Received: by 2002:ac0:c50a:0:0:0:0:0 with SMTP id y10csp1062778imi; Fri, 1 Jul 2022 02:10:55 -0700 (PDT) X-Google-Smtp-Source: AGRyM1trdOnNQc71cC3flOz4plQdthi+YRisPkvn2QJcpV5aGXZz5hUgCBGIc5rB2TeY3UIDTf2w X-Received: by 2002:a05:6402:4411:b0:437:b723:72 with SMTP id y17-20020a056402441100b00437b7230072mr17540900eda.38.1656666655359; Fri, 01 Jul 2022 02:10:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1656666655; cv=none; d=google.com; s=arc-20160816; b=spDdFpU0FDpsw/n17oxNcjcxoac1I0RUxYO6TL6n/AFu9mvRkShZx4g2MBcpLZrH4T b+jyxegK/NVlKOTMjCg1QAxRWAt4m47F3oFKf0RVfA1Niq3k1FipEByMqBdg+VU9XzID ALv1Owuw38RPWa/QsaD301ixymigjXTM9nnqs1s43J1ZkH+GWdn5f2JfiGKyqG0HOEFK YvFLuF2gqn9zysxoLpIpWCZivfLla/j36Z5XGV2uBDk7O49Q+yrcQkCBbLNPFhqfibQz X8A/0ZMiLJhZ9KAX9+AnqFqdHKUNnYyg9L5hNbMg8s8IDpnquD0thKTD4aOtxdO5hs2r hxEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=cWHIzp+3WUp4C4qcj3J1sqQ4NecfP0gvWEDQIXDxCZA=; b=Qpw8XaDrRyTfwX2+AkomPclB/oooVWhzwU0KVAxSYpTYV4Bonln3shxkHqfixOc1uJ 09Q3oNrNTbtofxuelocx1ExEsxA3JauTLToThkzmyuiTDu96nV2oNKIDX6egJuGvHhe1 yw+asrYsxrrpAIDV0Gpb1ZfsLv5EVY23iXEvvObszLXYF9bPh0bXw0rIPuqfYonwnYOH tw9BdC2Vf0EUnvW7UAtVcO/gn5ySvMWBBGoINQoxuELHIP3Ureg7BX5JPSwrYO0kR66v 0iQKvvrNu80TN9Ig+aM5VtZfsFQaQsPPg5uKEv3+316yePqyaC4Q7DdVjOdU7QaWPIE/ coJQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=S7EU9K2E; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id nb37-20020a1709071ca500b00727c6da657asi9516129ejc.596.2022.07.01.02.10.30; Fri, 01 Jul 2022 02:10:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=S7EU9K2E; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235858AbiGAJIp (ORCPT + 99 others); Fri, 1 Jul 2022 05:08:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52872 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233214AbiGAJIm (ORCPT ); Fri, 1 Jul 2022 05:08:42 -0400 Received: from mail-wr1-x42e.google.com (mail-wr1-x42e.google.com [IPv6:2a00:1450:4864:20::42e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0C4BF1F607 for ; Fri, 1 Jul 2022 02:08:40 -0700 (PDT) Received: by mail-wr1-x42e.google.com with SMTP id k7so2211905wrc.12 for ; Fri, 01 Jul 2022 02:08:39 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=cWHIzp+3WUp4C4qcj3J1sqQ4NecfP0gvWEDQIXDxCZA=; b=S7EU9K2ESnYjIFfr8D2s7DQ495eaV/IlS9h8WATLYLoNYo50IyYLAJU77fCyKyxgFo r0KDAbPEhNHeor2q1TMGyfSpWZ2Xxb93kkcUSQNtv4LnMdVjwDsMPFqyprNo+7orPeos T0YMlpbiEu9KMkXpHwTYZRZ1Y+yOT+MT66d40sXDqZnr16PwtKmfq+sd+jMta2ngPbgN fVvUhJWAS69cTCEiqxO4u/LGSZ87g0Sphj3Wx8AHvX56kO0zRHBrUR228J7O2UMoHrxK +4FofEGOpB8u3gWOVTYWFGApS6jm4fYLBdnHAn4sjdmNbgtkmA4HQDHJH5h66wvKNAYe MjWQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=cWHIzp+3WUp4C4qcj3J1sqQ4NecfP0gvWEDQIXDxCZA=; b=CbObj1iA9NsAyhP56oL5uUTgH2spf/y8GwZY6208p0cQjneW+hnFRdpJF/3OnnaJm8 byVuKfDHrkzV5HsiIFzucHZRsNlbXJkmOoeqH0JCeDiOPqBO+V8BkKMHPlK8O1SC1kja Axng0HZMjoCcNpspKDx2cpvBxqpH0TmNu7x4YCKQ83WoIJCKt7Rhc0VFPS7OSG6rrMyb xs0VolDlKlVcQ7VcM+BMYN0L/AV3I/ITtqQiWKBfVF1vGioia0J65EI6hE5mpbJyXzCs zSiRHwNtB24C/qkQHXZe0Gc8nFTphdbj3Jz2q2L3W15iipqKNzPjGTloQMpol6Ln49YK