Received: by 2002:a05:6a10:c604:0:0:0:0 with SMTP id y4csp2640483pxt; Mon, 9 Aug 2021 05:38:49 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy27q8ICyCiRKpgCnw1XVcmEuZ++TdwVCC4/VBJi5YZAX0hRXJ+AGFt41vHBg7l6L1fFCNe X-Received: by 2002:a05:6402:8cf:: with SMTP id d15mr8226848edz.118.1628512729198; Mon, 09 Aug 2021 05:38:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1628512729; cv=none; d=google.com; s=arc-20160816; b=slinydvrPxwjQ+2Q8xfWXwubDmxrIGiEfe8CGfjA7lTPV/Jg7gjEoDLsny8XoS+rRf S5lAUZbJU02XtHK8xUjnVJCuhRrDKMrie5mL7tOHKOkRpC2YCix8aT4ncsirqKsrQFpt 5IeyLEUWAJRMcP+VpVlkU084cbH0XfUT6NIAoyLRplPVBFoP/HkQlmTdzgGiB29AA2md A9gbA+qEYO50fj19DR6RpkMaj2GIoxnYBTCa5c0vYPlte4fQZAU22p/5FnHA5WiMENw1 RCinhcH9PPBqvVf42QPvNMlzhDKYXqvpNEaUUjcTqwJyrwfsIcSoN7c9InhUi5eSjo/J saoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:mime-version:message-id:date :dkim-signature; bh=pk34E2M+ZiZK0Nfsu3ClbxlgUD+rETQhezjkayYFVhg=; b=NQmdx1GL/QZWMXT7t0M9GZu4hToRJ9gqWXMRDyLCmaToyKu0RrBuPMpXOk6/nGGQ81 QaE++jIPui7LvUWRnSZFmf9q9AVegn6hEAfvP+jSxD57BLvdOwKddnVva2Z1/j1cZkbG HnA1oJR4H35EZooEy3lOfDa06bQD76BkM2jvQ4e/aS5rT9MIFmzvGFjUCwaROEmQN8+5 4ivvCknV3t2hZFaZHMyBdRm8fkQSfO5Lkjb2gG/KBbUv/M9K/hcRT2U/PG2+8e1++Rc2 aHdqumjQmkA5ixWBAqkfU1p4QvBcWoUiFkCH21DVBhlhaADR3GH0KHMo7tsRgjQEqjv/ fhOA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=OEtXS1km; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a4si18307558edx.8.2021.08.09.05.38.25; Mon, 09 Aug 2021 05:38:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=OEtXS1km; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234986AbhHIL0A (ORCPT + 99 others); Mon, 9 Aug 2021 07:26:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59674 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235108AbhHILZ6 (ORCPT ); Mon, 9 Aug 2021 07:25:58 -0400 Received: from mail-qk1-x749.google.com (mail-qk1-x749.google.com [IPv6:2607:f8b0:4864:20::749]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 61C8EC0613D3 for ; Mon, 9 Aug 2021 04:25:37 -0700 (PDT) Received: by mail-qk1-x749.google.com with SMTP id b190-20020a3767c70000b02903ca0967b842so10727166qkc.9 for ; Mon, 09 Aug 2021 04:25:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:message-id:mime-version:subject:from:to:cc; bh=pk34E2M+ZiZK0Nfsu3ClbxlgUD+rETQhezjkayYFVhg=; b=OEtXS1kmnL/zNY30uElQkaXnDwYbsbh4IgsfXYc60coZ420GiYZcJ9cyv8vB9cyOAD yLCjh3Ibk6TmFwAec1FAFgY7ZtrMJIY66xQ9WPFbAORKfgJt0/bv59HQZRueDTiwejXD 1FqsNrQO8wizlSc5BIKEpbmYyBvkrMXQ7EcOcsy6omPn81JuxoxcHnZJEID9YbGdkWjX E8Hf2OVDPg4wTMTyijXs0UPQyZDrF8JaHsfPoT1929ZqBzfDbNsDb56N8bHqAEyf4wY1 eMrqKNEQ6EO8SaeTtoLbHTSJvAcWPE2OUgcS2G6SM6XYchPGVdvHh04lv2TgmjDuXhRx 6HEA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:message-id:mime-version:subject:from:to:cc; bh=pk34E2M+ZiZK0Nfsu3ClbxlgUD+rETQhezjkayYFVhg=; b=tLRI1Rc+Lh9IriQyycuwFOxC6fA27Q03yu26msKYK0XlJxyFdireQdBfCYZtnNDxBx 3Edoij4Ct2EjAjSKX+i79DKu6nZKG95xawJqJ0gXzguV8nd2aPUYDtWzN8qOURbh7icB yq3754qHxUKBrx/NYd+CHXrciAv6BLPTdJM7HpA9NPW8fPgh46n9sUdk9wkdKZvpw38S QSCztLgKYihLXHkF2b2NkTJpG5SXbd+h6xqBVPiixrQN/qUi/DSRcDjubRNdmJ1VRoPc czAwhrW4jBGg5eRRblqR4xlq7Xo3AJWQEFIcZJNeSDpmfKCLGx3J3Z9p6RdrnUbIqyeD ya8Q== X-Gm-Message-State: AOAM5335HQuazSs4DG4sty1m7r8zCZDa36veRLEdQ0jWYnJiftckWVkr pUgYIKMc3zO1MnV0a1L3tzSdpg5y5g== X-Received: from elver.muc.corp.google.com ([2a00:79e0:15:13:e5a3:e652:2b8b:ef12]) (user=elver job=sendgmr) by 2002:a05:6214:76d:: with SMTP id f13mr22832309qvz.53.1628508335890; Mon, 09 Aug 2021 04:25:35 -0700 (PDT) Date: Mon, 9 Aug 2021 13:25:08 +0200 Message-Id: <20210809112516.682816-1-elver@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.32.0.605.g8dce9f2422-goog Subject: [PATCH 0/8] kcsan: Cleanups and fix reporting for scoped accesses From: Marco Elver To: elver@google.com, paulmck@kernel.org Cc: mark.rutland@arm.com, dvyukov@google.com, glider@google.com, boqun.feng@gmail.com, kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This series contains several test fixes and cleanups, as well as fixing reporting for scoped accesses. Thus far, scoped accesses' stack traces could point anywhere in the scope, and can be quite confusing when searching for the relevant access scope several stack frames down. This is fixed by using the original instruction pointer of the location where the scoped access was set up. There are more changes coming that depend on the fixed reporting, but it made more sense to detach the changes in this series as they are useful on their own and only touch core KCSAN code. Marco Elver (8): kcsan: test: Defer kcsan_test_init() after kunit initialization kcsan: test: Use kunit_skip() to skip tests kcsan: test: Fix flaky test case kcsan: Add ability to pass instruction pointer of access to reporting kcsan: Save instruction pointer for scoped accesses kcsan: Start stack trace with explicit location if provided kcsan: Support reporting scoped read-write access type kcsan: Move ctx to start of argument list include/linux/kcsan-checks.h | 3 ++ kernel/kcsan/core.c | 75 ++++++++++++++++++++--------------- kernel/kcsan/kcsan.h | 8 ++-- kernel/kcsan/kcsan_test.c | 62 +++++++++++++++++++---------- kernel/kcsan/report.c | 77 ++++++++++++++++++++++++++++++------ 5 files changed, 156 insertions(+), 69 deletions(-) -- 2.32.0.605.g8dce9f2422-goog