Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp5239326rwi; Mon, 17 Oct 2022 18:02:41 -0700 (PDT) X-Google-Smtp-Source: AMsMyM4X2aQkE2k21BTRng4qpGRUef4N0l15kuGvYvlN0P/OR0jdAUYGbivNshLcXWTxRC8bHzDh X-Received: by 2002:a05:6402:1e88:b0:45d:88f:4b99 with SMTP id f8-20020a0564021e8800b0045d088f4b99mr363467edf.236.1666054961141; Mon, 17 Oct 2022 18:02:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666054961; cv=none; d=google.com; s=arc-20160816; b=OaCcsUjiEtSqF8+ZcMtSD4PbpgIek9hrWeYNt9Re3y0X6y3CdYZeiKdDR7h2rRAwhn crzlPe52nzGrUalsQc26blGHwC/4Q3wOBBuP+5wW6+4oWdFFuOAsYGrsFvUzJ0Mi4h38 o4ZJAo8CVk7CGVYPx3OkZC+eqmInm43i8FW2E20uG4yqdYJ1q0lRdDRbSJylysPSj6DK JO643Kpb9rg4kjPQ1Lp4xG/q+ksJEUneJKi53LuTd9Ug2y9CJOrhnCWOmtPA8Vl2jVO8 mut/q3hqlS6G6IpDgfHh3N/TkkzV2vBir/GdieYVckXluu2ToRUUMB82669TOe1y+vOf i5JQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=GCJNXLNtMY8PRA9uS4Q+FrbmzG6Ya2XD3+/CMXDAKwk=; b=Gq+0uWJvTfyxpYF4Mh8/LS+GHaxW0tVKQvYx9M1SvniHdNN1Ckull2hoK6Xyye+MXP 03fcgx8WoqBUJrIzmQCHNZXFuoyq7HYrmMuHVUD5FMvaxq3ZmeC6inIgrDnjk+r1c/Tt fATPkLuTmqsBxYPvpCri5lTrDwGCXj0dJLCb71c9btvZsB+xO0zkLLycyfETTfP5J1fu PsT7ONZoL93Xlcw3xw7KYw5ziqEjnmjo/kb5p2bBFsyjpLRdSe6vLl0th7OU0Jp1Zwia KPojQXh4wGQuJtWeGgruxCubV82Zewz2Le0I0heWD/4xMTLX5gAnM7DDkXVa5U6stUPn Jvpw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=helX2wf7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id hd35-20020a17090796a300b0078df86528d3si11389384ejc.99.2022.10.17.18.02.15; Mon, 17 Oct 2022 18:02:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=helX2wf7; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230342AbiJRBAk (ORCPT + 99 others); Mon, 17 Oct 2022 21:00:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44196 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229683AbiJRBAi (ORCPT ); Mon, 17 Oct 2022 21:00:38 -0400 Received: from mail-yb1-xb30.google.com (mail-yb1-xb30.google.com [IPv6:2607:f8b0:4864:20::b30]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 84D9B3910D for ; Mon, 17 Oct 2022 18:00:37 -0700 (PDT) Received: by mail-yb1-xb30.google.com with SMTP id 81so15258530ybf.7 for ; Mon, 17 Oct 2022 18:00:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=GCJNXLNtMY8PRA9uS4Q+FrbmzG6Ya2XD3+/CMXDAKwk=; b=helX2wf70lsOa6PW1by64OgDBGMHa5Hx4FZW0FeaT5jhzITjLNZbHxegSSw9O+jtbj tFgtg4hqQ5tCOxYSpLIZphh0lKjxgag4yD1ehLHhWCaCx8/pXzKbscnEXSUIeqgFAE8L 7/dSGQigATm/O7w4eUIDPr2+FfCUkvBEnPD8W8vSjR2PONlIazKdsNzmKd0H7pu8nTPx wXFPGUr1DxCm2rrSz9hsGhaTDos0Y87xwhHckEg72hwXw3OuI3XaU2iGfSOEKe77NfpR 0HJeNR6iqvWluo0+3U+DSRNkb9oR2YkG6iBMBIlANol9tZbWCMjsvg7PN1hHGO0ACxHN hkug== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=GCJNXLNtMY8PRA9uS4Q+FrbmzG6Ya2XD3+/CMXDAKwk=; b=WMHxX66AovPPU8qXownjj2FnClH7wiVAu5XQyWWWqqTcSa6Pns5NsXyrJXcZpoV9Xw b7m6KwyX1tXi6Dfv5wqvvvl354l4SMzHJHYYEKmUUZ3CT+6MpVAd99g7d5wUF/W/X3yE DyCRz9mpkVSi62YeyT2qSL5Q2Gpg1l16ywOB2nsXA59KHBuLtAyQ+0uSNyYMbTFxMmTF fEg2gIhI+zcu2nx2QHfCmivre8ooyP2me6/MOx1y71NpkgTL0iSCeuIHQ/9eK0LWRqiO OK32cHgGW0DhzVIgZFsjZsl+wuXVrT54G1zO99EOz9dq4Nj0ZYyPFhTZqfZubx2eT1hE UjkQ== X-Gm-Message-State: ACrzQf2mQMGiLDmsvrvfaYxMoe7p0yuU7plhByJxoI4uyTj7MrOgHzJv J/kIcZ6JszuCJMvowdOSfEICSg1/rW9jNRNechrKXw== X-Received: by 2002:a25:c102:0:b0:6c4:c94:2842 with SMTP id r2-20020a25c102000000b006c40c942842mr352652ybf.611.1666054836648; Mon, 17 Oct 2022 18:00:36 -0700 (PDT) MIME-Version: 1.0 References: <20221018000729.2730519-1-sashal@kernel.org> <20221018000729.2730519-22-sashal@kernel.org> In-Reply-To: <20221018000729.2730519-22-sashal@kernel.org> From: Marco Elver Date: Mon, 17 Oct 2022 18:00:00 -0700 Message-ID: Subject: Re: [PATCH AUTOSEL 6.0 22/32] kmsan: disable instrumentation of unsupported common