Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S966697AbbBCRsH (ORCPT ); Tue, 3 Feb 2015 12:48:07 -0500 Received: from mailout1.w1.samsung.com ([210.118.77.11]:52357 "EHLO mailout1.w1.samsung.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S966428AbbBCRnm (ORCPT ); Tue, 3 Feb 2015 12:43:42 -0500 X-AuditID: cbfec7f4-b7f126d000001e9a-b9-54d1083c8368 From: Andrey Ryabinin To: linux-kernel@vger.kernel.org Cc: Andrey Ryabinin , Dmitry Vyukov , Konstantin Serebryany , Dmitry Chernenkov , Andrey Konovalov , Yuri Gribov , Konstantin Khlebnikov , Sasha Levin , Christoph Lameter , Joonsoo Kim , Andrew Morton , Dave Hansen , Andi Kleen , x86@kernel.org, linux-mm@kvack.org, Catalin Marinas Subject: [PATCH v11 11/19] kmemleak: disable kasan instrumentation for kmemleak Date: Tue, 03 Feb 2015 20:43:04 +0300 Message-id: <1422985392-28652-12-git-send-email-a.ryabinin@samsung.com> X-Mailer: git-send-email 2.2.2 In-reply-to: <1422985392-28652-1-git-send-email-a.ryabinin@samsung.com> References: <1404905415-9046-1-git-send-email-a.ryabinin@samsung.com> <1422985392-28652-1-git-send-email-a.ryabinin@samsung.com> X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrALMWRmVeSWpSXmKPExsVy+t/xK7o2HBdDDJ5NY7XY9usRm8XvvTNZ LeasX8NmceTad3aL98t6GC2uf3vDaPHp5QNGi+cPH7JbTHjYxm6xsruZzWL7s7dMFis7H7Ba XN41h83i3pr/rBaLj9xmtnj3bDKzxY8Nj1kdBD3WzFvD6DF/50dGj52z7rJ7LNhU6rF4z0sm j02rOtk8Nn2axO7R9fYKk8eJGb9ZPJ5cmc7k8fHpLRaPvi2rGD0+b5IL4I3isklJzcksSy3S t0vgypj/9DR7wU2uiuv/p7M3ML7g6GLk5JAQMJE4tGsCI4QtJnHh3nq2LkYuDiGBpYwSb+Ye Z4Zw+pgkfu+dwAxSxSagJ/Fv1nY2EFtEQEFic+8zVpAiZoHLLBJrvnxjB0kIC/hL/F66kwXE ZhFQldi27TgTiM0r4C6x6/E1oDgH0Do5iQsf40HCnEDhff3PGCGWNQFtXtzCPIGRdwEjwypG 0dTS5ILipPRcQ73ixNzi0rx0veT83E2MkFj4soNx8TGrQ4wCHIxKPLwrjC6ECLEmlhVX5h5i lOBgVhLh3fMbKMSbklhZlVqUH19UmpNafIiRiYNTqoFRaen55PMRDnJys+Qjyn5tlWFfuGVp 5EuFr/OctubrHzq5bMrSuy+PPPTyib/IXhLLLDIhcFvKpY5JOulSq7c+X6rsapC9+V5Q1R5N 54Mt87svS108Jb4s6BxHnZrJL59frMJfY+c9ffHTSY5x97zmeKUJpfv8YjlXPfmgKRPbNH1P mLLx3wmtSizFGYmGWsxFxYkA+cy0c2MCAAA= Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1567 Lines: 52 kmalloc internally round up allocation size, and kmemleak uses rounded up size as object's size. This makes kasan to complain while kmemleak scans memory or calculates of object's checksum. The simplest solution here is to disable kasan. Signed-off-by: Andrey Ryabinin Acked-by: Catalin Marinas --- mm/kmemleak.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/mm/kmemleak.c b/mm/kmemleak.c index 3cda50c..5405aff 100644 --- a/mm/kmemleak.c +++ b/mm/kmemleak.c @@ -98,6 +98,7 @@ #include #include +#include #include #include #include @@ -1113,7 +1114,10 @@ static bool update_checksum(struct kmemleak_object *object) if (!kmemcheck_is_obj_initialized(object->pointer, object->size)) return false; + kasan_disable_current(); object->checksum = crc32(0, (void *)object->pointer, object->size); + kasan_enable_current(); + return object->checksum != old_csum; } @@ -1164,7 +1168,9 @@ static void scan_block(void *_start, void *_end, BYTES_PER_POINTER)) continue; + kasan_disable_current(); pointer = *ptr; + kasan_enable_current(); object = find_and_get_object(pointer, 1); if (!object) -- 2.2.2 -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/