Received: by 2002:ac0:e350:0:0:0:0:0 with SMTP id g16csp2630758imn; Tue, 2 Aug 2022 10:00:39 -0700 (PDT) X-Google-Smtp-Source: AA6agR7bE9k8WcYfHE20Pw/o29NLCUmyfOweVheSYeIrORH4m1/EGCaS+bg1YCndsmRw75/2Dsbt X-Received: by 2002:a17:907:6d16:b0:730:9955:4e30 with SMTP id sa22-20020a1709076d1600b0073099554e30mr5183671ejc.634.1659459638629; Tue, 02 Aug 2022 10:00:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1659459638; cv=none; d=google.com; s=arc-20160816; b=jqk2IKpqjoomtmG/VpXouwNYq4rfGjxkuJI9eZRR46GIHzATRjUIx9j0KE4OIzX64C bELDw/deqMhqj3XnPGccJl0lwWjAv56mZZ4EistAH9Ml7X5rnpeFFwanTbAjMGYnKuhx zt7cF8qlY+p3m9O62RuVuph587HI1K5qjuIKGe5Af6t1Wt0Q+3SgQll2emBogVSmZzoy Raj6XqyV4U8yb+QrZopexvcAZTG1doS7whn5D9G9OZjjGj3sBRSvAK+MLtQUHDrVXKGk Owwf1zMsPA+9mFYq7e4Yn8hsdwyZSUh2ygk6ioF0k7uCVdOz/uI/fcqhREHUsWQLsU7N smyA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=jBLRsOY6b2BWFCEwUDOOLDtlfS4iNN5NSPXBB7OTTdA=; b=kSajLjyk7w8XjoDNdQY5eAwrH2aLCvXha9O6szx9XsN5Ghaw4hdG1z/sDQ12TSbn1T uy8QOoGW9i9gcLF4RB17iL+m6AesEAtdf7AKz3y2Lhdvpukx32Dm37H0vxgrUeODAL2+ 6zhqTxypjD08TAXXxfJbho1rOXfSJN1hXBJAki7VKpqXtD5cGXIhkd6FL8U3LEMofBxJ qzpvIVJYoYXFGeb5J1xTFfnkjkwHBupAGAUTUriG7QAsmW+cHoeiroKXLBi1h7uf3ido dj9x3UnEbuoR40V2jIqMYcfyPgjkEEdvZTmtIv7IfvVaJwcamt2wz5nM8Kl5Z3fa2S/h yEWg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=C4yceeMr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c19-20020aa7c753000000b0043d476f96c1si8978034eds.86.2022.08.02.10.00.13; Tue, 02 Aug 2022 10:00:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=C4yceeMr; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233110AbiHBQcG (ORCPT + 99 others); Tue, 2 Aug 2022 12:32:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40878 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233218AbiHBQcC (ORCPT ); Tue, 2 Aug 2022 12:32:02 -0400 Received: from mail-yb1-xb2c.google.com (mail-yb1-xb2c.google.com [IPv6:2607:f8b0:4864:20::b2c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id E80211837F for ; Tue, 2 Aug 2022 09:32:00 -0700 (PDT) Received: by mail-yb1-xb2c.google.com with SMTP id g5so63122ybg.11 for ; Tue, 02 Aug 2022 09:32:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc; bh=jBLRsOY6b2BWFCEwUDOOLDtlfS4iNN5NSPXBB7OTTdA=; b=C4yceeMrnfpv45TrBL5GxEv4ZUizC3/Vr/jdh5+Zbi+KLMTBmkoAfxkD1EYYg12lXR pVh9AeV8yvh5TuY9NmlD5eP0jKvFj7RP4G22OnxoGm/N4AdkMtswGPXRhOT2BAXTVf+g FxUqNI0/HgsAV4zTTqe6XuZcWKi6X5wZ9M7NjSvOyx1jz7FGR6CrHM8rbpH9l0DxzWoe hf6GZ3KmxjshcXvib72rR5MKZV0MM1F8H1CRVx3BPyeg9Gw1DE8RZTD5fXM+LhoZ5DnJ bgOGwc3ofHcCsX0ffHzVQHWF/qTn8A1ekfgQvNGt/WK7yTeGQxrDPRF9ro3QNUjzbtCk