Received: by 2002:a25:1506:0:0:0:0:0 with SMTP id 6csp5225145ybv; Mon, 17 Feb 2020 15:15:13 -0800 (PST) X-Google-Smtp-Source: APXvYqzdLFjq8t+VYGBmsJjOvpXduYHio+DMFZ9YoFeMT/wpIKm7EHs3+LGKV3283m5lxyeH1Iku X-Received: by 2002:a05:6830:1e72:: with SMTP id m18mr12950969otr.226.1581981313294; Mon, 17 Feb 2020 15:15:13 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1581981313; cv=none; d=google.com; s=arc-20160816; b=FoiX4LWEe8FMitNT0IWpm0MGxjJbvbn/wvolTvu5GjWnGh11OTWtgniXUbkutUkMGQ ZVmF6yQ5216EoMqW6vvibvPyn5e6kC502MhZfOzcqFOIkBkr+fcn1PaHaaA6cn9R0Jwj M+Ix7080e8ZOgDeH3tbeF/wHkjmVnvNC1x9Mz278ogfCXDTqI2fsqO43WKEB98wnGUO7 PbqHeYzBHvgsWurMxsd6t16i1FyGmQqQPJH3rqGDKYXoaFjmReMXBJd1fcDlOhMvPIyX b1Qdz+1oG7N+PleB5iSEzSy2vAAKYTApTlKgFfWkrRSFRcnC0mp54Cnx71DFWhXJdVvJ WflA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:message-id :subject:cc:to:from:date:dkim-signature; bh=JoHzBJRJuq7JzPcDo3r0B7mAFUqN75U2piCXd0s5TP0=; b=DULlNBD+OAeo96M8ukqmW7kC0KNtwLgunehlHV0t+xlhkJ98gtGMDCBr2+iH9WXDqe ZfcW/vIQWl6bQIwesHOTT98V+XdAKiat4s3BAGFLz5o5Agb0Wh78ZS3g3ygmGVFYbpbd ABtFvCv9ApPotqPGoqS0jbRzPo+0V8RszueFGhRNUp9IqRDpTdDxjntCUqcpYoiUv51n tAW5uqpkdDkQeHTOhTNFLtGhxGskUAcD1SyECBXTa1HhuaM59v+lYSySdZk3l7YCDi8s Oh4x7zc82bjcpg9WNolwa7DpnPghpFtAMvZrMSfMuuEuJ6JrkvDah7YNFThyV7HzMdjY rTxw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0tIto54V; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t20si865585otr.64.2020.02.17.15.15.00; Mon, 17 Feb 2020 15:15:13 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0tIto54V; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726070AbgBQXOu (ORCPT + 99 others); Mon, 17 Feb 2020 18:14:50 -0500 Received: from mail.kernel.org ([198.145.29.99]:53544 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725927AbgBQXOu (ORCPT ); Mon, 17 Feb 2020 18:14:50 -0500 Received: from paulmck-ThinkPad-P72.home (50-39-105-78.bvtn.or.frontiernet.net [50.39.105.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id AF81E206E2; Mon, 17 Feb 2020 23:14:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1581981289; bh=ka3ET9vgcGmJZhqnp++/rpmYHRFB7WBmLJG5PCOt4mE=; h=Date:From:To:Cc:Subject:Reply-To:References:In-Reply-To:From; b=0tIto54V0WSrg6IEKghUDK77A848/YWCWeASkijP/9BElL4uNSsthagCLiTYppqGm Q/zrvgsK/RxQitXEKRPya8RIUUNifpGkUGHNsofMRBnqRimWtJ3YmgcNEK9UsEzJNT Q8EBLEtpo6xA6m1eJ+ZRppzZvYvq+fZixlGetIMw= Received: by paulmck-ThinkPad-P72.home (Postfix, from userid 1000) id 836F735227A8; Mon, 17 Feb 2020 15:14:49 -0800 (PST) Date: Mon, 17 Feb 2020 15:14:49 -0800 From: "Paul E. McKenney" To: Qian Cai Cc: Marco Elver , andreyknvl@google.com, glider@google.com, dvyukov@google.com, kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, rostedt@goodmis.org, mingo@redhat.com, x86@kernel.org Subject: Re: [PATCH v2] kcsan, trace: Make KCSAN compatible with tracing Message-ID: <20200217231449.GB2935@paulmck-ThinkPad-P72> Reply-To: paulmck@kernel.org References: <20200214211035.209972-1-elver@google.com> <20200214234004.GT2935@paulmck-ThinkPad-P72> <1581959174.7365.88.camel@lca.pw> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1581959174.7365.88.camel@lca.pw> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Feb 17, 2020 at 12:06:14PM -0500, Qian Cai wrote: > On Fri, 2020-02-14 at 15:40 -0800, Paul E. McKenney wrote: > > On Fri, Feb 14, 2020 at 10:10:35PM +0100, Marco Elver wrote: > > > Previously the system would lock up if ftrace was enabled together with > > > KCSAN. This is due to recursion on reporting if the tracer code is > > > instrumented with KCSAN. > > > > > > To avoid this for all types of tracing, disable KCSAN instrumentation > > > for all of kernel/trace. > > > > > > Furthermore, since KCSAN relies on udelay() to introduce delay, we have > > > to disable ftrace for udelay() (currently done for x86) in case KCSAN is > > > used together with lockdep and ftrace. The reason is that it may corrupt > > > lockdep IRQ flags tracing state due to a peculiar case of recursion > > > (details in Makefile comment). > > > > > > Signed-off-by: Marco Elver > > > Reported-by: Qian Cai > > > Cc: Paul E. McKenney > > > Cc: Steven Rostedt > > > > Queued for review and further testing, thank you! > > > > Qian, does this also fix things for you? > > It works fine. Feel free to use, > > Tested-by: Qian Cai Applied, thank you! Thanx, Paul > > > --- > > > v2: > > > * Fix KCSAN+lockdep+ftrace compatibility. > > > --- > > > arch/x86/lib/Makefile | 5 +++++ > > > kernel/kcsan/Makefile | 2 ++ > > > kernel/trace/Makefile | 3 +++ > > > 3 files changed, 10 insertions(+) > > > > > > diff --git a/arch/x86/lib/Makefile b/arch/x86/lib/Makefile > > > index 432a077056775..6110bce7237bd 100644 > > > --- a/arch/x86/lib/Makefile > > > +++ b/arch/x86/lib/Makefile > > > @@ -8,6 +8,11 @@ KCOV_INSTRUMENT_delay.o := n > > > > > > # KCSAN uses udelay for introducing watchpoint delay; avoid recursion. > > > KCSAN_SANITIZE_delay.o := n > > > +ifdef CONFIG_KCSAN > > > +# In case KCSAN+lockdep+ftrace are enabled, disable ftrace for delay.o to avoid > > > +# lockdep -> [other libs] -> KCSAN -> udelay -> ftrace -> lockdep recursion. > > > +CFLAGS_REMOVE_delay.o = $(CC_FLAGS_FTRACE) > > > +endif > > > > > > # Early boot use of cmdline; don't instrument it > > > ifdef CONFIG_AMD_MEM_ENCRYPT > > > diff --git a/kernel/kcsan/Makefile b/kernel/kcsan/Makefile > > > index df6b7799e4927..d4999b38d1be5 100644 > > > --- a/kernel/kcsan/Makefile > > > +++ b/kernel/kcsan/Makefile > > > @@ -4,6 +4,8 @@ KCOV_INSTRUMENT := n > > > UBSAN_SANITIZE := n > > > > > > CFLAGS_REMOVE_core.o = $(CC_FLAGS_FTRACE) > > > +CFLAGS_REMOVE_debugfs.o = $(CC_FLAGS_FTRACE) > > > +CFLAGS_REMOVE_report.o = $(CC_FLAGS_FTRACE) > > > > > > CFLAGS_core.o := $(call cc-option,-fno-conserve-stack,) \ > > > $(call cc-option,-fno-stack-protector,) > > > diff --git a/kernel/trace/Makefile b/kernel/trace/Makefile > > > index f9dcd19165fa2..6b601d88bf71e 100644 > > > --- a/kernel/trace/Makefile > > > +++ b/kernel/trace/Makefile > > > @@ -6,6 +6,9 @@ ifdef CONFIG_FUNCTION_TRACER > > > ORIG_CFLAGS := $(KBUILD_CFLAGS) > > > KBUILD_CFLAGS = $(subst $(CC_FLAGS_FTRACE),,$(ORIG_CFLAGS)) > > > > > > +# Avoid recursion due to instrumentation. > > > +KCSAN_SANITIZE := n > > > + > > > ifdef CONFIG_FTRACE_SELFTEST > > > # selftest needs instrumentation > > > CFLAGS_trace_selftest_dynamic.o = $(CC_FLAGS_FTRACE) > > > -- > > > 2.25.0.265.gbab2e86ba0-goog > > >