Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp5809054ybg; Tue, 22 Oct 2019 08:40:48 -0700 (PDT) X-Google-Smtp-Source: APXvYqwQvkH2qLvq4z6Pk4GJZSj9wHq5Hzn59F9Uf4uEaDfrQbPwi5igAsolIZpZA6/uU3hXMBO8 X-Received: by 2002:a50:ed05:: with SMTP id j5mr31775739eds.251.1571758848729; Tue, 22 Oct 2019 08:40:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571758848; cv=none; d=google.com; s=arc-20160816; b=Qt8IGtuD7JWb+PQzplJ5nJEyi5W4UFq/Sbqjc47icitt3fALu/tr5bQGUjKnJ71f/H GnGrIrO1CvnUl1rws+WlP1T77rCepfuctzuE887+v0OziUTT8TMMQx2jW832q+4Yd8e9 JiHUggZxXIMeGOSolx1XDaPcPgbuUUo+MyccT7LTt+xIAbvuIMl8itY4o+h8zk50ku6I qfkAwPMD2kmv/PL4eIcyy/HMuHufukYnYdZopDVi0bnFpuMoEhCN0FKTzbRYTdgEpfkC NxoSJZrXUnNbCx+ldfoFYMNUAbgwF13rtDjVo0dFTAb4W7ecnJmxGMMs2B+siA1cEZ/I hyow== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=kuKLQUxYTkpNquMkRmE+sotbdgdLrnH62e1xn6PHfbU=; b=JGvxagBIwO1rdJBjOmsqXNnPsbOWpq8pzuhN/HGLXDWsKtags6qJ3Kar4S6VM0jn7b f5RNkOxZoHKb9hktDXkLdhFwhybL9XX5Tsh+TItdFjln0clm4Av4cKKyXo6w6Q1ePpSS +3kJxbRcmi2VerzI1TKCLi/0VGBw6yGp7/jJ7nzhbM22d/T4gUCDuC1wkxq1hM9iQDE4 QhOh7QqVjXbWXe/83fKxAQ1uqtAAG9JHhvhdjQhjuIDoxai6ZB0iRqTtkZeBzzVPS+Ou wmoc5VrSW1E48lfoFcDGgPAEu9Ijd8hAVZTq02+3c/ru72Lb5PtgwphA/gJb9FomdKUA 3LhQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=OA8cRa7t; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v13si11667203edy.441.2019.10.22.08.40.24; Tue, 22 Oct 2019 08:40:48 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=OA8cRa7t; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731622AbfJVNCv (ORCPT + 99 others); Tue, 22 Oct 2019 09:02:51 -0400 Received: from mail-oi1-f193.google.com ([209.85.167.193]:34738 "EHLO mail-oi1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731583AbfJVNCu (ORCPT ); Tue, 22 Oct 2019 09:02:50 -0400 Received: by mail-oi1-f193.google.com with SMTP id 83so14101712oii.1 for ; Tue, 22 Oct 2019 06:02:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=kuKLQUxYTkpNquMkRmE+sotbdgdLrnH62e1xn6PHfbU=; b=OA8cRa7tD6FPhuQ4fOfUw/N5hOeyF7n/lLzNq3Ht4ejf7flFCx3QqXSB5bOT1sLk73 ZsryZ3JVOnRII4PQhu6d29eVoQye7p4mGl8rHMBpQgoiZzib5f6zyc7OVSxrZYXHFDpH gRYOr6/6wRM57aYrxTehevcSTyrRWPDQ2eYFYNJPStg78PuxujyDxr3z66sy68ynlc8V cdWBK4hJXpdo806HSFYYN/pKKpf5xyJ2W+nA8dkv3Ku7Zt/5LIlFI5ETaE6sVUO+GY8A kiPxxwJp8i0cpt9wfhKYSMxbt4zahzUejFDk87y6aY5rE4ozijMMry/LOQ0WiLDqDqr8 pYrg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=kuKLQUxYTkpNquMkRmE+sotbdgdLrnH62e1xn6PHfbU=; b=iXItLkQDDp6lSQrHDcADHPAqwebZcAptUZR5JI0/9DDsHIeELBWSxO/7vSZdY5rE4d IFset3OiVx9Q8FnAjmAyNXFzI8xXeKGsVHIfimF555hQx9XBmWg80WLSxpUi3SXon3EF k6IbiNFC/BE50qANTx2CkzzFWLBn69ZgMdgZGY+C8w5mjPPyOcXxa5oZa+BtU9mzZays Rk1rbkiUpLEcWariUu3CWBivohIiS+pAXGEPiBRu7IpefLqaG4IdtBDcPY+wB89/0W9G jd6G2Ia2KwVydGgTqC73kZdWlrLtP+As+2Jigg4uxZu5drCWKqZ6+xAd0n3NH2mWBgzM ny3A== X-Gm-Message-State: APjAAAXARbM37tBRif9B+11ms8nXfHD++/lBwZC5kpovDPsFiChOz6Lh OmMNjBPltBoN5nwxs2VIy6YGHtebssyYEEEfrSBKJg== X-Received: by 2002:aca:f1a:: with