Blame view
kernel/kcsan/debugfs.c
7.42 KB
dfd402a4c kcsan: Add Kernel... |
1 |
// SPDX-License-Identifier: GPL-2.0 |
178a1877d kcsan: Use pr_fmt... |
2 |
#define pr_fmt(fmt) "kcsan: " fmt |
dfd402a4c kcsan: Add Kernel... |
3 4 5 6 7 8 |
#include <linux/atomic.h> #include <linux/bsearch.h> #include <linux/bug.h> #include <linux/debugfs.h> #include <linux/init.h> #include <linux/kallsyms.h> |
a31201357 kcsan: Add test t... |
9 |
#include <linux/sched.h> |
dfd402a4c kcsan: Add Kernel... |
10 11 12 13 14 15 16 |
#include <linux/seq_file.h> #include <linux/slab.h> #include <linux/sort.h> #include <linux/string.h> #include <linux/uaccess.h> #include "kcsan.h" |
2e986b81f kcsan: Optimize d... |
17 |
atomic_long_t kcsan_counters[KCSAN_COUNTER_COUNT]; |
69b2c81bc kcsan: Simplify d... |
18 19 20 21 22 23 24 25 26 27 28 29 |
static const char *const counter_names[] = { [KCSAN_COUNTER_USED_WATCHPOINTS] = "used_watchpoints", [KCSAN_COUNTER_SETUP_WATCHPOINTS] = "setup_watchpoints", [KCSAN_COUNTER_DATA_RACES] = "data_races", [KCSAN_COUNTER_ASSERT_FAILURES] = "assert_failures", [KCSAN_COUNTER_NO_CAPACITY] = "no_capacity", [KCSAN_COUNTER_REPORT_RACES] = "report_races", [KCSAN_COUNTER_RACES_UNKNOWN_ORIGIN] = "races_unknown_origin", [KCSAN_COUNTER_UNENCODABLE_ACCESSES] = "unencodable_accesses", [KCSAN_COUNTER_ENCODING_FALSE_POSITIVES] = "encoding_false_positives", }; static_assert(ARRAY_SIZE(counter_names) == KCSAN_COUNTER_COUNT); |
dfd402a4c kcsan: Add Kernel... |
30 31 32 33 34 35 |
/* * Addresses for filtering functions from reporting. This list can be used as a * whitelist or blacklist. */ static struct { |
5cbaefe97 kcsan: Improve va... |
36 37 38 39 40 |
unsigned long *addrs; /* array of addresses */ size_t size; /* current size */ int used; /* number of elements used */ bool sorted; /* if elements are sorted */ bool whitelist; /* if list is a blacklist or whitelist */ |
dfd402a4c kcsan: Add Kernel... |
41 |
} report_filterlist = { |
5cbaefe97 kcsan: Improve va... |
42 43 44 45 46 |
.addrs = NULL, .size = 8, /* small initial size */ .used = 0, .sorted = false, .whitelist = false, /* default is blacklist */ |
dfd402a4c kcsan: Add Kernel... |
47 48 |
}; static DEFINE_SPINLOCK(report_filterlist_lock); |
dfd402a4c kcsan: Add Kernel... |
49 50 51 |
/* * The microbenchmark allows benchmarking KCSAN core runtime only. To run * multiple threads, pipe 'microbench=<iters>' from multiple tasks into the |
a31201357 kcsan: Add test t... |
52 |
* debugfs file. This will not generate any conflicts, and tests fast-path only. |
dfd402a4c kcsan: Add Kernel... |
53 |
*/ |
a31201357 kcsan: Add test t... |
54 |
static noinline void microbenchmark(unsigned long iters) |
dfd402a4c kcsan: Add Kernel... |
55 |
{ |
44656d3dc kcsan: Add curren... |
56 57 |
const struct kcsan_ctx ctx_save = current->kcsan_ctx; const bool was_enabled = READ_ONCE(kcsan_enabled); |
dfd402a4c kcsan: Add Kernel... |
58 |
cycles_t cycles; |
44656d3dc kcsan: Add curren... |
59 60 61 62 63 64 65 |
/* We may have been called from an atomic region; reset context. */ memset(¤t->kcsan_ctx, 0, sizeof(current->kcsan_ctx)); /* * Disable to benchmark fast-path for all accesses, and (expected * negligible) call into slow-path, but never set up watchpoints. */ WRITE_ONCE(kcsan_enabled, false); |
