Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp4152667rwd; Tue, 30 May 2023 00:59:49 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ4dFNYvB0RtBe+/ztHoMS7f7wft4/woioHAHIyG17l5cO2V68V8yRZMravGRbLsdelVEjPH X-Received: by 2002:a05:6a21:339a:b0:105:dafa:feb3 with SMTP id yy26-20020a056a21339a00b00105dafafeb3mr1822072pzb.61.1685433589661; Tue, 30 May 2023 00:59:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1685433589; cv=none; d=google.com; s=arc-20160816; b=sbaWnKyB4wcGioJOJf61NODlg5xii47oaO5JyuR3hfd/taCnS72qB9n2Uhe3nRVVUQ OvhXSvWwNhyPxEsS3lNx0T1aWT9uRP7vSOXz47EgydJD83UdscJvAHbXwm1LwHqHqMhF MuaFPqDM1S47FNgxnjQnGxui0K7ourMWi7FIFXiISq2ZIOiBab+WElGNl+GQi6UtRukR sAhcy5rKnDIXAIvXpgSB136JAS6hphD5stWABp4wof1Hn41y7PPFVCtKyL6ESOMhjSFH SJzKZ7vSQ4Pac3nbWo6rtNAfsb2Xj0F1sCoe3W3CBMDwIzWkZhAKmF1kI+W3uK9jhvT1 evjg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=q1cf9BwhoNeWlUyQ+nRhOtzcn4y84LDXQwm01y+BcxQ=; b=C1f0YPiehB9ePx5W0LBvm6SpyXvZcN3B3T+HrTALOcOa6XhqNRwlKsS/Y0Z8i0tc3A 59vYQVUQT4hUBg86E4JK4SCZiM1jUe5Xz1lIJzi51UGFpKpDcndT8WB7e7TkKOB1XdQt 4zb/SSdIZP/X+ijWyCObmjibiTlTrVp5cD1lsQ+HLwWjB43KRs5AylBJoesFy9SBrKcm 8OFMkqculTQRm1QgLZj5Zk1RM1WIZEbDcFRUxHP7CZJA1JlR3muDNJ+OPfg6f9CAeN+Y x5upL61uiSVwKYDchcwKcZjc4q+0hd2W3g0CR28/CChRRViT97FZvzqND87pPmNPZF3e JhcQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=cWfjTtF3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c75-20020a624e4e000000b0064d545c8466si1313922pfb.287.2023.05.30.00.59.36; Tue, 30 May 2023 00:59:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20221208 header.b=cWfjTtF3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230509AbjE3HnI (ORCPT + 99 others); Tue, 30 May 2023 03:43:08 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38602 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230390AbjE3HnB (ORCPT ); Tue, 30 May 2023 03:43:01 -0400 Received: from mail-yw1-x1130.google.com (mail-yw1-x1130.google.com [IPv6:2607:f8b0:4864:20::1130]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4BFF11BB for ; Tue, 30 May 2023 00:42:33 -0700 (PDT) Received: by mail-yw1-x1130.google.com with SMTP id 00721157ae682-565ca65e7ffso24822177b3.0 for ; Tue, 30 May 2023 00:42:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1685432468; x=1688024468; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=q1cf9BwhoNeWlUyQ+nRhOtzcn4y84LDXQwm01y+BcxQ=; b=cWfjTtF3eAelv3C0ENFRpilS3qbt07DvmrCqafiN2BQ5mSGuK+rXqw7q1W9TMU91Cw kTx8IdlR/9ogPHQCzgkZonT8uJPC7eG6eaBriPBfuy0Mv/eeP5+CuHlqXBxV2sQZn00V +LUtJFuUSIxoND5gpaK7qFjTUlNzIje46EGH6yd5WhLRCdqhuGLI19OiQPEPWC7jKNDc Pu/S5kwz3oqUvJx7p23iCmkmL4FBDyZQTbxqVjPgKhwuDXazg8HVKfC8rJ13v12Jxq62 UUUKsE0B55q04oH5AuOivLr9Xklo5zNRbFaFGvtC0HHVkHHPYCF10uieFRqrzj+XlXLG UsZg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1685432468; x=1688024468; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=q1cf9BwhoNeWlUyQ+nRhOtzcn4y84LDXQwm01y+BcxQ=; b=dIre6KRMxK5WkOAH6SuLItEbI1xrNcXpTcFXyenNOOrz/OK1l4MCMUaxKhgJW4rbi9 +Lxjq9OXouR0Ay+jpbE++uwyzF6e83Wp22xvcO/9mwK0nAAgaYIBhpzQCWelKDvE6gUn wxyM+fwgVo7Pz2Asd9HSYoLj4GztvuZYsBFZzBWUi0qA220aSn+8+llP1uO1lQUT5qnb jGAACzuIGyMl9BvBFPP75gT0rcUobVT6cpZ0kMtvQfnw9lN7GZNImHcvHOlin/HPvOJp /CuD7HGy8Hxj8Hsb/X3eIKRtNWikl7gFzr7061t8+/Z6wH83Yi/OT7P84lve8PjlTwVd E9Dw== X-Gm-Message-State: AC+VfDxg5DsHbpgJuSptmgKJdYoXKUV3OwY/eMut0597810UGWnAopZD YScLexSgxsv2pzSH/K+PIl1/rbYChzTz17blf0kJzQ== X-Received: by 2002:a25:b290:0:b0:ba8:2889:3b8a with SMTP id k16-20020a25b290000000b00ba828893b8amr1752504ybj.30.1685432468007; Tue, 30 May 2023 00:41:08 -0700 (PDT) MIME-Version: 1.0 References: <57834a703dfa5d6c27c9de0a01329059636e5ab7.1685080579.git.christophe.leroy@csgroup.eu> In-Reply-To: <57834a703dfa5d6c27c9de0a01329059636e5ab7.1685080579.git.christophe.leroy@csgroup.eu> From: Marco Elver Date: Tue, 30 May 2023 09:40:31 +0200 Message-ID: Subject: Re: [PATCH] powerpc/kcsan: Properly instrument arch_spin_unlock() To: Christophe Leroy Cc: Dmitry Vyukov , kasan-dev@googlegroups.com, Michael Ellerman , Nicholas Piggin , linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 29 May 2023 at 17:50, Christophe Leroy wrote: > > The following boottime error is encountered with SMP kernel: > > kcsan: improperly instrumented type=(0): arch_spin_unlock(&arch_spinlock) > kcsan: improperly instrumented type=(0): spin_unlock(&test_spinlock) > kcsan: improperly instrumented type=(KCSAN_ACCESS_WRITE): arch_spin_unlock(&arch_spinlock) > kcsan: improperly instrumented type=(KCSAN_ACCESS_WRITE): spin_unlock(&test_spinlock) > kcsan: improperly instrumented type=(KCSAN_ACCESS_WRITE | KCSAN_ACCESS_COMPOUND): arch_spin_unlock(&arch_spinlock) > kcsan: improperly instrumented type=(KCSAN_ACCESS_WRITE | KCSAN_ACCESS_COMPOUND): spin_unlock(&test_spinlock) > kcsan: selftest: test_barrier failed > kcsan: selftest: 2/3 tests passed > Kernel panic - not syncing: selftests failed > > Properly instrument arch_spin_unlock() with kcsan_mb(). > > Signed-off-by: Christophe Leroy Acked-by: Marco Elver > --- > arch/powerpc/include/asm/simple_spinlock.h | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/arch/powerpc/include/asm/simple_spinlock.h b/arch/powerpc/include/asm/simple_spinlock.h > index 9dcc7e9993b9..4dd12dcb9ef8 100644 > --- a/arch/powerpc/include/asm/simple_spinlock.h > +++ b/arch/powerpc/include/asm/simple_spinlock.h > @@ -15,6 +15,7 @@ > * (the type definitions are in asm/simple_spinlock_types.h) > */ > #include > +#include > #include > #include > #include > @@ -126,6 +127,7 @@ static inline void arch_spin_lock(arch_spinlock_t *lock) > > static inline void arch_spin_unlock(arch_spinlock_t *lock) > { > + kcsan_mb(); > __asm__ __volatile__("# arch_spin_unlock\n\t" > PPC_RELEASE_BARRIER: : :"memory"); > lock->slock = 0; > -- > 2.40.1 >