SMTP id 26mr2807399oip.172.1571749369044; Tue, 22 Oct 2019 06:02:49 -0700 (PDT) MIME-Version: 1.0 References: <20191017141305.146193-1-elver@google.com> <20191017141305.146193-9-elver@google.com> <20191022125921.GD11583@lakrids.cambridge.arm.com> In-Reply-To: <20191022125921.GD11583@lakrids.cambridge.arm.com> From: Marco Elver Date: Tue, 22 Oct 2019 15:02:37 +0200 Message-ID: Subject: Re: [PATCH v2 8/8] x86, kcsan: Enable KCSAN for x86 To: Mark Rutland Cc: LKMM Maintainers -- Akira Yokosawa , Alan Stern , Alexander Potapenko , Andrea Parri , Andrey Konovalov , Andy Lutomirski , Ard Biesheuvel , Arnd Bergmann , Boqun Feng , Borislav Petkov , Daniel Axtens , Daniel Lustig , Dave Hansen , David Howells , Dmitry Vyukov , "H. Peter Anvin" , Ingo Molnar , Jade Alglave , Joel Fernandes , Jonathan Corbet , Josh Poimboeuf , Luc Maranget , Nicholas Piggin , "Paul E. McKenney" , Peter Zijlstra , Thomas Gleixner , Will Deacon , kasan-dev , linux-arch , "open list:DOCUMENTATION" , linux-efi@vger.kernel.org, Linux Kbuild mailing list , LKML , Linux Memory Management List , "the arch/x86 maintainers" Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 22 Oct 2019 at 14:59, Mark Rutland wrote: > > On Thu, Oct 17, 2019 at 04:13:05PM +0200, Marco Elver wrote: > > This patch enables KCSAN for x86, with updates to build rules to not use > > KCSAN for several incompatible compilation units. > > > > Signed-off-by: Marco Elver > > --- > > v2: > > * Document build exceptions where no previous above comment explained > > why we cannot instrument. > > --- > > arch/x86/Kconfig | 1 + > > arch/x86/boot/Makefile | 2 ++ > > arch/x86/boot/compressed/Makefile | 2 ++ > > arch/x86/entry/vdso/Makefile | 3 +++ > > arch/x86/include/asm/bitops.h | 6 +++++- > > arch/x86/kernel/Makefile | 7 +++++++ > > arch/x86/kernel/cpu/Makefile | 3 +++ > > arch/x86/lib/Makefile | 4 ++++ > > arch/x86/mm/Makefile | 3 +++ > > arch/x86/purgatory/Makefile | 2 ++ > > arch/x86/realmode/Makefile | 3 +++ > > arch/x86/realmode/rm/Makefile | 3 +++ > > drivers/firmware/efi/libstub/Makefile | 2 ++ > > 13 files changed, 40 insertions(+), 1 deletion(-) > > > diff --git a/drivers/firmware/efi/libstub/Makefile b/drivers/firmware/efi/libstub/Makefile > > index 0460c7581220..693d0a94b118 100644 > > --- a/drivers/firmware/efi/libstub/Makefile > > +++ b/drivers/firmware/efi/libstub/Makefile > > @@ -31,7 +31,9 @@ KBUILD_CFLAGS := $(cflags-y) -DDISABLE_BRANCH_PROFILING \ > > -D__DISABLE_EXPORTS > > > > GCOV_PROFILE := n > > +# Sanitizer runtimes are unavailable and cannot be linked here. > > KASAN_SANITIZE := n > > +KCSAN_SANITIZE := n > > UBSAN_SANITIZE := n > > OBJECT_FILES_NON_STANDARD := y > > Not a big deal, but it might make sense to move the EFI stub exception > to patch 3 since it isn't x86 specific (and will also apply for arm64). Thanks for spotting, moved for v3. -- Marco > Otherwise this looks good to me. > > Thanks, > Mark.