178a1877d kcsan: Use pr_fmt... |
66 67 |
pr_info("%s begin | iters: %lu ", __func__, iters); |
dfd402a4c kcsan: Add Kernel... |
68 69 70 |
cycles = get_cycles(); while (iters--) { |
44656d3dc kcsan: Add curren... |
71 72 73 74 |
unsigned long addr = iters & ((PAGE_SIZE << 8) - 1); int type = !(iters & 0x7f) ? KCSAN_ACCESS_ATOMIC : (!(iters & 0xf) ? KCSAN_ACCESS_WRITE : 0); __kcsan_check_access((void *)addr, sizeof(long), type); |
dfd402a4c kcsan: Add Kernel... |
75 76 |
} cycles = get_cycles() - cycles; |
178a1877d kcsan: Use pr_fmt... |
77 78 |
pr_info("%s end | cycles: %llu ", __func__, cycles); |
44656d3dc kcsan: Add curren... |
79 80 81 82 |
WRITE_ONCE(kcsan_enabled, was_enabled); /* restore context */ current->kcsan_ctx = ctx_save; |
dfd402a4c kcsan: Add Kernel... |
83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 |
} static int cmp_filterlist_addrs(const void *rhs, const void *lhs) { const unsigned long a = *(const unsigned long *)rhs; const unsigned long b = *(const unsigned long *)lhs; return a < b ? -1 : a == b ? 0 : 1; } bool kcsan_skip_report_debugfs(unsigned long func_addr) { unsigned long symbolsize, offset; unsigned long flags; bool ret = false; if (!kallsyms_lookup_size_offset(func_addr, &symbolsize, &offset)) return false; |
5cbaefe97 kcsan: Improve va... |
101 |
func_addr -= offset; /* Get function start */ |
dfd402a4c kcsan: Add Kernel... |
102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 |
spin_lock_irqsave(&report_filterlist_lock, flags); if (report_filterlist.used == 0) goto out; /* Sort array if it is unsorted, and then do a binary search. */ if (!report_filterlist.sorted) { sort(report_filterlist.addrs, report_filterlist.used, sizeof(unsigned long), cmp_filterlist_addrs, NULL); report_filterlist.sorted = true; } ret = !!bsearch(&func_addr, report_filterlist.addrs, report_filterlist.used, sizeof(unsigned long), cmp_filterlist_addrs); if (report_filterlist.whitelist) ret = !ret; out: spin_unlock_irqrestore(&report_filterlist_lock, flags); return ret; } static void set_report_filterlist_whitelist(bool whitelist) { unsigned long flags; spin_lock_irqsave(&report_filterlist_lock, flags); report_filterlist.whitelist = whitelist; spin_unlock_irqrestore(&report_filterlist_lock, flags); } /* Returns 0 on success, error-code otherwise. */ static ssize_t insert_report_filterlist(const char *func) { unsigned long flags; unsigned long addr = kallsyms_lookup_name(func); ssize_t ret = 0; if (!addr) { |
178a1877d kcsan: Use pr_fmt... |
141 142 |
pr_err("could not find function: '%s' ", func); |
dfd402a4c kcsan: Add Kernel... |
143 144 145 146 147 148 149 150 151 |
return -ENOENT; } spin_lock_irqsave(&report_filterlist_lock, flags); if (report_filterlist.addrs == NULL) { /* initial allocation */ report_filterlist.addrs = kmalloc_array(report_filterlist.size, |
52785b6ae kcsan: Use GFP_AT... |
152 |
sizeof(unsigned long), GFP_ATOMIC); |
dfd402a4c kcsan: Add Kernel... |
153 154 155 156 157 158 159 160 161 |
if (report_filterlist.addrs == NULL) { ret = -ENOMEM; goto out; } } else if (report_filterlist.used == report_filterlist.size) { /* resize filterlist */ size_t new_size = report_filterlist.size * 2; unsigned long *new_addrs = krealloc(report_filterlist.addrs, |
52785b6ae kcsan: Use GFP_AT... |
