Commit 4d09caec authored by Kefeng Wang's avatar Kefeng Wang Committed by Will Deacon

arm64: kcsan: Support detecting more missing memory barriers

As "kcsan: Support detecting a subset of missing memory barriers"[1]
introduced KCSAN_STRICT/KCSAN_WEAK_MEMORY which make kcsan detects
more missing memory barrier, but arm64 don't have KCSAN instrumentation
for barriers, so the new selftest test_barrier() and test cases for
memory barrier instrumentation in kcsan_test module will fail, even
panic on selftest.

Let's prefix all barriers with __ on arm64, as asm-generic/barriers.h
defined the final instrumented version of these barriers, which will
fix the above issues.

Note, barrier instrumentation that can be disabled via __no_kcsan with
appropriate compiler-support (and not just with objtool help), see
commit bd3d5bd1 ("kcsan: Support WEAK_MEMORY with Clang where no
objtool support exists"), it adds disable_sanitizer_instrumentation to
__no_kcsan attribute which will remove all sanitizer instrumentation fully
(with Clang 14.0). Meanwhile, GCC does the same thing with no_sanitize.

[1] https://lore.kernel.org/linux-mm/20211130114433.2580590-1-elver@google.com/Acked-by: default avatarMarco Elver <elver@google.com>
Signed-off-by: default avatarKefeng Wang <wangkefeng.wang@huawei.com>
Acked-by: default avatarCatalin Marinas <catalin.marinas@arm.com>
Link: https://lore.kernel.org/r/20220523113126.171714-3-wangkefeng.wang@huawei.comSigned-off-by: default avatarWill Deacon <will@kernel.org>
parent ed59dfd9
...@@ -50,13 +50,13 @@ ...@@ -50,13 +50,13 @@
#define pmr_sync() do {} while (0) #define pmr_sync() do {} while (0)
#endif #endif
#define mb() dsb(sy) #define __mb() dsb(sy)
#define rmb() dsb(ld) #define __rmb() dsb(ld)
#define wmb() dsb(st) #define __wmb() dsb(st)
#define dma_mb() dmb(osh) #define __dma_mb() dmb(osh)
#define dma_rmb() dmb(oshld) #define __dma_rmb() dmb(oshld)
#define dma_wmb() dmb(oshst) #define __dma_wmb() dmb(oshst)
#define io_stop_wc() dgh() #define io_stop_wc() dgh()
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment