Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp2414579ybt; Tue, 16 Jun 2020 05:39:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyBLUZH9hXPCump3CFEakevCJk44lDXT4LOjGRGAqipyIDSyvkbTCwDu0rJIzfzhV1D4reJ X-Received: by 2002:a17:906:e0cb:: with SMTP id gl11mr2711545ejb.173.1592311183146; Tue, 16 Jun 2020 05:39:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1592311183; cv=none; d=google.com; s=arc-20160816; b=I2By839QIqi56CIRdskfR8vwm9vjF6Gm1pHxd5QEQfJ+LbtIf4FXLO5rkGGZSTivx/ YPqjXGPtDF0uIqI+p9XV7zm2HKJYmF3y7RHJOzj5hZFaC8zxizXkMx8lVeirhnPVOi9v sexo8GpKAP3A8OiKm4YvGMVlA2OeWSF3fsdW/t7+Uy+fuuYuw2IpQJyIPavQxahxCCZ0 jozTWFZWXdUspiOkcid4llODjPeqXwuGvOSyiDpIrrTkLpA64vYtoXr3RgfMAbdHSMdS HQDOSRvjxmfff8+sYHoLlE3gyg/paBN6cS+6IAGsXrXC8YGDitUb5f02vWy0QUDOxlqW MdKA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:from:subject:references :mime-version:message-id:in-reply-to:date:dkim-signature; bh=1xZsTLo/mLSdGNuFOenJEIpuLskAW05lb+ykXWbx68A=; b=qFJjoDzShyMqpetdZHNiAckdGbzhltjnM7d8kUQqhNVw5fUjifJJBAqvANDfL/qMqe Lb1qpF/Cg12d/FsnnMZmHikcwVmX1HWqoSVwFORt61uPTtu/yabWjCAVHoPo5GUhLLzU PioOnPpE76iOn+Q4z6w+3rdsmVkXX7genCwAVCx14R2TgxzIMNLUeDtcrVNGs0cSoDja MGgvSJYEsKFOIoLyhA8aqdlLkQ/18+JXi8gpqGYzRjnzjPX3IU+2tOZxjzfvMPx140el 2vpS4nAkyATcqBEYe2Z473vGyf0G/xj7R08P58GwXmlmcarWw3ceSr4JrsXQIgGVnjVj MMkw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=CncR2ckP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b6si10463871edy.452.2020.06.16.05.39.20; Tue, 16 Jun 2020 05:39:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=CncR2ckP; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728860AbgFPMhJ (ORCPT + 99 others); Tue, 16 Jun 2020 08:37:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45074 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728696AbgFPMhE (ORCPT ); Tue, 16 Jun 2020 08:37:04 -0400 Received: from mail-qt1-x849.google.com (mail-qt1-x849.google.com [IPv6:2607:f8b0:4864:20::849]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 192E6C08C5C2 for ; Tue, 16 Jun 2020 05:37:03 -0700 (PDT) Received: by mail-qt1-x849.google.com with SMTP id u48so16565868qth.17 for ; Tue, 16 Jun 2020 05:37:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=1xZsTLo/mLSdGNuFOenJEIpuLskAW05lb+ykXWbx68A=; b=CncR2ckPQIqp5hX5YHoZMyol22QiF7P7xoaQb3qSonwPZL3UAk/R+pHMvquKf0d87C 4YZEAN+A/0MfQW6Cj5+Dn3LTQI9iTt0CCX8n+UPUx8JSJIBYf8QHQrnI8BxRIgcNCYEK oBT4xYNMu+rkP43syP7IpaH5gb/zHdMlwHH/fO5FshnUGbzQjBs7/tEj+msttR2IHW7w IOj/nYGu84Kp9OIVPLiAGDGtM4Tk4PsW3YppKggvhSKUOR2wonQWz1P086/MwUqg+1BN c864AG5GQzb45OfPrdlEpQ/A/Fi742H7XI60y9aNTI6g2cdJbuOJK3sZD0Ro5vpuS4YI GTXw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=1xZsTLo/mLSdGNuFOenJEIpuLskAW05lb+ykXWbx68A=; b=N8RAAr7vrw/swliLQ5qQeFCcps6QAYIl+N9+jo4JDhw7bDBRe8/9nXJ5ufOMz+8f7v 9uc/6K0LaQSHfxVEJL5ZGL55+4m4guakm9Um+1Cf8T8pF86hbfgBzTnaDCMVLd0AAlzs