Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1163424pxa; Thu, 6 Aug 2020 00:49:36 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwafQSd8HSgYiHPCyG+heKP1gECx8xQ3vqs8UcsHtHa1OkMD3szbECfHATMPdAJFQDHrQDR X-Received: by 2002:a17:907:10d9:: with SMTP id rv25mr2923570ejb.264.1596700176354; Thu, 06 Aug 2020 00:49:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596700176; cv=none; d=google.com; s=arc-20160816; b=zQBt6/v1q0rml4hgoTIucczHUbtSjGUGJG1oPBWFnNfggHxC81TzQE4NJ2PAmIm3AJ VHeigBzYJ9uTv//VjAwWWqhdYqjrE5tv6lsp2LIgv41ADWTi0X3hVCHVT8dTEvsMp3XE 2vIDEOIqeeC4TF2MtBole8ZxpLawWKBePlzgK49ZkJ520v5ggWoVMyqBYdjKZXcf19hn Vu9aaInnW0zpnJgg/e4DoYsHqm4Z/QaRKLL+l1lU5kPXLSm1MhklDsHopKvXLQvjX+GR 3VIdnM/BYgCKwfmIokO+9KKBq8Fuxv0gj4E31lQ1NzNNCEe2T093g9KqA6ojJrgrxieQ BiUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=HHOPpgbgSKjDTGkpjqLc9R9y62AcGcDlV5geHTzbj4k=; b=f9c2ruJpjQLZIhwYpQMTD2i0OYi2/K2NXSYCIfaN3Z8lA5ZFaPUFFSwrnp+m6PVsI7 daxYxiz3jgPhIfY+RhpPr8TIyk24sAcbnsOMQ+kEDNJoHEISt9qq2gVjsQdLjM+6jaA/ 6fRhlNrLiySWtuE3r9lNjRsnp+HX6zfK/zPeDZL0PcfcV5dfDINdeo/pEKYNU97bOQAl INJ2r/MMkNBogutwJrvEPUASenO1L5jTfE/5PKmKMNd0VMDq8RjfEI8yXkQdOzG5las+ msr768vXLDXvWm3sqJPvUAaOecPriQFIc2/hoOElytiABJNzgGAFZlYWbNackg04szFE FKwA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=huIdmLYi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id v18si2740313ejb.407.2020.08.06.00.49.14; Thu, 06 Aug 2020 00:49:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=huIdmLYi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728717AbgHFHsh (ORCPT + 99 others); Thu, 6 Aug 2020 03:48:37 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44478 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728367AbgHFHrn (ORCPT ); Thu, 6 Aug 2020 03:47:43 -0400 Received: from mail-wr1-x441.google.com (mail-wr1-x441.google.com [IPv6:2a00:1450:4864:20::441]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7D73CC061574 for ; Thu, 6 Aug 2020 00:47:32 -0700 (PDT) Received: by mail-wr1-x441.google.com with SMTP id f1so42476450wro.2 for ; Thu, 06 Aug 2020 00:47:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=HHOPpgbgSKjDTGkpjqLc9R9y62AcGcDlV5geHTzbj4k=; b=huIdmLYimIV/KSis/VRrs/h7gvLArHfqG/ltX0I5AeF1iCTLGBqMHip1CC1N+4mHTY EEfMhXqOT4Cvy6kSAlvZLnuHOQY4IRpZ2MX9koV7VnA7avsWXz6yypW4cTpVhZ29tE22 MwxXWdZM1LO0bonUk30Tw9sk6/b9Yi+RAShi/FA5zW1/VuySaCdULkCLhzTQQ2bwkHMB +MhJ5/QvsrDCImQvySWulvxTqLlQzJwh2Nzx6jqZ7sw29ZSMZUNKTvtEW7bhxqs8nuiI PWzWj2zoKSmygmQkpLciPPKy6l9moly/qwFssdGb8/3P5TFa6BS2GtwOE3kIzO1vN2or 7NBg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=HHOPpgbgSKjDTGkpjqLc9R9y62AcGcDlV5geHTzbj4k=; b=K1GoMVNXy7i/f6LwdT2CNxD3pJne4uAj2ns1QVuYe4IolDzIZzgR2NRx1gLvPlcXTL RU0rMJUee4jHB+wEyNvBbun+PTpIP4r5b5IFOzPO1pp2zTp6QUs2XXV94jDPcShNYy79 Zmck2k1JxJIRvy0dax4L/VQvU801UnfjFdrlfBbnQwi71hPWNtAgoO9rCsHeV9QzQj1O qD32yhZNxvHjwRMkmwsbMCVCEFBSnMjmZ45yZAQqMD9YGdY2ovl+kvRzyBjmqq1oAdTU NJhZhcJMSPMZ4N4HtZihp0z5d/vvdfp8Pyt+rGiCf+S+rXGLEgTE3TsUsMWyIE8yj025 