From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.5 required=3.0 tests=DKIM_INVALID,DKIM_SIGNED, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_PASS, URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 65DE7ECDE44 for ; Thu, 1 Nov 2018 01:18:39 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 0F2A72064C for ; Thu, 1 Nov 2018 01:18:39 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="kh7jvFii" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 0F2A72064C Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=roeck-us.net Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726897AbeKAKTT (ORCPT ); Thu, 1 Nov 2018 06:19:19 -0400 Received: from mail-pl1-f194.google.com ([209.85.214.194]:37778 "EHLO mail-pl1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725823AbeKAKTT (ORCPT ); Thu, 1 Nov 2018 06:19:19 -0400 Received: by mail-pl1-f194.google.com with SMTP id bh10-v6so8116920plb.4; Wed, 31 Oct 2018 18:18:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:subject:to:cc:references:from:message-id:date:user-agent :mime-version:in-reply-to:content-language:content-transfer-encoding; bh=n3Bh4lDkQM3Br0JLy4DpJFofWnoGLP42GY3kTHRT33o=; b=kh7jvFiiYrNaYdRxA22GXMxicQ4XL37GU1izGenSeZfIrOxFEHwxx52TM5R5xs+t0K zNIdPda74jGD7K4ch8Tzd1hydQ/NM8s0cAO1jnkCFoho88uz5FOT8icH8FFaxZsRL8x/ f36W+a+1I6MsJrQcRhXiSoosakIpKTN0sBmebFVLR/6w0sf7Unoo8Pst0jNwy/tEwo25 62xtaejBE6LUEvPLj+OugA2udpvVYAIDVZ5cyFaNj5XBB1iOF9EBTv0OHZ1EES084vxW jWimDsL+Xsol8TybqI4+14RoH+7hOWFqXrZ1c9yw0zEr6R34Qk530Me1X+J7g9qOoLqy IzFQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:subject:to:cc:references:from:message-id :date:user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=n3Bh4lDkQM3Br0JLy4DpJFofWnoGLP42GY3kTHRT33o=; b=qX/v5V8/uETuJI1Am8NqFgIBbtFAwL6SafbcUO15cOsVAgY2UOJOX548hTbsaLnmaB Ec8OVpXKxmPct6UiuouB85RFWemy+HHU3rqoD4Wyd5XDy8cCbIv/2S/howmuL/59ByhR fWrTp55EUAYgOPnUxMpaH4G10ikJSwsWndyZH+ajaoYAhJUb2QFCJuVniUFJ1ZHf28K0 KDklnkt2qTpDtyq7+PFPk99EeMhz1M/2zukmMdoo+WtB2q3/domi/Zffk3zi9uzc1cEP OtjnSPfERiwS4WqqI+7qDqcoYVjlRierlz2hTqxrSno8RxBtmfsXdqDrtNBXOB5r7Bf/ B7Hw== X-Gm-Message-State: AGRZ1gJ0gA912+y+Z3SR5naqzQzPPsXP99cfbkaFtvKvQv5eY8yU5g9L mUsYkQzYA+7qgCp1TGa35V52eOwZ X-Google-Smtp-Source: AJdET5ec5YG8IUh4/wh7u5tE4ba72B0CSdBCvCtwCb9E6eYNeunK+bJNlmujB618k673+97QTrd3qQ== X-Received: by 2002:a17:902:2bc5:: with SMTP id l63-v6mr5613333plb.241.1541035115186; Wed, 31 Oct 2018 18:18:35 -0700 (PDT) Received: from server.roeck-us.net ([2600:1700:e321:62f0:329c:23ff:fee3:9d7c]) by smtp.gmail.com with ESMTPSA id v37sm153818pgn.5.2018.10.31.18.18.32 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 31 Oct 2018 18:18:34 -0700 (PDT) Subject: Re: [RFC PATCH] lib: Introduce generic __cmpxchg_u64() and use it where needed To: Paul Burton , Trond Myklebust Cc: Ralf Baechle , James Hogan , Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , "linux-mips@linux-mips.org" , "linux-kernel@vger.kernel.org" , "linuxppc-dev@lists.ozlabs.org" , Andrew Morton , Arnd Bergmann , "J. Bruce Fields" , Jeff Layton , Anna Schumaker , "David S. Miller" , "linux-nfs@vger.kernel.org" , "netdev@vger.kernel.org" References: <1541015538-11382-1-git-send-email-linux@roeck-us.net> <20181031213240.zhh7dfcm47ucuyfl@pburton-laptop> <20181031220253.GA15505@roeck-us.net> <20181031233235.qbedw3pinxcuk7me@pburton-laptop> From: Guenter Roeck Message-ID: <291af20b-820e-e848-cf75-730024612117@roeck-us.net> Date: Wed, 31 Oct 2018 18:18:31 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.2.1 MIME-Version: 1.0 In-Reply-To: <20181031233235.qbedw3pinxcuk7me@pburton-laptop> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/31/18 4:32 PM, Paul Burton wrote: > (Copying SunRPC & net maintainers.) > > Hi Guenter, > > On