Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp3726944ybk; Tue, 19 May 2020 11:29:27 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwr4/3UspAHnLL1E+O+RXiHceL3OG8GKg28tFo/WxfG0YiTcPS8Q324pVJ3HvI+hOVhFz7b X-Received: by 2002:a50:8307:: with SMTP id 7mr205118edh.283.1589912967319; Tue, 19 May 2020 11:29:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589912967; cv=none; d=google.com; s=arc-20160816; b=ToCy2zrbg5zES4yZFAl83AB7aqJKnY2xw2z0gWiUTLqLWAZheVyvlT04TNE8bzB62A Qn6rC/PM/IJ+PwvqhuspYvjtjDKoZevABV7sivbCOkxJ4TlIg6f/jrxJsB5xCy7WUR3s kCooIEZaHjH9gSBZmCUSQIEixFUevuk4cg12kBP7CJ+nwjL6/XddQgmvhI8E9L+CYNvR EnrnKON48knKubJiPY0yz4E6d4oVukZuZNt4YtuNNUnue/smyvyFWNMzd3Npwf7JYTBl bckywA9y6giWjwGIzJnfjHvOwDz4Ns3+Z3eECwKCLQrZuU7jTiUv8ZI0QurHxtF5eIcb 4IoA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:from:subject:mime-version :message-id:date:dkim-signature; bh=/YztpDs6K8vdorsBByvnDRj+nEKIuoGb/xCbk1LxXf8=; b=JnsVRPu8BqI8yknvrJAG6+o74YJBobR3Xc5mm/Bl4X5tyuqPP9B1bRjNjUkBx3apH1 4/dpLhY+6AMniWwHS3F6wjjF4LYKs0KI9FvxYNpDX3Zowacu7MEyEe1xjs8F2WD0Lfep NDGaIhnwl0XglDS9sih2mHhC99Mk6qrNSSJcr/9/3rCy6HR7E2V54nkSnH15F3WPZo2F cBlHCMNXT5J9/xpMS9cJ7tyOYQ3hVBKcEG882+57SM2ks/Ckh1hw19XCfBbd28vRq9Wr MR584Ap7j2V5ohHk5D75fzb4FylUPeYbHNUfSL1JMlPvV4tSiwILoDs4QR4N7NVr4bzB 0HrQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=S8dNvEpv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k5si144387eds.231.2020.05.19.11.29.03; Tue, 19 May 2020 11:29:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=S8dNvEpv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729549AbgESSZP (ORCPT + 99 others); Tue, 19 May 2020 14:25:15 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37148 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729480AbgESSZI (ORCPT ); Tue, 19 May 2020 14:25:08 -0400 Received: from mail-qv1-xf49.google.com (mail-qv1-xf49.google.com [IPv6:2607:f8b0:4864:20::f49]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D2BF3C08C5C0 for ; Tue, 19 May 2020 11:25:07 -0700 (PDT) Received: by mail-qv1-xf49.google.com with SMTP id dm14so637040qvb.7 for ; Tue, 19 May 2020 11:25:07 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:message-id:mime-version:subject:from:to:cc; bh=/YztpDs6K8vdorsBByvnDRj+nEKIuoGb/xCbk1LxXf8=; b=S8dNvEpvhE+IfpPm75giwVCaRp7o63rsUkXLxrj7ImLgHdi2CIWaV2uRWaWULAp2hb BdHfYBPV3qB1TwxRVPVHr3NEjOJNkTFj/3DHOifWLY5AvwISft0kCLQe7amSF4DDzham TngA37tIZZN0J1lnHTIaF4s0bKvAZzJR0Fwr2gV3phXscBjJxO31CR9TkxU1YajXB/I+ N7/1vqQX+QKWF0J5ogpoosa3s99vmKO6BwAljPiJI7wtzqYDSM9/YZ/sjWrGV6IX+83h 5QfBWwhuT/IksEOCobJwVwxSS8OAGkzeaQVFoIL4khU76tyzhc95TyDjxNCXiSx1a1Si gqyw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:message-id:mime-version:subject:from:to:cc; bh=/YztpDs6K8vdorsBByvnDRj+nEKIuoGb/xCbk1LxXf8=; b=TETE9Zjnn3nJsIIAWfB5M5zESTJg91eZ1Opp1VhMkbVPliTyrgCD6/Yci0zajoqM05 dqgdMl5nG03Kod7U4/WQje+ubBeLDQ1NcDBRe1ajoVbAiaJu065ZU5oyY1fUqmAckDOu Ao5TRv9STbuYTvvFlFBdqTV+8XBjZbCI1D9dPyQ1k7UoKT7EWiTgl2WemkLjQPkE5jNi l45E/aUBmlzVmJRQlBMmXne+rPFZEeCVcjbAEC1QUitwIFGYhPgatI2LlS3x/g7oLRuo i4JCKBgTCg5LLgnKpiTw0SHkz7JuOvMH0B8RAp178o33zIEaUlpxwO21O/VG391RpjJG uUGw== X-Gm-Message-State: AOAM533IFpTi0dinLNrMbmNWxmY6TycG4kDjdg4rvId+vlidOAjRVtPb X2rqF3gNWCQzYdiVsApiUw3PZzaqoA== X-Received: by 2002:a05:6214:3f0:: with SMTP id cf16mr1034113qvb.4.1589912706953; Tue, 19 May 2020 11:25:06 -0700 (PDT) Date: Tue, 19 May 2020 20:24:59 +0200 Message-Id: <20200519182459.87166-1-elver@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.26.2.761.g0e0b3e54be-goog Subject: [PATCH] kasan: Disable branch tracing for core runtime From: Marco Elver To: elver@google.com Cc: dvyukov@google.com, glider@google.com, andreyknvl@google.com, linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, aryabinin@virtuozzo.com, akpm@linux-foundation.org, linux-mm@kvack.org, kernel test robot Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org During early boot, while KASAN is not yet initialized, it is possible to enter reporting code-path and end up in kasan_report(). While uninitialized, the branch there prevents generating any reports, however, under certain circumstances when branches are being traced (TRACE_BRANCH_PROFILING), we may recurse deep enough to cause kernel reboots without warning. To prevent similar issues in future, we should disable branch tracing for the core runtime. Link: https://lore.kernel.org/lkml/20200517011732.GE24705@shao2-debian/ Reported-by: kernel test robot Signed-off-by: Marco Elver --- mm/kasan/Makefile | 16 ++++++++-------- mm/kasan/generic.c | 1 - 2 files changed, 8 insertions(+), 9 deletions(-) diff --git a/mm/kasan/Makefile b/mm/kasan/Makefile index 434d503a6525..de3121848ddf 100644 --- a/mm/kasan/Makefile +++ b/mm/kasan/Makefile @@ -15,14 +15,14 @@ CFLAGS_REMOVE_tags_report.o = $(CC_FLAGS_FTRACE) # Function splitter causes unnecessary splits in __asan_load1/__asan_store1 # see: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=63533 -CFLAGS_common.o := $(call cc-option, -fno-conserve-stack -fno-stack-protector) -CFLAGS_generic.o := $(call cc-option, -fno-conserve-stack -fno-stack-protector) -CFLAGS_generic_report.o := $(call cc-option, -fno-conserve-stack -fno-stack-protector) -CFLAGS_init.o := $(call cc-option, -fno-conserve-stack -fno-stack-protector) -CFLAGS_quarantine.o := $(call cc-option, -fno-conserve-stack -fno-stack-protector) -CFLAGS_report.o := $(call cc-option, -fno-conserve-stack -fno-stack-protector) -CFLAGS_tags.o := $(call cc-option, -fno-conserve-stack -fno-stack-protector) -CFLAGS_tags_report.o := $(call cc-option, -fno-conserve-stack -fno-stack-protector) +CFLAGS_common.o := $(call cc-option, -fno-conserve-stack -fno-stack-protector) -DDISABLE_BRANCH_PROFILING +CFLAGS_generic.o := $(call cc-option, -fno-conserve-stack -fno-stack-protector) -DDISABLE_BRANCH_PROFILING +CFLAGS_generic_report.o := $(call cc-option, -fno-conserve-stack -fno-stack-protector) -DDISABLE_BRANCH_PROFILING +CFLAGS_init.o := $(call cc-option, -fno-conserve-stack -fno-stack-protector) -DDISABLE_BRANCH_PROFILING +CFLAGS_quarantine.o := $(call cc-option, -fno-conserve-stack -fno-stack-protector) -DDISABLE_BRANCH_PROFILING +CFLAGS_report.o := $(call cc-option, -fno-conserve-stack -fno-stack-protector) -DDISABLE_BRANCH_PROFILING +CFLAGS_tags.o := $(call cc-option, -fno-conserve-stack -fno-stack-protector) -DDISABLE_BRANCH_PROFILING +CFLAGS_tags_report.o := $(call cc-option, -fno-conserve-stack -fno-stack-protector) -DDISABLE_BRANCH_PROFILING obj-$(CONFIG_KASAN) := common.o init.o report.o obj-$(CONFIG_KASAN_GENERIC) += generic.o generic_report.o quarantine.o diff --git a/mm/kasan/generic.c b/mm/kasan/generic.c index 56ff8885fe2e..098a7dbaced6 100644 --- a/mm/kasan/generic.c +++ b/mm/kasan/generic.c @@ -15,7 +15,6 @@ */ #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt -#define DISABLE_BRANCH_PROFILING #include #include -- 2.26.2.761.g0e0b3e54be-goog