Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp1071788pxk; Fri, 25 Sep 2020 05:37:38 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzWa5MX2mhAtqguqi5WISGACKuvb/RSvsF54DdSvp/gsAWfuqtMV8oFVReMo1Y4RsLpti17 X-Received: by 2002:a17:906:d7a2:: with SMTP id pk2mr2434812ejb.149.1601037458613; Fri, 25 Sep 2020 05:37:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601037458; cv=none; d=google.com; s=arc-20160816; b=ApsLz2FFtYbgKfEScmhf1BmMPDIAm0lNU5KwOh+1fMoaDLKAi3Lwp7I2qRsacGQ+In +9fydX5/5Yfxs6c/jRQuOuU1GnCvEPGyDnS+OIVTYip428F0NB+oekpgGpHtRWhJagQQ NG2ELf8ywVoBIVc2fHBOv8Vl/BfxUbaGA29LKki9nE4Z2+Ime4+ZECmjDJxgZ1nzr/sn O4UgoPPI59j11+ZJYsn+ePmalUCYEIsTM85wkktv2/KJvVLadJQdO3smQWrbraNpYeNN KaXvEkuWwPC1QloKeNwloT3WNq0Ge3FwHzhLVF5ee39e1zUZu7np6MCVteBc/kYPXuoS ykLg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=pkezcW52/JMjswPt3mf5JA0kEQ7yGBao8tcWOxGLQjY=; b=t17ycMrTjlrPr9MiQPF//U0q0/3KRIb+JuEJmYI7/199ehxJzs1oaJ3ifuUiNiV+tt DD2qHm1fi3qb8fIfIVJ3W7pwNdbim1cW6K7RqSNbY25GVF0pF+EIL2/1sKtK3UZwC1+v G3A4cZ4s0JlrPuYi4r82WQpGzxVVrv/ko4OZBFHta6As4de+2rFbMu/0/fOHUth13CWf R05NaKM4E0U6s4f+EQkakf7RYvU0ui6+IHWpe7TYqu/VzzWl2nVEobAMG+AAMBKft8tx SsK/ueyDYq7CMRhTLKL45eFUAGZO5ph0CfFZaCkPRUHGKuHVlg029JYoTqv9TuAUEaWk 1G2A== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n6si1686830ejx.165.2020.09.25.05.37.14; Fri, 25 Sep 2020 05:37:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728437AbgIYMfK (ORCPT + 99 others); Fri, 25 Sep 2020 08:35:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:44816 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728056AbgIYMfK (ORCPT ); Fri, 25 Sep 2020 08:35:10 -0400 Received: from gaia (unknown [31.124.44.166]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 02FF021D7A; Fri, 25 Sep 2020 12:35:06 +0000 (UTC) Date: Fri, 25 Sep 2020 13:35:04 +0100 From: Catalin Marinas To: Andrey Konovalov Cc: Dmitry Vyukov , Vincenzo Frascino , kasan-dev , Andrey Ryabinin , Alexander Potapenko , Marco Elver , Evgenii Stepanov , Elena Petrova , Branislav Rankov , Kevin Brodsky , Will Deacon , Andrew Morton , Linux ARM , Linux Memory Management List , LKML Subject: Re: [PATCH v3 26/39] arm64: mte: Add in-kernel tag fault handler Message-ID: <20200925123503.GJ4846@gaia> References: <17ec8af55dc0a4d3ade679feb0858f0df4c80d27.1600987622.git.andreyknvl@google.com> <20200925104933.GD4846@gaia> <20200925114703.GI4846@gaia> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Sep 25, 2020 at 01:52:56PM +0200, Andrey Konovalov wrote: > On Fri, Sep 25, 2020 at 1:47 PM Catalin Marinas wrote: > > On Fri, Sep 25, 2020 at 01:26:02PM +0200, Andrey Konovalov wrote: > > > On Fri, Sep 25, 2020 at 12:49 PM Catalin Marinas > > > wrote: > > > > > + > > > > > static void __do_kernel_fault(unsigned long addr, unsigned int esr, > > > > > struct pt_regs *regs) > > > > > { > > > > > @@ -641,10 +647,40 @@ static int do_sea(unsigned long addr, unsigned int esr, struct pt_regs *regs) > > > > > return 0; > > > > > } > > > > > > > > > > +static void do_tag_recovery(unsigned long addr, unsigned int esr, > > > > > + struct pt_regs *regs) > > > > > +{ > > > > > + static bool reported = false; > > > > > + > > > > > + if (!READ_ONCE(reported)) { > > > > > + report_tag_fault(addr, esr, regs); > > > > > + WRITE_ONCE(reported, true); > > > > > + } > > > > > > > > I don't mind the READ_ONCE/WRITE_ONCE here but not sure what they help > > > > with. > > > > > > The fault can happen on multiple cores at the same time, right? In > > > that case without READ/WRITE_ONCE() we'll have a data-race here. > > > > READ/WRITE_ONCE won't magically solve such races. If two CPUs enter > > simultaneously in do_tag_recovery(), they'd both read 'reported' as > > false and both print the fault info. > > They won't solve the race condition, but they will solve the data > race. I guess here we don't really care about the race condition, as > printing a tag fault twice is OK. But having a data race here will > lead to KCSAN reports, although won't probably break anything in > practice. I agree, in practice it should be fine. Anyway, it doesn't hurt leaving them in place. -- Catalin