Received: by 2002:a25:23cc:0:0:0:0:0 with SMTP id j195csp809083ybj; Tue, 5 May 2020 07:52:42 -0700 (PDT) X-Google-Smtp-Source: APiQypLmImFFYLSB+CeSTHWZaXOkLRZnkoDCgV1eSQZ771eZUtWBS/bp4Qqtee69F7437XLWgKtP X-Received: by 2002:a17:906:b2c4:: with SMTP id cf4mr3200141ejb.340.1588690361931; Tue, 05 May 2020 07:52:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588690361; cv=none; d=google.com; s=arc-20160816; b=R7sVb0oaNWou/+hcMiKbu+shOboTiv90TgouC3aznZLZebhZ85GxcB8i+KLuDkguxy xXPAjWVZUqg7t8qq+Twxzj1s3t0W3ND8eRTCjxdHJU79WT0ivDIvtcbSeDlMTiYKe1Sr o1nACmhlwknJDRQaNk6VZxSkZ0Cp3sKhemGLMk7GAlZ9csQvasx7hWR+HgHzDMnW/IZE GN5M55xGrOc9sGuBaA2ujTdoiVGds6SSAuut1nTyAn8PjbrXlHh4M6jnXS06CwRs87NT ItcDgTcO7iDrDY7iM+PLQFHA6Uvr3BiE4PubJy0Z3lM0/eiTdRgRUhc8QAfd588GH4l3 EgjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=7Pq81uf2psyNx4BKzdHn/TmsDqiXEasycTFHLZy0fzE=; b=OICoGyu7KVzBxr8SccjJP7L6kcjTm3RBmwldF9w+yAvxLvMpszD4PMZiIBPYR8VR8c 17WkGO7677u+WEmp/RtXD4Cswqyk2b0d77EMqFvdmfFITiKFy0ljQ9dTzI3xwtpamPpM I+j6ROuFUQHRnWMWjYoENx8mA31NLVG9XOetFuS0PjMGDUMeRHcINWoMnlQqXWFj84Ky NLEuEPVErtXG3p2BZdRkI989oLReWoWpLL6fsm0A6L69IuGjkV6YxMh8r5vqqK3e6Ge7 2yGXYiIlC4dgCyAgzsPtPSHtfcSBp2J99kSKztl/2BXYWxMesh0LNMVcmx80kThA2iWr 7UQw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Zxm+Rr7l; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w24si1266812ejn.277.2020.05.05.07.52.19; Tue, 05 May 2020 07:52:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Zxm+Rr7l; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729470AbgEEOuX (ORCPT + 99 others); Tue, 5 May 2020 10:50:23 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54568 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1729060AbgEEOuW (ORCPT ); Tue, 5 May 2020 10:50:22 -0400 Received: from mail-qv1-xf41.google.com (mail-qv1-xf41.google.com [IPv6:2607:f8b0:4864:20::f41]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 57DE6C061A10 for ; Tue, 5 May 2020 07:50:22 -0700 (PDT) Received: by mail-qv1-xf41.google.com with SMTP id ep1so1123384qvb.0 for ; Tue, 05 May 2020 07:50:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=7Pq81uf2psyNx4BKzdHn/TmsDqiXEasycTFHLZy0fzE=; b=Zxm+Rr7lLpiJvdemTptDsL+2zZbM+zXHxnpdq+7kYHi/FEzupKH81Jbj7V1OVb18eS edWuL+9LercKknTbWawmw/cdwJ956rvQ8sV52vF4ouxcaSQ0iqd+ZhOnIWDlIwCg/mTp ZwSkJEC1OCq5d4PdGYXyCVS2NPE7z3MUKA8AuJY7GoxHXcdxEBL+o1Q8Ha7B6xsEcgsA OaJZj0Ugis6t9KWvqLg1zUTYYsoXtAFuWiG+HKeOZYnKMx8LuB5MWucR0iq4aP0KFYpq WZB9VQE3+obD8DWNcYtJB/drR0OIcwtB03B8jG7w15m7OtCLwcOzw5OKDtcNSFaDYh1O BjFQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=7Pq81uf2psyNx4BKzdHn/TmsDqiXEasycTFHLZy0fzE=; b=r9JYo9hIXYmpO6MQc/TAmPjxW1TDLZr9eft7jx74oLD3rIgCYFwMjbds+nj6mniwY5 /X8vrxTjBq8+sXDeZkB1UCm8E6wGTrQHPk+mRQou06J7RDl0qpAo9D2Qs6Rj5qJyZ1Fk P/196Gnjkx8yHT3d1D85kWgoNcgsZjKuAbA3vvmQNokYysw5JiA8w/G4RhNeFXhYww/c 3/pEmEABAUuJYcmogCfq+lyGaTnFc1sA3aZPK/ybbHf+571dNMVoWuGB0Jzr6a66YpzR PVXI6lXfoGlw72w+1W7PQSNw/xxDCeGmEGPm1wffumWSo5p+k7ysIVJkguCPfPAnuVVH sYsg== X-Gm-Message-State: AGi0PuYiBvfYHbqz9Tkz6GOpwD8SSZsLPmozWYP9azidoJsBxzEU24ai JX2QDohLxZMkxZFP3txPKKFryuTRKP64xyMXzktABA== X-Received: by 2002:a0c:f8cf:: with SMTP id h15mr2976751qvo.22.1588690221148; Tue, 05 May 2020 07:50:21 -0700 (PDT) MIME-Version: 1.0 References: <20200505142341.1096942-1-arnd@arndb.de> In-Reply-To: From: Dmitry Vyukov Date: Tue, 5 May 2020 16:50:09 +0200 Message-ID: Subject: Re: [PATCH] ubsan, kcsan: don't combine sanitizer with kcov