OuYQ== X-Gm-Message-State: AJIora8CEAFr1H0qjmqQMOFlU9V/1HqIlTzkgcnYgXiIGo6dh9EpWgzg lhbynzBtSBtHLT+8zatEiMGBqS98afR0gcV+qJFuTA== X-Received: by 2002:a05:6000:144d:b0:21b:b3cc:162e with SMTP id v13-20020a056000144d00b0021bb3cc162emr12777663wrx.433.1656666518482; Fri, 01 Jul 2022 02:08:38 -0700 (PDT) MIME-Version: 1.0 References: <20220630080834.2742777-1-davidgow@google.com> <20220630080834.2742777-2-davidgow@google.com> <20220630125434.GA20153@axis.com> In-Reply-To: From: David Gow Date: Fri, 1 Jul 2022 17:08:27 +0800 Message-ID: Subject: Re: [PATCH v4 2/2] UML: add support for KASAN under x86_64 To: Andrey Konovalov Cc: Vincent Whitchurch , Dmitry Vyukov , Johannes Berg , Patricia Alfonso , Jeff Dike , Richard Weinberger , "anton.ivanov@cambridgegreys.com" , Brendan Higgins , Andrew Morton , Andrey Ryabinin , kasan-dev , "linux-um@lists.infradead.org" , LKML , Daniel Latypov , "linux-mm@kvack.org" , "kunit-dev@googlegroups.com" Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Jun 30, 2022 at 9:29 PM Andrey Konovalov wrote: > > On Thu, Jun 30, 2022 at 2:54 PM Vincent Whitchurch > wrote: > > > > On Thu, Jun 30, 2022 at 11:41:04AM +0200, Dmitry Vyukov wrote: > > > On Thu, 30 Jun 2022 at 10:08, David Gow wrote: > > > > diff --git a/arch/um/kernel/Makefile b/arch/um/kernel/Makefile > > > > index 1c2d4b29a3d4..a089217e2f0e 100644 > > > > --- a/arch/um/kernel/Makefile > > > > +++ b/arch/um/kernel/Makefile > > > > @@ -27,6 +27,9 @@ obj-$(CONFIG_EARLY_PRINTK) += early_printk.o > > > > obj-$(CONFIG_STACKTRACE) += stacktrace.o > > > > obj-$(CONFIG_GENERIC_PCI_IOMAP) += ioport.o > > > > > > > > +KASAN_SANITIZE_stacktrace.o := n > > > > +KASAN_SANITIZE_sysrq.o := n > > > > > > Why are these needed? > > > It's helpful to leave some comments for any of *_SANITIZE:=n. > > > Otherwise later it's unclear if it's due to some latent bugs, some > > > inherent incompatibility, something that can be fixed, etc. > > > > I believe I saw the stacktrace code itself triggering KASAN splats and > > causing recursion when sanitization was not disabled on it. I noticed > > that other architectures disabled sanitization of their stacktrace code, > > eg. ARM in commit 4d576cab16f57e1f87978f ("ARM: 9028/1: disable KASAN in > > call stack capturing routines"), so I did not investigate it further. > > > > (Note that despite the name, sysrq.c is also just stacktrace code.) > > Stack trace collection code might trigger KASAN splats when walking > stack frames, but this can be resolved by using unchecked accesses. > The main reason to disable instrumentation here is for performance > reasons, see the upcoming patch for arm64 [1] for some details. > > [1] https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git/commit/?id=802b91118d11 Ah -- that does it! Using READ_ONCE_NOCHECK() in dump_trace() gets rid of the nasty recursive KASAN failures we were getting in the tests. I'll send out v5 with those files instrumented again. Thanks! -- David