Files
kernel/include/linux
Marco Elver 0b8b0830ac kcsan: Add core memory barrier instrumentation functions
Add the core memory barrier instrumentation functions. These invalidate
the current in-flight reordered access based on the rules for the
respective barrier types and in-flight access type.

To obtain barrier instrumentation that can be disabled via __no_kcsan
with appropriate compiler-support (and not just with objtool help),
barrier instrumentation repurposes __atomic_signal_fence(), instead of
inserting explicit calls. Crucially, __atomic_signal_fence() normally
does not map to any real instructions, but is still intercepted by
fsanitize=thread. As a result, like any other instrumentation done by
the compiler, barrier instrumentation can be disabled with __no_kcsan.

Unfortunately Clang and GCC currently differ in their __no_kcsan aka
__no_sanitize_thread behaviour with respect to builtin atomics (and
__tsan_func_{entry,exit}) instrumentation. This is already reflected in
Kconfig.kcsan's dependencies for KCSAN_WEAK_MEMORY. A later change will
introduce support for newer versions of Clang that can implement
__no_kcsan to also remove the additional instrumentation introduced by
KCSAN_WEAK_MEMORY.

Signed-off-by: Marco Elver <elver@google.com>
Signed-off-by: Paul E. McKenney <paulmck@kernel.org>
2021-12-09 16:42:26 -08:00
..
2021-10-07 16:51:57 +02:00
2021-10-18 14:43:23 -06:00
2021-10-25 12:01:14 +05:30
2021-10-18 07:49:38 -04:00
2021-10-05 06:54:16 -05:00
2021-10-18 07:49:39 -04:00
2021-09-30 12:46:44 -06:00
2021-09-27 09:27:29 -04:00
2021-11-06 14:08:17 -07:00
2021-11-10 21:16:56 +00:00
2021-10-18 07:49:39 -04:00
2021-09-27 09:27:29 -04:00
2021-09-27 17:00:21 +02:00
2021-10-14 13:29:18 +02:00
2021-10-07 16:51:57 +02:00
2021-10-18 07:49:39 -04:00
2021-10-18 17:20:50 +02:00
2021-10-30 16:37:28 +02:00
2021-11-06 13:30:43 -07:00
2021-10-26 14:58:45 +01:00
2021-11-03 11:41:25 -07:00
2021-10-07 13:51:11 +02:00
2021-10-19 23:44:30 +08:00