Received: by 2002:a05:6358:bb9e:b0:b9:5105:a5b4 with SMTP id df30csp3828038rwb; Mon, 5 Sep 2022 20:16:24 -0700 (PDT) X-Google-Smtp-Source: AA6agR5yMXKXet7BopwyKX53XXkJvpJ4HEBfsq30nPTuQ2RGQxHfasg4vgRgIV358M8Lngox3twl X-Received: by 2002:a17:90a:4fa3:b0:200:8ba3:94bc with SMTP id q32-20020a17090a4fa300b002008ba394bcmr3792466pjh.21.1662434183716; Mon, 05 Sep 2022 20:16:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662434183; cv=none; d=google.com; s=arc-20160816; b=Q5Q03tECgRwiHqGk+zz/5BPrtHHm667xNk5F4SC+Wmz4ILIu3003r9LcCuv6Yc34B9 t/maO+fKH/rNhUFR0QuUpez6NYHW2A5ONH8fs/0EElpZTudMtpVjXEsvP/X65T5K4Ncs T+yTeKPIltYp2HI+XHJgCzX+s5wv2+1QW5/zvmme1SMuEQOrBRHcz8S+RSsmhI+KHBwK PksDJLjqzL2vsH5FeNiJFHf3mPX4KXSK+eI0iANlHSgSaspQgOgDnbDHNeY5QkBNeHuy M9eHa4Qzd9tiqLYQNsWlpYVTW9I0NpS+T1goWoj1WQdGQpV6ac5JsuS2eY4ZQwowfuCj MvPA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=0q5/g2xqSDjoX1m4bFjC22V5UplGI4w9R+6ExEXxELc=; b=kizKCL9l/CLGWCf2Ny5JmMP9uryUAuNyiM2+4GAPJXnxqt/InRXBhKUGE2/iQoTOrC lUkSYuFVudI44pMPfWFzmEeU5aq+EpS195gi4mQBSk5C4miUSwz1O7wil+OJHUiFS1Xb +wp9wgMYG8k7dx+sSKYq6A2FcU1a75/7C/qnveTsQvdBd7pVtm/5M0+jJZ1JGhHB6T3f naeW04OGmSpPjiB0lJzmbYX4bMH1mDsGk385OePKAdfnyhlK13nK7sJLcKzNfr8+YHDu UZsBvqcvAdRBHJTPWouUW5AAndnYm/kqPL24wUFzF15qJSgZ07AbduLZS8SZFatKyZ3y 86IA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=J64gz2Kz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id u21-20020a63b555000000b0042bded431d6si12437961pgo.511.2022.09.05.20.16.12; Mon, 05 Sep 2022 20:16:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=J64gz2Kz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232364AbiIFDKv (ORCPT + 99 others); Mon, 5 Sep 2022 23:10:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33528 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232132AbiIFDKt (ORCPT ); Mon, 5 Sep 2022 23:10:49 -0400 Received: from mail-pg1-x52c.google.com (mail-pg1-x52c.google.com [IPv6:2607:f8b0:4864:20::52c]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1B5753C150; Mon, 5 Sep 2022 20:10:48 -0700 (PDT) Received: by mail-pg1-x52c.google.com with SMTP id s206so9458619pgs.3; Mon, 05 Sep 2022 20:10:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date; bh=0q5/g2xqSDjoX1m4bFjC22V5UplGI4w9R+6ExEXxELc=; b=J64gz2KzhvRwufT6qI2yRk1QrpOGL4+Ijgce9yyEMrmDsic72KQqMzz5Vtc4Fp17KB JYbJSC+w+9TMU+8udxawWQFzbsaHx1PvO1a2lqKvpK7Oy6JR6KMnLAa/t4BvuIkKCcZf oW3s+shJ+7uFVdUw5KMdokaCSiPpmvQfxe7KRM73c/eT//gSF1M45r/hX4Ge2tLNi3H6 15OuAmTNQmGf3JDjhn067whU+XpLJmdh21Z959SlZlIdkXRYYQ9r0K+CO07KZi8y+3Gw czBRXX0O2iXqJPmzz2eSFNcOThf7Qn32h5GyOyoJR8WDrYQqd5khKlwebxrgqP8ifdfX uT8g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date; bh=0q5/g2xqSDjoX1m4bFjC22V5UplGI4w9R+6ExEXxELc=; b=PPfO4JB6NcowMPJOgsPepFjHFIa3DFhNFmsgjNrf3Vc3us+zw68bU1vSy1/pEo4UeE XamVNoGL5RTctesxbE2UrlG99QJMZsn57COhioJpj8PvPiMw00N60QawVKM9LXKl6t/W 9acH0Ke80NOLg4rKDL76So9E5RyOqsDs2eT4zOZE9iETjBsygz+4sWKbkwu1x0Ue/HS5 0DCFvuZ27oI/N71H9vUB0WLYXTeDLn93hA4rkSHn4k8sphp/WbuvkGRVQZfWLCcl3BRe cPv3755o0TE3dtsBIE8T2W3YB621TyAJaV1ZNyfIRpVcag7yD6BsCHfzh8OarAjNSNGt MQXg== X-Gm-Message-State: ACgBeo1PIo4yiUUPZ3ZQ8sJyVvQRy6NrCs2VUwtmpfQUtGBmL9fCAQqv 0rUR2jrn5BuxX49kUsyLafI= X-Received: by 2002:a05:6a00:1145:b0:52b:78c:fa26 with SMTP id b5-20020a056a00114500b0052b078cfa26mr53065753pfm.27.1662433847595; Mon, 05 Sep 2022 20:10:47 -0700 (PDT) Received: from debian.me (subs03-180-214-233-83.three.co.id. [180.214.233.83]) by smtp.gmail.com with ESMTPSA id k12-20020aa79d0c000000b00537d7cc774bsm8583585pfp.139.2022.09.05.20.10.