is due to the fact that the > standard only talks about accesses to volatile objects. It does not talk > about accesses via volatile qualified pointers. Some programmers believe > that using a pointer-to-volatile should be handled as though it pointed > to a volatile object. That is not guaranteed by the standard and is > therefore not portable. However, this is relatively unimportant because > gcc does in fact treat a pointer-to-volatile as though it pointed to a > volatile object." > > I would assume that the use is OK on CLang and GCC given that Linux has > been using it. Then again your change here is exactly to drop such assumptions of ours on compiler behavior. >> And this is of course besides the fact that I think we have many >> more instances where guaranteeing a single access would be >> needed, if we're afraid of the described permitted compiler >> behavior. Which then makes me wonder if this is really something >> we should fix one by one, rather than by at least larger scope >> audits (in order to not suggest "throughout the code base"). > > It depends how much the contributor can invest on chasing the rest of > the issues. The larger the scope is, the less likely you will find > someone that has bandwith to allocate for fixing it completely. I certainly understand that. > If the scope is "a field", then I think it is a reasonable suggesting. > > In this case, I had a look at arch.irq and wasn't able to spot other > potential issue. That's good to know, and may be worth mentioning - if not in the description, then maybe in a post-commit-message remark? Jan
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |