Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp4510697pxb; Tue, 5 Oct 2021 04:48:53 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw/fbaLdzhcd8+3ISKeUBFzTrHyowvB6U9Z3Lfe1t/Ep615tXjEyuqiMewxfdtIsWbVMbEj X-Received: by 2002:a05:6402:4308:: with SMTP id m8mr3265413edc.188.1633434532895; Tue, 05 Oct 2021 04:48:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633434532; cv=none; d=google.com; s=arc-20160816; b=qobxkX42TTFLQGKjTZledD5BpYoM8RWTm2ILpPXXkQHDun7quuh4ACvFgZHiJoxrC6 uYZytD6YaNMza5258XV/WFB0fGGwJsnqR0lEWFic+h1nQnR22S87OuwfpHEawdg2eMy6 vHA7N39tZzKsxRJU7yrZ5+x2NerHOsJgoXi33DHhChsTVtf0frpCXrQwzE57r5yCIDJR 7d8MdiuoOxFeohzQHym2QXZQWLkvUnYOgnb9LML/U7IYRekyxEVKBg/TYvsj5EK5oyMi UIPzkjBOrVv9uTxlYdlVzCWv314K2e3RqaHLH7WGCFel0zkT1LqILwqVoiQBmm9wcSh1 PKcA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=13tbC3Gouv1KRuynQBuv27/8d3oljsFDDnHed+AikeM=; b=JdQ8rw2ShrhV3ohz03/wXUJeqAdqTKBdEbAN8V5v5apuhZMdKIipSusal88Wf8Ad6h qpOR612C5wzKOAHKNMx08x45wmI/gclSyOdcwwF9NSBOngHmuBimq/wEYVBtD3xSAq+n FRtbwmYj24MVrXz0u3M20o66hvMWWOtgDMoM17FfpM1N+5w/1f0S2NrHyzDxWTC9lwo+ 0HwwJnPdrvsWCRb0DxJCWbWgbagChgA/YBHl0PT8FuK8lfe7eELGDy8UCRglk9nDwFzC GW/r2O9jyT991qkW9bk/Q3ZCI2L8up6xC/H/ClP+M5+Q3cZ5vZFy6whIHmswnFe9D4hm ceSw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=desiato.20200630 header.b=EVw7JiEF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i10si25121940ejd.99.2021.10.05.04.48.29; Tue, 05 Oct 2021 04:48:52 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=desiato.20200630 header.b=EVw7JiEF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234489AbhJELrn (ORCPT + 99 others); Tue, 5 Oct 2021 07:47:43 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34394 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234470AbhJELrm (ORCPT ); Tue, 5 Oct 2021 07:47:42 -0400 Received: from desiato.infradead.org (desiato.infradead.org [IPv6:2001:8b0:10b:1:d65d:64ff:fe57:4e05]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CCEE4C061749; Tue, 5 Oct 2021 04:45:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=desiato.20200630; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=13tbC3Gouv1KRuynQBuv27/8d3oljsFDDnHed+AikeM=; b=EVw7JiEFdV5SlTVzmRuKnKgJED c7kubDpkb7h3Eo0dgRFGgGgcl1izIDoJk8/TjXaLh/087IQjgt+nSw2E25nslh8AwCi7G7Tsa1n5r czkemzGUZ1BKeMejmh9FJNDSVCH7sL+dz1Ojl+LS5S2KKh/1H97+6b30+yk2QJ2IEUy/oRD18smKq 4OetEGFo3uH/u0+/oOQfXwZDh6c4hRXE2xKXGV2tCtMVYqv/3ZE1l+WClIdix4CjoGfPBWaQqgrOX HDqWyoxVha2sOiVOgAPm936wfY0cVg3mcO15d8JYtHT/ZiMitGbJ6af7FnimRqgVOeOBUYROEay4z zVvaQ6MQ==; Received: from j217100.upc-j.chello.nl ([24.132.217.100] helo=noisy.programming.kicks-ass.net) by desiato.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux)) id 1mXit5-0082aO-Hm; Tue, 05 Oct 2021 11:45:35 +0000 Received: from hirez.programming.kicks-ass.net (hirez.programming.kicks-ass.net [192.168.1.225]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (Client did not present a certificate) by noisy.programming.kicks-ass.net (Postfix) with ESMTPS id 86EB13002DE; Tue, 5 Oct 2021 13:45:34 +0200 (CEST) Received: by hirez.programming.kicks-ass.net (Postfix, from userid 1000) id 740772038E207; Tue, 5 Oct 2021 13:45:34 +0200 (CEST) Date: Tue, 5 Oct 2021 13:45:34 +0200 From: Peter Zijlstra To: Marco Elver Cc: "Paul E . McKenney" , Alexander Potapenko , Boqun Feng , Borislav Petkov , Dmitry Vyukov , Ingo Molnar , Josh Poimboeuf , Mark Rutland , Thomas