Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp724418ybb; Fri, 10 Apr 2020 08:51:16 -0700 (PDT) X-Google-Smtp-Source: APiQypIbcauF6qvMKTO/Yl4mziw0zD9U3+kOWQ51n0ImWxTtmY0Ak21IsAJstrxxRkjXMDozoXhc X-Received: by 2002:ad4:5a01:: with SMTP id ei1mr5876511qvb.63.1586533876775; Fri, 10 Apr 2020 08:51:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586533876; cv=none; d=google.com; s=arc-20160816; b=Jy26OvjAhDhZZEaPbdYIEsv+Gf0S7KIorj681WaLEXGEjBhIleDLWJQzqQqZ2R2r0N EoHrTj5tXRt3jJ4U04sOcEQQQakPnndwjr3QrFrct/bMCYswmJ76Wv6YrLz9D8ZICBjl fAyOtq5oYi9PB1H9NFk+PBsIzum52nt48hgIYftZUDG55z3r4mpGNyCEkQT1p6GBvkYp SmS7YEhHwftqBoHfz695eW6NzUWewELBr4up1FdUz2R0THQqc79GkB5ByjFQT6Ae9nzy GnCpgbAe7A2I6AWgrONG8OfClzFiKpEwrGByNwNGz0FKlvQEl0wh+A5onYuzC4ln4Rwo Cpbg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:to:references:message-id :content-transfer-encoding:cc:date:in-reply-to:from:subject :mime-version:dkim-signature; bh=ngAyglUW6GXylRlLf8NoeOB2cXhi0dD+XxTxvWca+JA=; b=MvbsRIhBVnbaAGdbR+orjRyEylh0U5uNvO8MBzmX56R4kYj+V3efBIuee7n6V+gdUZ KbrCUWPhKONAN8A2vbv4JX97hr66T7DcsNYfvFMZ+b4v7u2CFeKZJunOwxEK27Rk+6nP IZRM7p285ZpfvT7LCElakmYCPjlEn+/kp6wJcotXRetqtY7E27cq3znFFP+kCfNDj9mP PLdLMYUDy68+WQ6sdAMx3E4wuuQA/Tq+AsifHEPb5ukM6ZC9Ik/Gw1bnJGOqh4UvqJl8 FHlvilSwqqMOrorf0HTXYjLpyT+ArfLCz9vS5e7lHg4QuoSbgUZfGnNSmWy4SDXhg9E1 NWoA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@lca.pw header.s=google header.b=K2kWQODX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l15si1425740qtb.61.2020.04.10.08.51.01; Fri, 10 Apr 2020 08:51:16 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@lca.pw header.s=google header.b=K2kWQODX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726263AbgDJPuN (ORCPT + 99 others); Fri, 10 Apr 2020 11:50:13 -0400 Received: from mail-qk1-f194.google.com ([209.85.222.194]:36897 "EHLO mail-qk1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726080AbgDJPuN (ORCPT ); Fri, 10 Apr 2020 11:50:13 -0400 Received: by mail-qk1-f194.google.com with SMTP id 130so2545702qke.4 for ; Fri, 10 Apr 2020 08:50:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lca.pw; s=google; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ngAyglUW6GXylRlLf8NoeOB2cXhi0dD+XxTxvWca+JA=; b=K2kWQODXWLuYx5R27QDJ/1YBbK+LdcmowXrNptveX2l/RRJTGBA5u7KLRWjt17zNXL /QjyFOThqQfqtasPrjkGjpOg71A6aJ9TVgjPOuyIbe4YxmEYBDyCkAbgsWMFHYy/PFG6 kHsPRqtqm76RasWplqB7SvdyTmfaOrplCG73DT+tBEvWJvM0okK2oKDC7hbOzw+RGwz1 7Ob46NxTz3aro3/g6NTAzBXLMNMS0FSpQ8U7ipa+jo2EJC9ntFdPF0Tt3wqS1HDYF5F5 WA21Oza8jeY/pL4MaqgX6NI44qhss4GPx4+Xv0oUhqj8UTCW7mR8GKbqAWMwJwFhhKe7 tisQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=ngAyglUW6GXylRlLf8NoeOB2cXhi0dD+XxTxvWca+JA=; b=GjpOjfgeFseLaPmDe/acCKjkuisH6OiUKnijBo1OS6gGTBLOlc8IyWUXKktiCiqUsu 1izq/hZeefWWL/W0y/gzOSHgEjv1LBnk11GIpxB2rpkrdDi/4f6XACZvkdQ9s+cOSvlb AvQA4AN5AnHCmJLssW3AIAPER3V8MnjJ+BxmXHWMHFCX9Qdy79A8ZFlth+LN17qLewQ7 2QlF62K+YnaiwzC7hKAqAeY0JWvyT6HAYclPZcXuwacqIDhxsCYITE+w0OnMJdW3EGAQ 