From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id C9AA0C433EF for ; Thu, 18 Nov 2021 11:08:44 +0000 (UTC) Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by mail.kernel.org (Postfix) with ESMTP id 5A50761BCF for ; Thu, 18 Nov 2021 11:08:44 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.4.1 mail.kernel.org 5A50761BCF Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=arm.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=kvack.org Received: by kanga.kvack.org (Postfix) id CAB996B0072; Thu, 18 Nov 2021 06:08:33 -0500 (EST) Received: by kanga.kvack.org (Postfix, from userid 40) id C5C3F6B0073; Thu, 18 Nov 2021 06:08:33 -0500 (EST) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id B4A956B0074; Thu, 18 Nov 2021 06:08:33 -0500 (EST) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0116.hostedemail.com [216.40.44.116]) by kanga.kvack.org (Postfix) with ESMTP id A602B6B0072 for ; Thu, 18 Nov 2021 06:08:33 -0500 (EST) Received: from smtpin01.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay01.hostedemail.com (Postfix) with ESMTP id 5FF88180163A6 for ; Thu, 18 Nov 2021 11:08:23 +0000 (UTC) X-FDA: 78821777370.01.7FE7A37 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by imf10.hostedemail.com (Postfix) with ESMTP id 4A731600198F for ; Thu, 18 Nov 2021 11:08:22 +0000 (UTC) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id ACE881FB; Thu, 18 Nov 2021 03:08:21 -0800 (PST) Received: from lakrids.cambridge.arm.com (usa-sjc-imap-foss1.foss.arm.com [10.121.207.14]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 26D7E3F5A1; Thu, 18 Nov 2021 03:08:19 -0800 (PST) Date: Thu, 18 Nov 2021 11:08:14 +0000 From: Mark Rutland To: Marco Elver Cc: "Paul E. McKenney" , Alexander Potapenko , Boqun Feng , Borislav Petkov , Dmitry Vyukov , Ingo Molnar , Josh Poimboeuf , Peter Zijlstra , Thomas Gleixner , Waiman Long , Will Deacon , kasan-dev@googlegroups.com, linux-arch@vger.kernel.org, linux-doc@vger.kernel.org, linux-kbuild@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, x86@kernel.org Subject: Re: [PATCH v2 01/23] kcsan: Refactor reading of instrumented memory Message-ID: <20211118110813.GA5233@lakrids.cambridge.arm.com> References: <20211118081027.3175699-1-elver@google.com> <20211118081027.3175699-2-elver@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20211118081027.3175699-2-elver@google.com> User-Agent: Mutt/1.11.1+11 (2f07cb52) (2018-12-01) X-Rspamd-Server: rspam11 X-Rspamd-Queue-Id: 4A731600198F X-Stat-Signature: hf9bffz1mojea5ed43p9cdn13xrwso6n Authentication-Results: imf10.hostedemail.com; dkim=none; dmarc=pass (policy=none) header.from=arm.com; spf=pass (imf10.hostedemail.com: domain of mark.rutland@arm.com designates 217.140.110.172 as permitted sender) smtp.mailfrom=mark.rutland@arm.com X-HE-Tag: 1637233702-876184 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Thu, Nov 18, 2021 at 09:10:05AM +0100, Marco Elver wrote: > Factor out the switch statement reading instrumented memory into a > helper read_instrumented_memory(). > > No functional change. > > Signed-off-by: Marco Elver Nice cleanup! Acked-by: Mark Rutland Mark. > --- > kernel/kcsan/core.c | 51 +++++++++++++++------------------------------ > 1 file changed, 17 insertions(+), 34 deletions(-) > > diff --git a/kernel/kcsan/core.c b/kernel/kcsan/core.c > index 4b84c8e7884b..6bfd3040f46b 100644 > --- a/kernel/kcsan/core.c > +++ b/kernel/kcsan/core.c > @@ -325,6 +325,21 @@ static void delay_access(int type) > udelay(delay); > } > > +/* > + * Reads the instrumented memory for value change detection; value change > + * detection is currently done for accesses up to a size of 8 bytes. > + */ > +static __always_inline u64 read_instrumented_memory(const volatile void *ptr, size_t size) > +{ > + switch (size) { > + case 1: return READ_ONCE(*(const u8 *)ptr); > + case 2: return READ_ONCE(*(const u16 *)ptr); > + case 4: return READ_ONCE(*(const u32 *)ptr); > + case 8: return READ_ONCE(*(const u64 *)ptr); > + default: return 0; /* Ignore; we do not diff the values. */ > + } > +} > + > void kcsan_save_irqtrace(struct task_struct *task) > { > #ifdef CONFIG_TRACE_IRQFLAGS > @@ -482,23 +497,7 @@ kcsan_setup_watchpoint(const volatile void *ptr, size_t size, int type, unsigned > * Read the current value, to later check and infer a race if the data > * was modified via a non-instrumented access, e.g. from a device. > */ > - old = 0; > - switch (size) { > - case 1: > - old = READ_ONCE(*(const u8 *)ptr); > - break; > - case 2: > - old = READ_ONCE(*(const u16 *)ptr); > - break; > - case 4: > - old = READ_ONCE(*(const u32 *)ptr); > - break; > - case 8: > - old = READ_ONCE(*(const u64 *)ptr); > - break; > - default: > - break; /* ignore; we do not diff the values */ > - } > + old = read_instrumented_memory(ptr, size); > > /* > * Delay this thread, to increase probability of observing a racy > @@ -511,23 +510,7 @@ kcsan_setup_watchpoint(const volatile void *ptr, size_t size, int type, unsigned > * racy access. > */ > access_mask = ctx->access_mask; > - new = 0; > - switch (size) { > - case 1: > - new = READ_ONCE(*(const u8 *)ptr); > - break; > - case 2: > - new = READ_ONCE(*(const u16 *)ptr); > - break; > - case 4: > - new = READ_ONCE(*(const u32 *)ptr); > - break; > - case 8: > - new = READ_ONCE(*(const u64 *)ptr); > - break; > - default: > - break; /* ignore; we do not diff the values */ > - } > + new = read_instrumented_memory(ptr, size); > > diff = old ^ new; > if (access_mask) > -- > 2.34.0.rc2.393.gf8c9666880-goog >