Received: by 2002:a25:c205:0:0:0:0:0 with SMTP id s5csp3832236ybf; Tue, 3 Mar 2020 13:46:52 -0800 (PST) X-Google-Smtp-Source: ADFU+vtaJW6PtKVY0+COR81gLcvMuZCvYTzi36VyOxVVb2GuhuCXKjH3qwPA6M6nsGkXGW41m2MZ X-Received: by 2002:a05:6830:1b6e:: with SMTP id d14mr4938486ote.117.1583272012130; Tue, 03 Mar 2020 13:46:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1583272012; cv=none; d=google.com; s=arc-20160816; b=K0/B6qfyQG60J4mMMrjY+ihgebXlIf36zihTCM77u47wJNCBii2t97l1pR7tSprxiA AA5OcF/dWw4rQs/nz15d1f5+WTqvdwbL/tjmoI5isl/Z109A6QS/MQaE9OWFhqfgSpee 0nSfQb1bAzIwWPE2gHdO7+c49u2NNAhf5CSD0HxQ6UeiHmsGzjx6EQh0yMwCC/O84UsN l9y7ztSMHkKexnXtgl58Bl/Se/sP8OHl2C3XO6Hsc3rdu5BYNBcGabilPIAgRsFpOeU6 5YtWgucnXet7e7dMXxmEy3jP6PCRdc0IRhFoVk7RKDrsVFsuSh2omEx+nlAEf7LXbrrR AFDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=P2kzWYnhHNwPKndZNxUfTV8Fu7co3KaoSWSaF0iBUUU=; b=Icx6S8Dgzu5yAI2MRpjOoNlbyaGSpFCcWeR2T1OmXo4G7m5jNxaHVoK8bublE8W6GQ qWZgFij8fwKbH8NuhXJK6kfcowlwbSie1MgMRMG2qpJ0exmzZ5+NKGVadlO99z8KYZKu fQF//SgzhCfyfg4z3I3vYu3ho9ExyOa/12rkhQ1ZzAFRcQ4Zs7CWmlcyR9wDUiFmNsMZ ci1joI/ozpmb8h956RrSWHT8aii7r51gZ31hDh/bNwTU4Ye4VHQHZNYijFlKF3Ly7S8f A3bzTmQNqLqyBUog265xgJvI/+nP68mJJNd+scQRFRujtRcuxoDtZuH4VQWXrzbKiKmm 536A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=erfB9EEX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j17si8629877otl.278.2020.03.03.13.46.40; Tue, 03 Mar 2020 13:46:52 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=erfB9EEX; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731576AbgCCUUx (ORCPT + 99 others); Tue, 3 Mar 2020 15:20:53 -0500 Received: from mail-ot1-f66.google.com ([209.85.210.66]:36168 "EHLO mail-ot1-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728393AbgCCUUw (ORCPT ); Tue, 3 Mar 2020 15:20:52 -0500 Received: by mail-ot1-f66.google.com with SMTP id j14so4392678otq.3 for ; Tue, 03 Mar 2020 12:20:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=P2kzWYnhHNwPKndZNxUfTV8Fu7co3KaoSWSaF0iBUUU=; b=erfB9EEXH1OrsG7ZoHatHAnCFvM5uXNWzBvJHrxa3PNccf1O+8LugRnExtYFRWJ5uP 2ZqjCuPbZviv5jOvIxmKCZnwfw8ScajoJUrA+m5KKeVbTSsYdgKJ9qAxw/Mb6hguDJhf SE1UHtlKMKKFU1aAGNlUdg2pdNbzs5xFlhwsBnNnlqrO4d8AuoETisVrThfpVWmQlvBv BFJQiMXCMPLtvxA8V7bQaoOzoZFUkATmzjsnw1J1asWEzusfJxBiy+lFK2SOprNGT35+ 1kSaP+2YgMYsUU0nxd+X8t6Tly2u9E4NzvvFBhP8CCV9LIknKelxkvLF9g2KMlwJp8Zm GP1A== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=P2kzWYnhHNwPKndZNxUfTV8Fu7co3KaoSWSaF0iBUUU=; b=IlQUqKsq3CanXAP0fnemHuK+ftgJPRQiJiRJkarM96rD2i7WbMgof8GSbHm2oKqswH KmxzvdQ7Su74H/SL2Ca/sEuRD3EPsYvp4MY1uzbIpN0Oec6uDNct9ODZ7o0EvFYfbw/D vztpi0SS5gJ5nk44+zyjrOCWUroPXZIhdVNpMyxy900IMG7Hz1/b8f0c6dV3pd6mpYv8 UgUhp0+90ZCLCCQzxhhLOoqd7js/lWsR1E7DJCB3DAKPTpImJHYDefWWiajELFb7LZMl Wwo+PGLdgerRLZoP+uSDAoc1DznImSYzEJeUoJgUVDn0+JZs0vlmmMnJn9aDaD6RI7RW PFcw== X-Gm-Message-State: ANhLgQ01XckQv2f6cEpM7ECxoUSNiFsnLN+5NMqOd2DVBZhrAN3OKIWW hDnLv2XRdw4YtuLHy5I4cebm0RoEUCQVwiwnThttrCUPKv8= X-Received: by 2002:a9d:906:: with SMTP id 6mr4419945otp.251.1583266851521; Tue, 03 Mar 2020 12:20:51 -0800 (PST) MIME-Version: 1.0 References: <1583263716-25150-1-git-send-email-cai@lca.pw> In-Reply-To: <1583263716-25150-1-git-send-email-cai@lca.pw> From: Marco Elver Date: Tue, 3 Mar 2020 21:20:40 +0100 Message-ID: Subject: Re: [PATCH -next 1/2] mm: disable KCSAN for kmemleak To: Qian Cai Cc: Andrew Morton , catalin.marinas@arm.com, Linux Memory Management List , LKML Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 3 Mar 2020 at 20:28, Qian Cai wrote: > > Kmemleak could scan task stacks while plain writes happens to those > stack variables which could results in data races. For example, in > sys_rt_sigaction and do_sigaction(), it could have plain writes in > a 32-byte size. Since the kmemleak does not care about the actual values > of a non-pointer and all do_sigaction() call sites only copy to stack > variables, just disable KCSAN for kmemleak to avoid annotating anything > outside Kmemleak just because Kmemleak scans everything. > > Suggested-by: Marco Elver > Signed-off-by: Qian Cai Acked-by: Marco Elver Thank you! > --- > mm/Makefile | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/mm/Makefile b/mm/Makefile > index 946754cc66b6..6e263045f0c2 100644 > --- a/mm/Makefile > +++ b/mm/Makefile > @@ -14,6 +14,7 @@ KCSAN_SANITIZE_slab_common.o := n > KCSAN_SANITIZE_slab.o := n > KCSAN_SANITIZE_slub.o := n > KCSAN_SANITIZE_page_alloc.o := n > +KCSAN_SANITIZE_kmemleak.o := n > > # These files are disabled because they produce non-interesting and/or > # flaky coverage that is not a function of syscall inputs. E.g. slab is out of > -- > 1.8.3.1 >