Pn8A== X-Gm-Message-State: AOAM531YhPrW6tDlQ4Po0CLrQkBoeEJG7BOprh3dkcuX+uZwJxedzHHz 8i5ADA5C48ZUjQe88glXuSpIyw== X-Received: by 2002:adf:e7c3:: with SMTP id e3mr6237105wrn.356.1596700050497; Thu, 06 Aug 2020 00:47:30 -0700 (PDT) Received: from elver.google.com ([100.105.32.75]) by smtp.gmail.com with ESMTPSA id p14sm5943332wrx.90.2020.08.06.00.47.28 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 06 Aug 2020 00:47:28 -0700 (PDT) Date: Thu, 6 Aug 2020 09:47:23 +0200 From: Marco Elver To: Peter Zijlstra Cc: Borislav Petkov , Dave Hansen , fenghua.yu@intel.com, "H. Peter Anvin" , LKML , Ingo Molnar , syzkaller-bugs , Thomas Gleixner , "Luck, Tony" , the arch/x86 maintainers , yu-cheng.yu@intel.com, jgross@suse.com, sdeep@vmware.com, virtualization@lists.linux-foundation.org, kasan-dev , syzbot Subject: Re: [PATCH] x86/paravirt: Add missing noinstr to arch_local*() helpers Message-ID: <20200806074723.GA2364872@elver.google.com> References: <0000000000007d3b2d05ac1c303e@google.com> <20200805132629.GA87338@elver.google.com> <20200805134232.GR2674@hirez.programming.kicks-ass.net> <20200805135940.GA156343@elver.google.com> <20200805141237.GS2674@hirez.programming.kicks-ass.net> <20200805141709.GD35926@hirez.programming.kicks-ass.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.14.4 (2020-06-18) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Aug 05, 2020 at 07:31PM +0200, Marco Elver wrote: ... > Oh well, it seems that KCSAN on syzbot still crashes even with this > "fix". It's harder to reproduce though, and I don't have a clear > reproducer other than "fuzz the kernel" right now. I think the new IRQ > state tracking code is still not compatible with KCSAN, even though we > thought it would be. Most likely there are still ways to get recursion > lockdep->KCSAN. An alternative would be to deal with the recursion > like we did before, instead of trying to squash all of it. I'll try to > investigate -- Peter, if you have ideas, help is appreciated. Testing my hypothesis that raw then nested non-raw local_irq_save/restore() breaks IRQ state tracking -- see the reproducer below. This is at least 1 case I can think of that we're bound to hit. Thanks, -- Marco ------ >8 ------ diff --git a/init/main.c b/init/main.c index 15bd0efff3df..0873319dcff4 100644 --- a/init/main.c +++ b/init/main.c @@ -1041,6 +1041,22 @@ asmlinkage __visible void __init start_kernel(void) sfi_init_late(); kcsan_init(); + /* DEBUG CODE */ + lockdep_assert_irqs_enabled(); /* Pass. */ + { + unsigned long flags1; + raw_local_irq_save(flags1); + { + unsigned long flags2; + lockdep_assert_irqs_enabled(); /* Pass - expectedly blind. */ + local_irq_save(flags2); + lockdep_assert_irqs_disabled(); /* Pass. */ + local_irq_restore(flags2); + } + raw_local_irq_restore(flags1); + } + lockdep_assert_irqs_enabled(); /* FAIL! */ + /* Do the rest non-__init'ed, we're now alive */ arch_call_rest_init();