3f9f/GRUBNbZ4/4SyY/zC99Hd1PCA1LnWV/U0iXsCD9JvJI9lCnTAjrvx5XNfMUj8of3 MPoQ== X-Gm-Message-State: AGi0PuaIuoqDdgymNavMgNVEzRcbkyxMYeir0Bc5pSaXxgyJx+0yCVUR xeDKT5bLVILq4aNB9Vn/eYVA3GnPt/U0fg== X-Received: by 2002:a37:9c4f:: with SMTP id f76mr4535161qke.294.1586533812612; Fri, 10 Apr 2020 08:50:12 -0700 (PDT) Received: from [192.168.1.153] (pool-71-184-117-43.bstnma.fios.verizon.net. [71.184.117.43]) by smtp.gmail.com with ESMTPSA id 206sm1897059qkn.36.2020.04.10.08.50.11 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 10 Apr 2020 08:50:11 -0700 (PDT) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\)) Subject: Re: KCSAN + KVM = host reset From: Qian Cai In-Reply-To: Date: Fri, 10 Apr 2020 11:50:10 -0400 Cc: Paolo Bonzini , "paul E. McKenney" , kasan-dev , LKML , kvm@vger.kernel.org Content-Transfer-Encoding: quoted-printable Message-Id: References: To: Marco Elver X-Mailer: Apple Mail (2.3608.80.23.2.2) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org > On Apr 10, 2020, at 7:35 AM, Marco Elver wrote: >=20 > On Fri, 10 Apr 2020 at 13:25, Qian Cai wrote: >>=20 >>=20 >>=20 >>> On Apr 10, 2020, at 5:47 AM, Marco Elver wrote: >>>=20 >>> That would contradict what you said about it working if KCSAN is >>> "off". What kernel are you attempting to use in the VM? >=20 > Ah, sorry this was a typo, > s/working if KCSAN/not working if KCSAN/ >=20 >> Well, I said set KCSAN debugfs to =E2=80=9Coff=E2=80=9D did not help, = i.e., it will reset the host running kvm.sh. It is the vanilla ubuntu = 18.04 kernel in VM. >>=20 >> github.com/cailca/linux-mm/blob/master/kvm.sh >=20 > So, if you say that CONFIG_KCSAN_INTERRUPT_WATCHER=3Dn works, that > contradicts it not working when KCSAN is "off". Because if KCSAN is > off, it never sets up any watchpoints, and whether or not > KCSAN_INTERRUPT_WATCHER is selected or not shouldn't matter. Does that > make more sense? >=20 > But from what you say, it's not the type of kernel run in VM. I just > thought there may be some strange interaction if you also run a KCSAN > kernel inside the VM. >=20 > Since I have no way to help debug right now, if you say that > "KCSAN_SANITIZE_svm.o :=3D n" works, I'd suggest that you just send a > patch for that. If you think that's not adequate, it may be possible > to try and find the offending function(s) in that file and add > __no_kcsan to the function(s) that cause problems. This works, --- a/arch/x86/kvm/svm/svm.c +++ b/arch/x86/kvm/svm/svm.c @@ -3278,7 +3278,7 @@ static void svm_cancel_injection(struct kvm_vcpu = *vcpu) =20 bool __svm_vcpu_run(unsigned long vmcb_pa, unsigned long *regs); =20 -static void svm_vcpu_run(struct kvm_vcpu *vcpu) +static __no_kcsan void svm_vcpu_run(struct kvm_vcpu *vcpu) { struct vcpu_svm *svm =3D to_svm(vcpu); Does anyone has any idea why svm_vcpu_run() would be a problem for = KCSAN_INTERRUPT_WATCHER=3Dy? I can only see there are a bunch of assembly code in __svm_vcpu_run() = that might be related?=