To: Marco Elver Cc: Arnd Bergmann , Andrey Ryabinin , Kees Cook , Andrey Konovalov , "Paul E. McKenney" , Ingo Molnar , Andrew Morton , Greg Kroah-Hartman , Stephen Rothwell , Thomas Gleixner , kasan-dev , LKML , clang-built-linux Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, May 5, 2020 at 4:36 PM Marco Elver wrote: > > Clang does not allow -fsanitize-coverage=trace-{pc,cmp} together > > with -fsanitize=bounds or with ubsan: > > > > clang: error: argument unused during compilation: '-fsanitize-coverage=trace-pc' [-Werror,-Wunused-command-line-argument] > > clang: error: argument unused during compilation: '-fsanitize-coverage=trace-cmp' [-Werror,-Wunused-command-line-argument] > > > > To avoid that case, add a Kconfig dependency. The dependency could > > go either way, disabling CONFIG_KCOV or CONFIG_UBSAN_BOUNDS when the > > other is set. I picked the second option here as this seems to have > > a smaller impact on the resulting kernel. > > > > Signed-off-by: Arnd Bergmann > > --- > > lib/Kconfig.kcsan | 2 +- > > lib/Kconfig.ubsan | 1 + > > 2 files changed, 2 insertions(+), 1 deletion(-) > > > > diff --git a/lib/Kconfig.kcsan b/lib/Kconfig.kcsan > > index ea28245c6c1d..8f856c8828d5 100644 > > --- a/lib/Kconfig.kcsan > > +++ b/lib/Kconfig.kcsan > > @@ -5,7 +5,7 @@ config HAVE_ARCH_KCSAN > > > > menuconfig KCSAN > > bool "KCSAN: dynamic data race detector" > > - depends on HAVE_ARCH_KCSAN && DEBUG_KERNEL && !KASAN > > + depends on HAVE_ARCH_KCSAN && DEBUG_KERNEL && !KASAN && !KCOV > > This also disables KCOV with GCC. Why does this not work with KCSAN? > > This is a huge problem for us, since syzbot requires KCOV. In fact > I've always been building KCSAN kernels with CONFIG_KCOV=y (with GCC > or Clang) and cannot reproduce the problem. > > > select STACKTRACE > > help > > The Kernel Concurrency Sanitizer (KCSAN) is a dynamic > > diff --git a/lib/Kconfig.ubsan b/lib/Kconfig.ubsan > > index 929211039bac..f98ef029553e 100644 > > --- a/lib/Kconfig.ubsan > > +++ b/lib/Kconfig.ubsan > > @@ -29,6 +29,7 @@ config UBSAN_TRAP > > config UBSAN_BOUNDS > > bool "Perform array index bounds checking" > > default UBSAN > > + depends on !(CC_IS_CLANG && KCOV) > > Ditto, we really need KCOV for all sanitizers. I also just tried to > reproduce the problem but can't. > > Which version of clang is causing this? I'm currently using Clang 9. > My guess is that we should not fix this by disallowing KCOV, but > rather make Clang work with these configs. > > Dmitry, can you comment? FWIW I can reproduce both with clang: $ clang /tmp/test.c -c -fsanitize-coverage=trace-pc -fsanitize=bounds clang-11: warning: argument unused during compilation: '-fsanitize-coverage=trace-pc' [-Wunused-command-line-argument] $ clang /tmp/test.c -c -fsanitize-coverage=trace-pc -fsanitize=thread clang-11: warning: argument unused during compilation: '-fsanitize-coverage=trace-pc' [-Wunused-command-line-argument] with both my disto's 9.0.1 and fresher 11.0.0 (7b80cb7cf45faf462d6193cc41c2cb7ad556600d. But both work with gcc $ gcc /tmp/test.c -c -fsanitize-coverage=trace-pc -fsanitize=thread $ gcc /tmp/test.c -c -fsanitize-coverage=trace-pc -fsanitize=bounds Is it a known issue in clang? Can we somehow disable it only for clang and not gcc? This will immediately break KCSAN on syzbot as it enables KCSAN and KCOV: https://syzkaller.appspot.com/upstream?manager=ci2-upstream-kcsan-gce