yoqmdLzdN3ERdbtl3VHw6qemIx6WpB6Ol2UfaQ9BFhd+hnWukLjJvvgnlMkIKTmgL+mE of2f2evdP1Y4DlD2ExA/I6pUyvi+56qy3tj868U9ZbEbkom44ev479vCmubp0oLVKxFN QX6gi/aWCLppgzJiRqHx/VD9TkuPpFqTJRFaFX9d7rI0MCuu7akO54CxTmij97VTqj1b CbLQ== X-Gm-Message-State: AOAM530GxabDhERNeN0u8vuQ6CmSAYgDCLPTcyOML94WJMh+HMiQ5vxW zSrX02QNJSExO2MZHj7lYHQtTMI7gQ== X-Received: by 2002:a05:6214:14a6:: with SMTP id bo6mr1988177qvb.244.1592311022252; Tue, 16 Jun 2020 05:37:02 -0700 (PDT) Date: Tue, 16 Jun 2020 14:36:25 +0200 In-Reply-To: <20200616123625.188905-1-elver@google.com> Message-Id: <20200616123625.188905-5-elver@google.com> Mime-Version: 1.0 References: <20200616123625.188905-1-elver@google.com> X-Mailer: git-send-email 2.27.0.290.gba653c62da-goog Subject: [PATCH 4/4] kcsan: Add jiffies test to test suite From: Marco Elver To: elver@google.com, paulmck@kernel.org Cc: dvyukov@google.com, kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Add a test that KCSAN nor the compiler gets confused about accesses to jiffies on different architectures. Signed-off-by: Marco Elver --- kernel/kcsan/kcsan-test.c | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) diff --git a/kernel/kcsan/kcsan-test.c b/kernel/kcsan/kcsan-test.c index 3af420ad6ee7..fed6fcb5768c 100644 --- a/kernel/kcsan/kcsan-test.c +++ b/kernel/kcsan/kcsan-test.c @@ -366,6 +366,11 @@ static noinline void test_kernel_read_struct_zero_size(void) kcsan_check_read(&test_struct.val[3], 0); } +static noinline void test_kernel_jiffies_reader(void) +{ + sink_value((long)jiffies); +} + static noinline void test_kernel_seqlock_reader(void) { unsigned int seq; @@ -817,6 +822,23 @@ static void test_assert_exclusive_access_scoped(struct kunit *test) KUNIT_EXPECT_TRUE(test, match_expect_inscope); } +/* + * jiffies is special (declared to be volatile) and its accesses are typically + * not marked; this test ensures that the compiler nor KCSAN gets confused about + * jiffies's declaration on different architectures. + */ +__no_kcsan +static void test_jiffies_noreport(struct kunit *test) +{ + bool match_never = false; + + begin_test_checks(test_kernel_jiffies_reader, test_kernel_jiffies_reader); + do { + match_never = report_available(); + } while (!end_test_checks(match_never)); + KUNIT_EXPECT_FALSE(test, match_never); +} + /* Test that racing accesses in seqlock critical sections are not reported. */ __no_kcsan static void test_seqlock_noreport(struct kunit *test) @@ -867,6 +889,7 @@ static struct kunit_case kcsan_test_cases[] = { KCSAN_KUNIT_CASE(test_assert_exclusive_bits_nochange), KCSAN_KUNIT_CASE(test_assert_exclusive_writer_scoped), KCSAN_KUNIT_CASE(test_assert_exclusive_access_scoped), + KCSAN_KUNIT_CASE(test_jiffies_noreport), KCSAN_KUNIT_CASE(test_seqlock_noreport), {}, }; -- 2.27.0.290.gba653c62da-goog