Gleixner , Waiman Long , Will Deacon , kasan-dev@googlegroups.com, linux-arch@vger.kernel.org, linux-doc@vger.kernel.org, linux-kbuild@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, x86@kernel.org Subject: Re: [PATCH -rcu/kcsan 05/23] kcsan: Add core memory barrier instrumentation functions Message-ID: References: <20211005105905.1994700-1-elver@google.com> <20211005105905.1994700-6-elver@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Oct 05, 2021 at 01:41:18PM +0200, Peter Zijlstra wrote: > On Tue, Oct 05, 2021 at 12:58:47PM +0200, Marco Elver wrote: > > +static __always_inline void kcsan_atomic_release(int memorder) > > +{ > > + if (memorder == __ATOMIC_RELEASE || > > + memorder == __ATOMIC_SEQ_CST || > > + memorder == __ATOMIC_ACQ_REL) > > + __kcsan_release(); > > +} > > + > > #define DEFINE_TSAN_ATOMIC_LOAD_STORE(bits) \ > > u##bits __tsan_atomic##bits##_load(const u##bits *ptr, int memorder); \ > > u##bits __tsan_atomic##bits##_load(const u##bits *ptr, int memorder) \ > > { \ > > + kcsan_atomic_release(memorder); \ > > if (!IS_ENABLED(CONFIG_KCSAN_IGNORE_ATOMICS)) { \ > > check_access(ptr, bits / BITS_PER_BYTE, KCSAN_ACCESS_ATOMIC, _RET_IP_); \ > > } \ > > @@ -1156,6 +1187,7 @@ EXPORT_SYMBOL(__tsan_init); > > void __tsan_atomic##bits##_store(u##bits *ptr, u##bits v, int memorder); \ > > void __tsan_atomic##bits##_store(u##bits *ptr, u##bits v, int memorder) \ > > { \ > > + kcsan_atomic_release(memorder); \ > > if (!IS_ENABLED(CONFIG_KCSAN_IGNORE_ATOMICS)) { \ > > check_access(ptr, bits / BITS_PER_BYTE, \ > > KCSAN_ACCESS_WRITE | KCSAN_ACCESS_ATOMIC, _RET_IP_); \ > > @@ -1168,6 +1200,7 @@ EXPORT_SYMBOL(__tsan_init); > > u##bits __tsan_atomic##bits##_##op(u##bits *ptr, u##bits v, int memorder); \ > > u##bits __tsan_atomic##bits##_##op(u##bits *ptr, u##bits v, int memorder) \ > > { \ > > + kcsan_atomic_release(memorder); \ > > if (!IS_ENABLED(CONFIG_KCSAN_IGNORE_ATOMICS)) { \ > > check_access(ptr, bits / BITS_PER_BYTE, \ > > KCSAN_ACCESS_COMPOUND | KCSAN_ACCESS_WRITE | \ > > @@ -1200,6 +1233,7 @@ EXPORT_SYMBOL(__tsan_init); > > int __tsan_atomic##bits##_compare_exchange_##strength(u##bits *ptr, u##bits *exp, \ > > u##bits val, int mo, int fail_mo) \ > > { \ > > + kcsan_atomic_release(mo); \ > > if (!IS_ENABLED(CONFIG_KCSAN_IGNORE_ATOMICS)) { \ > > check_access(ptr, bits / BITS_PER_BYTE, \ > > KCSAN_ACCESS_COMPOUND | KCSAN_ACCESS_WRITE | \ > > @@ -1215,6 +1249,7 @@ EXPORT_SYMBOL(__tsan_init); > > u##bits __tsan_atomic##bits##_compare_exchange_val(u##bits *ptr, u##bits exp, u##bits val, \ > > int mo, int fail_mo) \ > > { \ > > + kcsan_atomic_release(mo); \ > > if (!IS_ENABLED(CONFIG_KCSAN_IGNORE_ATOMICS)) { \ > > check_access(ptr, bits / BITS_PER_BYTE, \ > > KCSAN_ACCESS_COMPOUND | KCSAN_ACCESS_WRITE | \ > > @@ -1246,6 +1281,7 @@ DEFINE_TSAN_ATOMIC_OPS(64); > > void __tsan_atomic_thread_fence(int memorder); > > void __tsan_atomic_thread_fence(int memorder) > > { > > + kcsan_atomic_release(memorder); > > __atomic_thread_fence(memorder); > > } > > EXPORT_SYMBOL(__tsan_atomic_thread_fence); > > I find that very hard to read.. kcsan_atomic_release() it not in fact a > release. It might be a release if @memorder implies one. Also, what's the atomic part signify? Is that because you're modeling the difference in acquire/release semantics between smp_load_{acquire,release}() and atomic*_{acquire,release}() ?