Received: by 2002:ac0:e350:0:0:0:0:0 with SMTP id g16csp2623896imn; Tue, 2 Aug 2022 09:44:20 -0700 (PDT) X-Google-Smtp-Source: AA6agR6PVGxFBKAtltPAeJajRJMfVETwH5c7JVYAj4ZJWYCUsbut4QW2LY67JQXmdUsEeNtmnTL8 X-Received: by 2002:a17:903:240e:b0:16d:d455:6383 with SMTP id e14-20020a170903240e00b0016dd4556383mr21005317plo.166.1659458649842; Tue, 02 Aug 2022 09:44:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1659458649; cv=none; d=google.com; s=arc-20160816; b=ED9KuB46gqds2t3rcW5Ji4Op1HnlMtDQzqlXqDIh8CpPkOTfPzeod2AH4W6NfCXgnx pnz2j2GovCzn2ArAWx6EnQ+Nf1X3gl8oB8q3GVuTkspfVIEpmKyubABdmfkQWM1eSHF/ 4/GobJtrQYEKuMb1uMmYYmnwcv5mdV8iBkhCM0wTGveMmAV5OweG9geFxcuYUrY6Bodl pSjCpbRMMKRy7CtyWbUK4K5AUoLA2AzAa5GRaOa+YElq6FwD7AW526qdEud9zA/BA7F+ PYF16Afk1xT84opeqV+D16hnuVhH8xfvhMXWMm6SOfkArGLfP+igZ/UOmF+KgrwAif3j OYuQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=At7GobCcr6Y9heni/Yduc1l7sWHbyaA1znBRmpamTcU=; b=Mc1LR+GpBxCE6oxjFScI2rbXTZr5fAcsLJOEVwnOfIM7tuK8AOjSZICf7XJ9/sjtbS 7DLDBvOflrC1QzbHckK+9fEN6QnpcK3zlrRz2CcoqQrjW+k9RUHJ6mSwVcqhTBo9vJ3f BhS4Vv0xqVlrqOdW1bgx30OgP7wAH/TMJSCOGoziosFUvEET3fEigXZn4V5JDYmvnobp OhqlhMxVGX8CdIMBtQK1vEfNYCTkUSUG1Cjcc+FrWudbBCu++NODl4E5b01W29/AN5zp M+ivQUztAAnXGx6MZJkLncIy5QIsB6h5ZkdPLWInURNBwSTp2JHnD8i13MbGEjx0RJoF +tpg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=k0qIjj7C; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id h1-20020a170902eec100b0016a676058b5si15611618plb.270.2022.08.02.09.43.55; Tue, 02 Aug 2022 09:44:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=k0qIjj7C; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237329AbiHBPt3 (ORCPT + 99 others); Tue, 2 Aug 2022 11:49:29 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49366 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237420AbiHBPtH (ORCPT ); Tue, 2 Aug 2022 11:49:07 -0400 Received: from mail-wr1-x42a.google.com (mail-wr1-x42a.google.com [IPv6:2a00:1450:4864:20::42a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id B883817069 for ; Tue, 2 Aug 2022 08:48:25 -0700 (PDT) Received: by mail-wr1-x42a.google.com with SMTP id z16so18351542wrh.12 for ; Tue, 02 Aug 2022 08:48:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc; bh=At7GobCcr6Y9heni/Yduc1l7sWHbyaA1znBRmpamTcU=; b=k0qIjj7CJX3r48zFSSvRSE7fKJFlSgjDIhA8mzTd0ZcpMPn12XJ6fIc2KYUaTigCd4 YTisP+v+bOYKSmD39f3LvDFr2wmoBrlXjEjnEd1DcEx1/IqfjINPjtUZ1BFHlx4j0Jmz LkMV6go6TkzA0Dxo8MRefBSAf8hO5p80YdxlJUhRzLS/CU3z/Ia60UibzxP6Bg6YSTQn +zDdo7F+GVJagu52I/SHqEOVJFdD2+28QTwXq6Ao1VL+DUTX45ePo6q0GGNYWwWYdZ5R g+0wA7U+Jy12i61t6eA5aow37U8Z0u+DjFYtVziFw3KpTKwXYg33h4L/SJGumTZPW654 1v3g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc; bh=At7GobCcr6Y9heni/Yduc1l7sWHbyaA1znBRmpamTcU=; b=h4K4LobUdR21ANXMjQu6qKnpLZl454PDyDY8E6uAz9tJPJSgQ130CiJKz6PN4Qj9mE JGxGvh0kwDF/o9KMfKAT4Rt8H2RarIg187votXyf+hwSIVwRASWEucb/dgF3tv3FdshR uQai8V/sssbsxfSUS5mmtbUwLoPQ36OSBeS3IeWUHGbFd0gQWTNokbmK++VmNThIrRWG