Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp25676879rwd; Sun, 2 Jul 2023 22:42:39 -0700 (PDT) X-Google-Smtp-Source: APBJJlF47khx2KITsg/cmHr7djvr7cTjprNbWUKyBRHzQOgJ7viv9cYzOQzyFH8K6VoKR6vFYSUW X-Received: by 2002:a05:6a00:1506:b0:676:ad06:29d9 with SMTP id q6-20020a056a00150600b00676ad0629d9mr11267182pfu.17.1688362959173; Sun, 02 Jul 2023 22:42:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1688362959; cv=none; d=google.com; s=arc-20160816; b=tmnHy/w5HiLW6EMZPipJ2qZNyGwhIDbX0s1Ekfjhpae2Deqx9An2WlQVgT4tV27PAL 2MwbL2Ya6bsbJzD/btO6VWM3IJKnD7SiUPhRA+RdJnDiQQIBQTZfjlLMXQtN2b+z6kOi k0FzZIUCdr98e1QCKOraITHTk9LhyfcLt5Y/WhcEIfloyknHctIoVpc3FJqY3QXFXvT+ 9lsPrJ/9845wD3hjDuUez7hpAUGWu+68YTb2uPrhntichYT0W3oY330IUEw5gw2B+mwi X/BKqaqi/NW3UyMLNrQWo9dL4wwbpVf+u6zHbPxXaTOvw9iUqP3+4XOPQvGFSxKHnpU5 b4rg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version:date :message-id:subject:references:in-reply-to:cc:to:from; bh=8MG+xQl0+NIyV0+t33oxVoPl+1ZX4KOqqZ+lg3OW3Z0=; fh=HQ3GPcoqjd8LhhktToeb8HBzFOlu1ltYi9ZP/GNdiBM=; b=fz38ME/kmCYTB2y6hQ1vVLa4om0RWx1ez5MGuAi5JF5BgHllWBu7VQqyx6pkKVf4Vf /1TcvLJkL0YKyOBgMXstQ3IesK93tHT9DdavPA0X1aUjHBbt//DxawPMJG2mmb3NaBHV 543zCoGwrwW2vZU8mawBSOereXtIK4naMg6KQsSHjZsxRG6GV8vu+o7NVsTaH8G9EPgn lRNyhdc/XYPBDt2DmAOAZA/MDlkpPR8ihkGsXbzOMCTk6furDAeS00CSO3AqUDUcRKjz lqwevc/FH8ijilTW+q4pS643MkXwq4gxIgN7Uq6JRQQMZ39E7JChK5I6pmQa+INwxjEe 6Psg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id ei24-20020a056a0080d800b0068188beefedsi8721779pfb.88.2023.07.02.22.42.27; Sun, 02 Jul 2023 22:42:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229926AbjGCFem (ORCPT + 99 others); Mon, 3 Jul 2023 01:34:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53980 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229761AbjGCFee (ORCPT ); Mon, 3 Jul 2023 01:34:34 -0400 Received: from gandalf.ozlabs.org (gandalf.ozlabs.org [150.107.74.76]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 701851B6 for ; Sun, 2 Jul 2023 22:34:33 -0700 (PDT) Received: from authenticated.ozlabs.org (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by mail.ozlabs.org (Postfix) with ESMTPSA id 4QvZP416rjz4wxm; Mon, 3 Jul 2023 15:34:32 +1000 (AEST) From: Michael Ellerman To: Marco Elver , Dmitry Vyukov , kasan-dev@googlegroups.com, Nicholas Piggin , Christophe Leroy Cc: linux-kernel@vger.kernel.org, linuxppc-dev@lists.ozlabs.org In-Reply-To: <57834a703dfa5d6c27c9de0a01329059636e5ab7.1685080579.git.christophe.leroy@csgroup.eu> References: <57834a703dfa5d6c27c9de0a01329059636e5ab7.1685080579.git.christophe.leroy@csgroup.eu> Subject: Re: [PATCH] powerpc/kcsan: Properly instrument arch_spin_unlock() Message-Id: <168836201884.50010.3433894878909493070.b4-ty@ellerman.id.au> Date: Mon, 03 Jul 2023 15:26:58 +1000 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_PASS, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 26 May 2023 07:57:33 +0200, Christophe Leroy wrote: > The following boottime error is encountered with SMP kernel: > > kcsan: improperly instrumented type=(0): arch_spin_unlock(&arch_spinlock) > kcsan: improperly instrumented type=(0): spin_unlock(&test_spinlock) > kcsan: improperly instrumented type=(KCSAN_ACCESS_WRITE): arch_spin_unlock(&arch_spinlock) > kcsan: improperly instrumented type=(KCSAN_ACCESS_WRITE): spin_unlock(&test_spinlock) > kcsan: improperly instrumented type=(KCSAN_ACCESS_WRITE | KCSAN_ACCESS_COMPOUND): arch_spin_unlock(&arch_spinlock) > kcsan: improperly instrumented type=(KCSAN_ACCESS_WRITE | KCSAN_ACCESS_COMPOUND): spin_unlock(&test_spinlock) > kcsan: selftest: test_barrier failed > kcsan: selftest: 2/3 tests passed > Kernel panic - not syncing: selftests failed > > [...] Applied to powerpc/next. [1/1] powerpc/kcsan: Properly instrument arch_spin_unlock() https://git.kernel.org/powerpc/c/396f2b0106ff343c61f7ae221dc6ae300f807760 cheers