kernel code To: Sasha Levin Cc: linux-kernel@vger.kernel.org, stable@vger.kernel.org, Alexander Potapenko Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [-Cc prune most] Does this mean KMSAN is being backported to stable? I only see a subset of patches. On Mon, 17 Oct 2022 at 17:08, Sasha Levin wrote: > > From: Alexander Potapenko > > [ Upstream commit 79dbd006a6d6f51777ba4948046561b6d9270504 ] > > EFI stub cannot be linked with KMSAN runtime, so we disable > instrumentation for it. > > Instrumenting kcov, stackdepot or lockdep leads to infinite recursion > caused by instrumentation hooks calling instrumented code again. > > Link: https://lkml.kernel.org/r/20220915150417.722975-13-glider@google.com > Signed-off-by: Alexander Potapenko > Reviewed-by: Marco Elver > Cc: Alexander Viro > Cc: Alexei Starovoitov > Cc: Andrey Konovalov > Cc: Andrey Konovalov > Cc: Andy Lutomirski > Cc: Arnd Bergmann > Cc: Borislav Petkov > Cc: Christoph Hellwig > Cc: Christoph Lameter > Cc: David Rientjes > Cc: Dmitry Vyukov > Cc: Eric Biggers > Cc: Eric Biggers > Cc: Eric Dumazet > Cc: Greg Kroah-Hartman > Cc: Herbert Xu > Cc: Ilya Leoshkevich > Cc: Ingo Molnar > Cc: Jens Axboe > Cc: Joonsoo Kim > Cc: Kees Cook > Cc: Mark Rutland > Cc: Matthew Wilcox > Cc: Michael S. Tsirkin > Cc: Pekka Enberg > Cc: Peter Zijlstra > Cc: Petr Mladek > Cc: Stephen Rothwell > Cc: Steven Rostedt > Cc: Thomas Gleixner > Cc: Vasily Gorbik > Cc: Vegard Nossum > Cc: Vlastimil Babka > Signed-off-by: Andrew Morton > Signed-off-by: Sasha Levin > --- > drivers/firmware/efi/libstub/Makefile | 1 + > kernel/Makefile | 1 + > kernel/locking/Makefile | 3 ++- > lib/Makefile | 3 +++ > 4 files changed, 7 insertions(+), 1 deletion(-) > > diff --git a/drivers/firmware/efi/libstub/Makefile b/drivers/firmware/efi/libstub/Makefile > index 2c67f71f2375..2c1eb1fb0f22 100644 > --- a/drivers/firmware/efi/libstub/Makefile > +++ b/drivers/firmware/efi/libstub/Makefile > @@ -53,6 +53,7 @@ GCOV_PROFILE := n > # Sanitizer runtimes are unavailable and cannot be linked here. > KASAN_SANITIZE := n > KCSAN_SANITIZE := n > +KMSAN_SANITIZE := n > UBSAN_SANITIZE := n > OBJECT_FILES_NON_STANDARD := y > > diff --git a/kernel/Makefile b/kernel/Makefile > index 318789c728d3..d754e0be1176 100644 > --- a/kernel/Makefile > +++ b/kernel/Makefile > @@ -38,6 +38,7 @@ KCOV_INSTRUMENT_kcov.o := n > KASAN_SANITIZE_kcov.o := n > KCSAN_SANITIZE_kcov.o := n > UBSAN_SANITIZE_kcov.o := n > +KMSAN_SANITIZE_kcov.o := n > CFLAGS_kcov.o := $(call cc-option, -fno-conserve-stack) -fno-stack-protector > > # Don't instrument error handlers > diff --git a/kernel/locking/Makefile b/kernel/locking/Makefile > index d51cabf28f38..ea925731fa40 100644 > --- a/kernel/locking/Makefile > +++ b/kernel/locking/Makefile > @@ -5,8 +5,9 @@ KCOV_INSTRUMENT := n > > obj-y += mutex.o semaphore.o rwsem.o percpu-rwsem.o > > -# Avoid recursion lockdep -> KCSAN -> ... -> lockdep. > +# Avoid recursion lockdep -> sanitizer -> ... -> lockdep. > KCSAN_SANITIZE_lockdep.o := n > +KMSAN_SANITIZE_lockdep.o := n > > ifdef CONFIG_FUNCTION_TRACER > CFLAGS_REMOVE_lockdep.o = $(CC_FLAGS_FTRACE) > diff --git a/lib/Makefile b/lib/Makefile > index ffabc30a27d4..fcebece0f5b6 100644 > --- a/lib/Makefile > +++ b/lib/Makefile > @@ -275,6 +275,9 @@ obj-$(CONFIG_POLYNOMIAL) += polynomial.o > CFLAGS_stackdepot.o += -fno-builtin > obj-$(CONFIG_STACKDEPOT) += stackdepot.o > KASAN_SANITIZE_stackdepot.o := n > +# In particular, instrumenting stackdepot.c with KMSAN will result in infinite > +# recursion. > +KMSAN_SANITIZE_stackdepot.o := n > KCOV_INSTRUMENT_stackdepot.o := n > > obj-$(CONFIG_REF_TRACKER) += ref_tracker.o > -- > 2.35.1 >