CeWgxtdFgCDQBf4yvOzVL3Wz8xjRVJ9LIPgmHUbcMkwhJCzSw/CPXMDPxK82MUZST7Le U8RQA20A1EaYzcr/mvhN3je4jP/QJGtpRWTPYKV9UXPCHKY86AYM5d7hIbXf4su+erMz dGtA== X-Gm-Message-State: ACgBeo1RnzFK1vZfQ5u5Rjy6Z3B8uPPyRa9LIiAUcNRSDF1dx8hjNh+P AYH6VU2qyKZW4uzWXVsMd+Cxq04u7KG1z+ene6+ERw== X-Received: by 2002:a05:6000:2c1:b0:220:5f91:62de with SMTP id o1-20020a05600002c100b002205f9162demr8238093wry.715.1659455304037; Tue, 02 Aug 2022 08:48:24 -0700 (PDT) MIME-Version: 1.0 References: <20220701142310.2188015-1-glider@google.com> <20220701142310.2188015-17-glider@google.com> In-Reply-To: From: Alexander Potapenko Date: Tue, 2 Aug 2022 17:47:47 +0200 Message-ID: Subject: Re: [PATCH v4 16/45] kmsan: handle task creation and exiting To: Marco Elver Cc: Alexander Viro , Alexei Starovoitov , Andrew Morton , Andrey Konovalov , Andy Lutomirski , Arnd Bergmann , Borislav Petkov , Christoph Hellwig , Christoph Lameter , David Rientjes , Dmitry Vyukov , Eric Dumazet , Greg Kroah-Hartman , Herbert Xu , Ilya Leoshkevich , Ingo Molnar , Jens Axboe , Joonsoo Kim , Kees Cook , Mark Rutland , Matthew Wilcox , "Michael S. Tsirkin" , Pekka Enberg , Peter Zijlstra , Petr Mladek , Steven Rostedt , Thomas Gleixner , Vasily Gorbik , Vegard Nossum , Vlastimil Babka , kasan-dev , Linux Memory Management List , Linux-Arch , LKML Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 12, 2022 at 3:18 PM Marco Elver wrote: > > On Fri, 1 Jul 2022 at 16:24, 'Alexander Potapenko' via kasan-dev > wrote: > > > > Tell KMSAN that a new task is created, so the tool creates a backing > > metadata structure for that task. > > > > Signed-off-by: Alexander Potapenko > > --- > > v2: > > -- move implementation of kmsan_task_create() and kmsan_task_exit() here > > > > v4: > > -- change sizeof(type) to sizeof(*ptr) > > > > Link: https://linux-review.googlesource.com/id/I0f41c3a1c7d66f7e14aabcfdfc7c69addb945805 > > --- > > include/linux/kmsan.h | 17 +++++++++++++++++ > > kernel/exit.c | 2 ++ > > kernel/fork.c | 2 ++ > > mm/kmsan/core.c | 10 ++++++++++ > > mm/kmsan/hooks.c | 19 +++++++++++++++++++ > > mm/kmsan/kmsan.h | 2 ++ > > 6 files changed, 52 insertions(+) > > > > diff --git a/include/linux/kmsan.h b/include/linux/kmsan.h > > index fd76cea338878..b71e2032222e9 100644 > > --- a/include/linux/kmsan.h > > +++ b/include/linux/kmsan.h > > @@ -16,6 +16,7 @@ > > > > struct page; > > struct kmem_cache; > > +struct task_struct; > > > > #ifdef CONFIG_KMSAN > > > > @@ -42,6 +43,14 @@ struct kmsan_ctx { > > bool allow_reporting; > > }; > > > > +void kmsan_task_create(struct task_struct *task); > > + > > +/** > > + * kmsan_task_exit() - Notify KMSAN that a task has exited. > > + * @task: task about to finish. > > + */ > > +void kmsan_task_exit(struct task_struct *task); > > + > > /** > > * kmsan_alloc_page() - Notify KMSAN about an alloc_pages() call. > > * @page: struct page pointer returned by alloc_pages(). > > @@ -163,6 +172,14 @@ void