zTkg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc; bh=jBLRsOY6b2BWFCEwUDOOLDtlfS4iNN5NSPXBB7OTTdA=; b=eL72lTmxlnUAspSP0dFyjKs+UpErDz0pccb4fxJ59/fY98Jsv8XypzFkn8e0mc9WVb G4+5DQGfvOVo/EbIz6J8ER+5g7LYQzUbUcy/n4qDc6YOE53rS/qV3nyLGVtR7iOyewpB P1coAs7BwtBu78g5XSnSScbOWrItnxsoSSI4iFRfmUNXfl2YQw41uhNvwRUHOS9TWP8X NuOc5ZpaQKRLIEmb3c+G4Fu1vATmaepzl8FGMA9kvStViznjB9CmR/EmoEs85Hel6VhE iS4pQxMWW//qvIY2UxvY01TGJgEMC4baBQcFicqyLj+5PYJeY2259rZmdmV6wYyvVfhS aDCg== X-Gm-Message-State: ACgBeo0AgWM8tGBbyZ1fs1pkBsk5TZQIFNulhsqCZ7AZbSAatxxcMCNM 9s5IGB7EEzGkP+wGF8jZGwlmHnQZC4/G6Xdjw8qT/g== X-Received: by 2002:a25:b9d1:0:b0:671:49f9:4e01 with SMTP id y17-20020a25b9d1000000b0067149f94e01mr16899347ybj.398.1659457919894; Tue, 02 Aug 2022 09:31:59 -0700 (PDT) MIME-Version: 1.0 References: <20220701142310.2188015-1-glider@google.com> <20220701142310.2188015-16-glider@google.com> In-Reply-To: From: Alexander Potapenko Date: Tue, 2 Aug 2022 18:31:23 +0200 Message-ID: Subject: Re: [PATCH v4 15/45] mm: kmsan: call KMSAN hooks from SLUB code To: Marco Elver Cc: Alexander Viro , Alexei Starovoitov , Andrew Morton , Andrey Konovalov , Andy Lutomirski , Arnd Bergmann , Borislav Petkov , Christoph Hellwig , Christoph Lameter , David Rientjes , Dmitry Vyukov , Eric Dumazet , Greg Kroah-Hartman , Herbert Xu , Ilya Leoshkevich , Ingo Molnar , Jens Axboe , Joonsoo Kim , Kees Cook , Mark Rutland , Matthew Wilcox , "Michael S. Tsirkin" , Pekka Enberg , Peter Zijlstra , Petr Mladek , Steven Rostedt , Thomas Gleixner , Vasily Gorbik , Vegard Nossum , Vlastimil Babka , kasan-dev , Linux Memory Management List , Linux-Arch , LKML Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 12, 2022 at 3:14 PM Marco Elver wrote: > > On Fri, 1 Jul 2022 at 16:23, 'Alexander Potapenko' via kasan-dev > wrote: > > > > In order to report uninitialized memory coming from heap allocations > > KMSAN has to poison them unless they're created with __GFP_ZERO. > > > > It's handy that we need KMSAN hooks in the places where > > init_on_alloc/init_on_free initialization is performed. > > > > In addition, we apply __no_kmsan_checks to get_freepointer_safe() to > > suppress reports when accessing freelist pointers that reside in freed > > objects. > > > > Signed-off-by: Alexander Potapenko > > Reviewed-by: Marco Elver > > But see comment below. > > > Remove unnecessary whitespace change. Will do, thanks for catching! --=20 Alexander Potapenko Software Engineer Google Germany GmbH Erika-Mann-Stra=C3=9Fe, 33 80636 M=C3=BCnchen Gesch=C3=A4ftsf=C3=BChrer: Paul Manicle, Liana Sebastian Registergericht und -nummer: Hamburg, HRB 86891 Sitz der Gesellschaft: Hamburg