162 |
new_size * sizeof(unsigned long), GFP_ATOMIC); |
dfd402a4c kcsan: Add Kernel... |
163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 |
if (new_addrs == NULL) { /* leave filterlist itself untouched */ ret = -ENOMEM; goto out; } report_filterlist.size = new_size; report_filterlist.addrs = new_addrs; } /* Note: deduplicating should be done in userspace. */ report_filterlist.addrs[report_filterlist.used++] = kallsyms_lookup_name(func); report_filterlist.sorted = false; out: spin_unlock_irqrestore(&report_filterlist_lock, flags); |
5cbaefe97 kcsan: Improve va... |
181 |
|
dfd402a4c kcsan: Add Kernel... |
182 183 184 185 186 187 188 189 190 191 192 |
return ret; } static int show_info(struct seq_file *file, void *v) { int i; unsigned long flags; /* show stats */ seq_printf(file, "enabled: %i ", READ_ONCE(kcsan_enabled)); |
2e986b81f kcsan: Optimize d... |
193 194 195 196 197 |
for (i = 0; i < KCSAN_COUNTER_COUNT; ++i) { seq_printf(file, "%s: %ld ", counter_names[i], atomic_long_read(&kcsan_counters[i])); } |
dfd402a4c kcsan: Add Kernel... |
198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 |
/* show filter functions, and filter type */ spin_lock_irqsave(&report_filterlist_lock, flags); seq_printf(file, " %s functions: %s ", report_filterlist.whitelist ? "whitelisted" : "blacklisted", report_filterlist.used == 0 ? "none" : ""); for (i = 0; i < report_filterlist.used; ++i) seq_printf(file, " %ps ", (void *)report_filterlist.addrs[i]); spin_unlock_irqrestore(&report_filterlist_lock, flags); return 0; } static int debugfs_open(struct inode *inode, struct file *file) { return single_open(file, show_info, NULL); } |
5cbaefe97 kcsan: Improve va... |
218 219 |
static ssize_t debugfs_write(struct file *file, const char __user *buf, size_t count, loff_t *off) |
dfd402a4c kcsan: Add Kernel... |
220 221 222 223 224 225 226 227 228 229 230 231 232 233 |
{ char kbuf[KSYM_NAME_LEN]; char *arg; int read_len = count < (sizeof(kbuf) - 1) ? count : (sizeof(kbuf) - 1); if (copy_from_user(kbuf, buf, read_len)) return -EFAULT; kbuf[read_len] = '\0'; arg = strstrip(kbuf); if (!strcmp(arg, "on")) { WRITE_ONCE(kcsan_enabled, true); } else if (!strcmp(arg, "off")) { WRITE_ONCE(kcsan_enabled, false); |
a4e74fa5f kcsan: Simplify c... |
234 |
} else if (str_has_prefix(arg, "microbench=")) { |
dfd402a4c kcsan: Add Kernel... |
235 |
unsigned long iters; |
a4e74fa5f kcsan: Simplify c... |
236 |
if (kstrtoul(&arg[strlen("microbench=")], 0, &iters)) |
dfd402a4c kcsan: Add Kernel... |
237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 |
return -EINVAL; microbenchmark(iters); } else if (!strcmp(arg, "whitelist")) { set_report_filterlist_whitelist(true); } else if (!strcmp(arg, "blacklist")) { set_report_filterlist_whitelist(false); } else if (arg[0] == '!') { ssize_t ret = insert_report_filterlist(&arg[1]); if (ret < 0) return ret; } else { return -EINVAL; } return count; } |
5cbaefe97 kcsan: Improve va... |
254 255 256 257 258 259 260 |
static const struct file_operations debugfs_ops = { .read = seq_read, .open = debugfs_open, .write = debugfs_write, .release = single_release }; |
dfd402a4c kcsan: Add Kernel... |
261 262 263 264 265 |
void __init kcsan_debugfs_init(void) { debugfs_create_file("kcsan", 0644, NULL, NULL, &debugfs_ops); } |