kmsan_iounmap_page_range(unsigned long start, unsigned long end); > > > > #else > > > > +static inline void kmsan_task_create(struct task_struct *task) > > +{ > > +} > > + > > +static inline void kmsan_task_exit(struct task_struct *task) > > +{ > > +} > > + > > static inline int kmsan_alloc_page(struct page *page, unsigned int order, > > gfp_t flags) > > { > > diff --git a/kernel/exit.c b/kernel/exit.c > > index f072959fcab7f..1784b7a741ddd 100644 > > --- a/kernel/exit.c > > +++ b/kernel/exit.c > > @@ -60,6 +60,7 @@ > > #include > > #include > > #include > > +#include > > #include > > #include > > #include > > @@ -741,6 +742,7 @@ void __noreturn do_exit(long code) > > WARN_ON(tsk->plug); > > > > kcov_task_exit(tsk); > > + kmsan_task_exit(tsk); > > > > coredump_task_exit(tsk); > > ptrace_event(PTRACE_EVENT_EXIT, code); > > diff --git a/kernel/fork.c b/kernel/fork.c > > index 9d44f2d46c696..6dfca6f00ec82 100644 > > --- a/kernel/fork.c > > +++ b/kernel/fork.c > > @@ -37,6 +37,7 @@ > > #include > > #include > > #include > > +#include > > #include > > #include > > #include > > @@ -1026,6 +1027,7 @@ static struct task_struct *dup_task_struct(struct task_struct *orig, int node) > > tsk->worker_private = NULL; > > > > kcov_task_init(tsk); > > + kmsan_task_create(tsk); > > kmap_local_fork(tsk); > > > > #ifdef CONFIG_FAULT_INJECTION > > diff --git a/mm/kmsan/core.c b/mm/kmsan/core.c > > index 16fb8880a9c6d..7eabed03ed10b 100644 > > --- a/mm/kmsan/core.c > > +++ b/mm/kmsan/core.c > > @@ -44,6 +44,16 @@ bool kmsan_enabled __read_mostly; > > */ > > DEFINE_PER_CPU(struct kmsan_ctx, kmsan_percpu_ctx); > > > > +void kmsan_internal_task_create(struct task_struct *task) > > +{ > > + struct kmsan_ctx *ctx = &task->kmsan_ctx; > > + struct thread_info *info = current_thread_info(); > > + > > + __memset(ctx, 0, sizeof(*ctx)); > > + ctx->allow_reporting = true; > > + kmsan_internal_unpoison_memory(info, sizeof(*info), false); > > +} > > + > > void kmsan_internal_poison_memory(void *address, size_t size, gfp_t flags, > > unsigned int poison_flags) > > { > > diff --git a/mm/kmsan/hooks.c b/mm/kmsan/hooks.c > > index 052e17b7a717d..43a529569053d 100644 > > --- a/mm/kmsan/hooks.c > > +++ b/mm/kmsan/hooks.c > > @@ -26,6 +26,25 @@ > > * skipping effects of functions like memset() inside instrumented code. > > */ > > > > +void kmsan_task_create(struct task_struct *task) > > +{ > > + kmsan_enter_runtime(); > > + kmsan_internal_task_create(task); > > + kmsan_leave_runtime(); > > +} > > +EXPORT_SYMBOL(kmsan_task_create); > > + > > +void kmsan_task_exit(struct task_struct *task) > > +{ > > + struct kmsan_ctx *ctx = &task->kmsan_ctx; > > + > > + if (!kmsan_enabled || kmsan_in_runtime()) > > + return; > > + > > + ctx->allow_reporting = false; > > +} > > +EXPORT_SYMBOL(kmsan_task_exit); > > Why are these EXPORT_SYMBOL? Will they be used from some kernel module? You're right, most of them will not. Will fix.