Wed, Oct 31, 2018 at 03:02:53PM -0700, Guenter Roeck wrote: >> The alternatives I can see are >> - Do not use cmpxchg64() outside architecture code (ie drop its use from >> the offending driver, and keep doing the same whenever the problem comes >> up again). >> or >> - Introduce something like ARCH_HAS_CMPXCHG64 and use it to determine >> if cmpxchg64 is supported or not. >> >> Any preference ? > > My preference would be option 1 - avoiding cmpxchg64() where possible in > generic code. I wouldn't be opposed to the Kconfig option if there are > cases where cmpxchg64() can really help performance though. > > The last time I'm aware of this coming up the affected driver was > modified to avoid cmpxchg64() [1]. > > In this particular case I have no idea why > net/sunrpc/auth_gss/gss_krb5_seal.c is using cmpxchg64() at all. It's > essentially reinventing atomic64_fetch_inc() which is already provided > everywhere via CONFIG_GENERIC_ATOMIC64 & the spinlock approach. At least > for atomic64_* functions the assumption that all access will be > performed using those same functions seems somewhat reasonable. > > So how does the below look? Trond? > For my part I agree that this would be a much better solution. The argument that it is not always absolutely guaranteed that atomics don't wrap doesn't really hold for me because it looks like they all do. On top of that, there is an explicit atomic_dec_if_positive() and atomic_fetch_add_unless(), which to me strongly suggests that they _are_ supposed to wrap. Given the cost of adding a comparison to each atomic operation to prevent it from wrapping, anything else would not really make sense to me. So ... please consider my patch abandoned. Thanks for looking into this! Guenter > Thanks, > Paul > > [1] https://patchwork.ozlabs.org/cover/891284/ > > --- > diff --git a/include/linux/sunrpc/gss_krb5.h b/include/linux/sunrpc/gss_krb5.h > index 131424cefc6a..02c0412e368c 100644 > --- a/include/linux/sunrpc/gss_krb5.h > +++ b/include/linux/sunrpc/gss_krb5.h > @@ -107,8 +107,8 @@ struct krb5_ctx { > u8 Ksess[GSS_KRB5_MAX_KEYLEN]; /* session key */ > u8 cksum[GSS_KRB5_MAX_KEYLEN]; > s32 endtime; > - u32 seq_send; > - u64 seq_send64; > + atomic_t seq_send; > + atomic64_t seq_send64; > struct xdr_netobj mech_used; > u8 initiator_sign[GSS_KRB5_MAX_KEYLEN]; > u8 acceptor_sign[GSS_KRB5_MAX_KEYLEN]; > @@ -118,9 +118,6 @@ struct krb5_ctx { > u8 acceptor_integ[GSS_KRB5_MAX_KEYLEN]; > }; > > -extern u32 gss_seq_send_fetch_and_inc(struct krb5_ctx *ctx); > -extern u64 gss_seq_send64_fetch_and_inc(struct krb5_ctx *ctx); > - > /* The length of the Kerberos GSS token header */ > #define GSS_KRB5_TOK_HDR_LEN (16) > > diff --git a/net/sunrpc/auth_gss/gss_krb5_mech.c b/net/sunrpc/auth_gss/gss_krb5_mech.c > index 7f0424dfa8f6..eab71fc7af3e 100644 > --- a/net/sunrpc/auth_gss/gss_krb5_mech.c > +++ b/net/sunrpc/auth_gss/gss_krb5_mech.c > @@ -274,6 +274,7 @@ get_key(const void *p, const void *end, > static int > gss_import_v1_context(const void *p, const void *end, struct krb5_ctx *ctx) > { > + u32 seq_send; > int tmp; > > p = simple_get_bytes(p, end, &ctx->initiate, sizeof(ctx->initiate)); > @@ -315,9 +316,10 @@ gss_import_v1_context(const void *p, const void *end, struct krb5_ctx *ctx) > p = simple_get_bytes(p, end, &ctx->endtime, sizeof(ctx->endtime)); > if (IS_ERR(p)) > goto out_err; > - p = simple_get_bytes(p, end, &ctx->seq_send, sizeof(ctx->seq_send)); > + p = simple_get_bytes(p, end, &seq_send, sizeof(seq_send)); > if (IS_ERR(p)) > goto out_err; > + atomic_set(&ctx->seq_send, seq_send); > p = simple_get_netobj(p, end, &ctx->mech_used); > if (IS_ERR(p)) > goto out_err; > @@ -607,6 +609,7 @@ static int > gss_import_v2_context(const void *p, const void *end, struct krb5_ctx *ctx, > gfp_t gfp_mask) > { > + u64 seq_send64; > int keylen; > > p = simple_get_bytes(p, end, &ctx->flags, sizeof(ctx->flags)); > @@ -617,14 +620,15 @@ gss_import_v2_context(const void *p, const void *end, struct krb5_ctx *ctx, > p = simple_get_bytes(p, end, &ctx->endtime, sizeof(ctx->endtime)); > if (IS_ERR(p)) > goto out_err; > - p = simple_get_bytes(p, end, &ctx->seq_send64, sizeof(ctx->seq_send64)); > + p = simple_get_bytes(p, end, &seq_send64, sizeof(seq_send64)); > if (IS_ERR(p)) > goto out_err; > + atomic64_set(&ctx->seq_send64, seq_send64); > /* set seq_send for use by "older" enctypes */ > - ctx->seq_send = ctx->seq_send64; > - if (ctx->seq_send64 != ctx->seq_send) { > - dprintk("%s: seq_send64 %lx, seq_send %x overflow?\n", __func__, > - (unsigned long)ctx->seq_send64, ctx->seq_send); > + atomic_set(&ctx->seq_send, seq_send64); > + if (seq_send64 != atomic_read(&ctx->seq_send)) { > + dprintk("%s: seq_send64 %llx, seq_send %x overflow?\n", __func__, > + seq_send64, atomic_read(&ctx->seq_send)); > p = ERR_PTR(-EINVAL); > goto out_err; > } > diff --git a/net/sunrpc/auth_gss/gss_krb5_seal.c b/net/sunrpc/auth_gss/gss_krb5_seal.c > index b4adeb06660b..48fe4a591b54 100644 > --- a/net/sunrpc/auth_gss/gss_krb5_seal.c > +++ b/net/sunrpc/auth_gss/gss_krb5_seal.c > @@ -123,30 +123,6 @@ setup_token_v2(struct krb5_ctx *ctx, struct xdr_netobj *token) > return krb5_hdr; > } > > -u32 > -gss_seq_send_fetch_and_inc(struct krb5_ctx *ctx) > -{ > - u32 old, seq_send = READ_ONCE(ctx->seq_send); > - > - do { > - old = seq_send; > - seq_send = cmpxchg(&ctx->seq_send, old, old + 1); > - } while (old != seq_send); > - return seq_send; > -} > - > -u64 > -gss_seq_send64_fetch_and_inc(struct krb5_ctx *ctx) > -{ > - u64 old, seq_send = READ_ONCE(ctx->seq_send); > - > - do { > - old = seq_send; > - seq_send = cmpxchg64(&ctx->seq_send64, old, old + 1); > - } while (old != seq_send); > - return seq_send; > -} > - > static u32 > gss_get_mic_v1(struct krb5_ctx *ctx, struct xdr_buf *text, > struct xdr_netobj *token) > @@ -177,7 +153,7 @@ gss_get_mic_v1(struct krb5_ctx *ctx, struct xdr_buf *text, > > memcpy(ptr + GSS_KRB5_TOK_HDR_LEN, md5cksum.data, md5cksum.len); > > - seq_send = gss_seq_send_fetch_and_inc(ctx); > + seq_send = atomic_fetch_inc(&ctx->seq_send); > > if (krb5_make_seq_num(ctx, ctx->seq, ctx->initiate ? 0 : 0xff, > seq_send, ptr + GSS_KRB5_TOK_HDR_LEN, ptr + 8)) > @@ -205,7 +181,7 @@ gss_get_mic_v2(struct krb5_ctx *ctx, struct xdr_buf *text, > > /* Set up the sequence number. Now 64-bits in clear > * text and w/o direction indicator */ > - seq_send_be64 = cpu_to_be64(gss_seq_send64_fetch_and_inc(ctx)); > + seq_send_be64 = cpu_to_be64(atomic64_fetch_inc(&ctx->seq_send64)); > memcpy(krb5_hdr + 8, (char *) &seq_send_be64, 8); > > if (ctx->initiate) { > diff --git a/net/sunrpc/auth_gss/gss_krb5_wrap.c b/net/sunrpc/auth_gss/gss_krb5_wrap.c > index 962fa84e6db1..5cdde6cb703a 100644 > --- a/net/sunrpc/auth_gss/gss_krb5_wrap.c > +++ b/net/sunrpc/auth_gss/gss_krb5_wrap.c > @@ -228,7 +228,7 @@ gss_wrap_kerberos_v1(struct krb5_ctx *kctx, int offset, > > memcpy(ptr + GSS_KRB5_TOK_HDR_LEN, md5cksum.data, md5cksum.len); > > - seq_send = gss_seq_send_fetch_and_inc(kctx); > + seq_send = atomic_fetch_inc(&kctx->seq_send); > > /* XXX would probably be more efficient to compute checksum > * and encrypt at the same time: */ > @@ -475,7 +475,7 @@ gss_wrap_kerberos_v2(struct krb5_ctx *kctx, u32 offset, > *be16ptr++ = 0; > > be64ptr = (__be64 *)be16ptr; > - *be64ptr = cpu_to_be64(gss_seq_send64_fetch_and_inc(kctx)); > + *be64ptr = cpu_to_be64(atomic64_fetch_inc(&kctx->seq_send64)); > > err = (*kctx->gk5e->encrypt_v2)(kctx, offset, buf, pages); > if (err) >