Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp1576942ioo; Sun, 22 May 2022 19:45:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzzOKXE6sZ5INg4BCapwxHpoGjjj9RJW0UtvGxw0rUvvZKBeUL8TTL3TR537+0eeAaUlpCz X-Received: by 2002:a05:6402:2713:b0:42b:7127:8614 with SMTP id y19-20020a056402271300b0042b71278614mr1472204edd.317.1653273954177; Sun, 22 May 2022 19:45:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653273954; cv=none; d=google.com; s=arc-20160816; b=LMVC8VBdtfd6QpGYF5Os8CPVgQIg/BQfwyzjgD5mzW6AotPWMyua+vJA/1n8Nd2Ns3 Vqp6ncH4Yi8eqo2oYlgfyvdU+N5MXHg7rHcZWNMYPIQ0AES4yw8gZ6krOVv7Meg2X4cn NZQkmEc5e+34L7gj7Oq0SZ1wHMgAl+k1pH3i9jCoPUMxsCm7zfGf9TotGu4csHJp23aK BIh8Ae6KobdWU0VmTtoYzuu3C9rqVylE9owSpGfJB0lKyPUyUw5QoXzpW1oBKnWVqD81 7pzfRG7OE6SNAR43/4QXYGZmZuwKf3wypNCkBQtRcBzjhQHHMX3Vxa1IMJLTQ18K9kdd 6Q0g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=FkujqrVWfuJQnMRYzpAmTyjbqupK8pkHn3PJHDpmIuk=; b=GnohStHFw06CDmhlI/8OFPI1GDxlOz4d2P/XXKkSkD+qsNK6auKmFnLD4azPqS7XOn tHSeh2LTvwWnRTUnmYJG2VWYqlkriiKp2IL+I4nOfAQF72bchX5+aOFrxMKZH3yvhT/F 8lHs6mekXxbcUINZBnmqNgBXmVVPoMih78tGbiY/1DLkXYcNjTjLV0RyI1y397N+Rdzx da0+fIQXo9veDGNndfVyj5t35V0/GYJk7gnm7DOYPuXiDfB0LTaCF0aBOzHJZKM9huzV rv4WK1pZnAUhItfBjopVP3RgU75CyYFnfeZUppwB8uO/vfEkYqgP3aWTzEiB4xFSR9L+ zJ2w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id qf4-20020a1709077f0400b006fe9d9fb661si11956158ejc.739.2022.05.22.19.45.28; Sun, 22 May 2022 19:45:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345018AbiETDFv (ORCPT + 99 others); Thu, 19 May 2022 23:05:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58512 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344969AbiETDFu (ORCPT ); Thu, 19 May 2022 23:05:50 -0400 Received: from szxga03-in.huawei.com (szxga03-in.huawei.com [45.249.212.189]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BBF2BBCB; Thu, 19 May 2022 20:05:45 -0700 (PDT) Received: from dggpemm500020.china.huawei.com (unknown [172.30.72.57]) by szxga03-in.huawei.com (SkyGuard) with ESMTP id 4L4BKt3K7CzCstc; Fri, 20 May 2022 11:00:18 +0800 (CST) Received: from dggpemm500001.china.huawei.com (7.185.36.107) by dggpemm500020.china.huawei.com (7.185.36.49) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Fri, 20 May 2022 11:05:15 +0800 Received: from localhost.localdomain.localdomain (10.175.113.25) by dggpemm500001.china.huawei.com (7.185.36.107) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.24; Fri, 20 May 2022 11:05:14 +0800 From: Kefeng Wang To: , , , , , , Jonathan Corbet CC: , Kefeng Wang Subject: [PATCH v2 2/2] arm64: kcsan: Support detecting more missing memory barriers Date: Fri, 20 May 2022 11:15:48 +0800 Message-ID: <20220520031548.175582-3-wangkefeng.wang@huawei.com> X-Mailer: git-send-email 2.35.3 In-Reply-To: <20220520031548.175582-1-wangkefeng.wang@huawei.com> References: <20220520031548.175582-1-wangkefeng.wang@huawei.com> MIME-Version: 1.0 Content-Transfer-Encoding: 7BIT Content-Type: text/plain; charset=US-ASCII X-Originating-IP: [10.175.113.25] X-ClientProxiedBy: dggems705-chm.china.huawei.com (10.3.19.182) To dggpemm500001.china.huawei.com (7.185.36.107) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org As "kcsan: Support detecting a subset of missing memory barriers"[1] introduced KCSAN_STRICT/KCSAN_WEAK_MEMORY which make kcsan detects more missing memory barrier, but arm64 don't have KCSAN instrumentation for barriers, so the new selftest test_barrier() and test cases for memory barrier instrumentation in kcsan_test module will fail, even panic on selftest. Let's prefix all barriers with __ on arm64, as asm-generic/barriers.h defined the final instrumented version of these barriers, which will fix the above issues. Note, barrier instrumentation that can be disabled via __no_kcsan with appropriate compiler-support (and not just with objtool help), see commit bd3d5bd1a0ad ("kcsan: Support WEAK_MEMORY with Clang where no objtool support exists"), it adds disable_sanitizer_instrumentation to __no_kcsan attribute which will remove all sanitizer instrumentation fully (with Clang 14.0). Meanwhile, GCC does the same thing with no_sanitize. [1] https://lore.kernel.org/linux-mm/20211130114433.2580590-1-elver@google.com/ Signed-off-by: Kefeng Wang --- arch/arm64/include/asm/barrier.h | 12 ++++++------ include/asm-generic/barrier.h | 4 ++++ 2 files changed, 10 insertions(+), 6 deletions(-) diff --git a/arch/arm64/include/asm/barrier.h b/arch/arm64/include/asm/barrier.h index 9f3e2c3d2ca0..2cfc4245d2e2 100644 --- a/arch/arm64/include/asm/barrier.h +++ b/arch/arm64/include/asm/barrier.h @@ -50,13 +50,13 @@ #define pmr_sync() do {} while (0) #endif -#define mb() dsb(sy) -#define rmb() dsb(ld) -#define wmb() dsb(st) +#define __mb() dsb(sy) +#define __rmb() dsb(ld) +#define __wmb() dsb(st) -#define dma_mb() dmb(osh) -#define dma_rmb() dmb(oshld) -#define dma_wmb() dmb(oshst) +#define __dma_mb() dmb(osh) +#define __dma_rmb() dmb(oshld) +#define __dma_wmb() dmb(oshst) #define io_stop_wc() dgh() diff --git a/include/asm-generic/barrier.h b/include/asm-generic/barrier.h index fd7e8fbaeef1..18863c50e9ce 100644 --- a/include/asm-generic/barrier.h +++ b/include/asm-generic/barrier.h @@ -38,6 +38,10 @@ #define wmb() do { kcsan_wmb(); __wmb(); } while (0) #endif +#ifdef __dma_mb +#define dma_mb() do { kcsan_mb(); __dma_mb(); } while (0) +#endif + #ifdef __dma_rmb #define dma_rmb() do { kcsan_rmb(); __dma_rmb(); } while (0) #endif -- 2.35.3