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 05 Sep 2022 20:10:47 -0700 (PDT) Received: by debian.me (Postfix, from userid 1000) id 79773103CFD; Tue, 6 Sep 2022 10:10:34 +0700 (WIB) Date: Tue, 6 Sep 2022 10:10:26 +0700 From: Bagas Sanjaya To: Alexander Potapenko Cc: Alexander Viro , Alexei Starovoitov , Andrew Morton , Andrey Konovalov , Andy Lutomirski , Arnd Bergmann , Borislav Petkov , Christoph Hellwig , Christoph Lameter , David Rientjes , Dmitry Vyukov , Eric Dumazet , Greg Kroah-Hartman , Herbert Xu , Ilya Leoshkevich , Ingo Molnar , Jens Axboe , Joonsoo Kim , Kees Cook , Marco Elver , Mark Rutland , Matthew Wilcox , "Michael S. Tsirkin" , Pekka Enberg , Peter Zijlstra , Petr Mladek , Steven Rostedt , Thomas Gleixner , Vasily Gorbik , Vegard Nossum , Vlastimil Babka , kasan-dev@googlegroups.com, linux-mm@kvack.org, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org Subject: Re: [PATCH v6 6/44] kmsan: add ReST documentation Message-ID: References: <20220905122452.2258262-1-glider@google.com> <20220905122452.2258262-7-glider@google.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="8SFVSXRZNTT5RY83" Content-Disposition: inline In-Reply-To: <20220905122452.2258262-7-glider@google.com> X-Spam-Status: No, score=-0.6 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,RCVD_IN_SORBS_WEB,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org --8SFVSXRZNTT5RY83 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, Sep 05, 2022 at 02:24:14PM +0200, Alexander Potapenko wrote: > +Here is an example of a KMSAN report:: > + > + =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D > + BUG: KMSAN: uninit-value in test_uninit_kmsan_check_memory+0x1be/0x380= [kmsan_test] > + test_uninit_kmsan_check_memory+0x1be/0x380 mm/kmsan/kmsan_test.c:273 > + kunit_run_case_internal lib/kunit/test.c:333 > + kunit_try_run_case+0x206/0x420 lib/kunit/test.c:374 > + kunit_generic_run_threadfn_adapter+0x6d/0xc0 lib/kunit/try-catch.c:28 > + kthread+0x721/0x850 kernel/kthread.c:327 > + ret_from_fork+0x1f/0x30 ??:? > + > + Uninit was stored to memory at: > + do_uninit_local_array+0xfa/0x110 mm/kmsan/kmsan_test.c:260 > + test_uninit_kmsan_check_memory+0x1a2/0x380 mm/kmsan/kmsan_test.c:271 > + kunit_run_case_internal lib/kunit/test.c:333 > + kunit_try_run_case+0x206/0x420 lib/kunit/test.c:374 > + kunit_generic_run_threadfn_adapter+0x6d/0xc0 lib/kunit/try-catch.c:28 > + kthread+0x721/0x850 kernel/kthread.c:327 > + ret_from_fork+0x1f/0x30 ??:? > + > + Local variable uninit created at: > + do_uninit_local_array+0x4a/0x110 mm/kmsan/kmsan_test.c:256 > + test_uninit_kmsan_check_memory+0x1a2/0x380 mm/kmsan/kmsan_test.c:271 > + > + Bytes 4-7 of 8 are uninitialized > + Memory access of size 8 starts at ffff888083fe3da0 > + > + CPU: 0 PID: 6731 Comm: kunit_try_catch Tainted: G B E 5.1= 6.0-rc3+ #104 > + Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 0= 4/01/2014 > + =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D Are these table markers in the code block above part of kmsan output? > +A use of uninitialized value ``v`` is reported by KMSAN in the following= cases: > + - in a condition, e.g. ``if (v) { ... }``; > + - in an indexing or pointer dereferencing, e.g. ``array[v]`` or ``*v``; > + - when it is copied to userspace or hardware, e.g. ``copy_to_user(..., = &v, ...)``; > + - when it is passed as an argument to a function, and > + ``CONFIG_KMSAN_CHECK_PARAM_RETVAL`` is enabled (see below). The sentence before the list above is rendered as definition list term instead, so I add the blank line separator: ---- >8 ---- diff --git a/Documentation/dev-tools/kmsan.rst b/Documentation/dev-tools/km= san.rst index 2a53a801198cbf..55fa82212eb255 100644 --- a/Documentation/dev-tools/kmsan.rst +++ b/Documentation/dev-tools/kmsan.rst @@ -67,6 +67,7 @@ uninitialized in the local variable, as well as the stack= where the value was copied to another memory location before use. =20 A use of uninitialized value ``v`` is reported by KMSAN in the following c= ases: + - in a condition, e.g. ``if (v) { ... }``; - in an indexing or pointer dereferencing, e.g. ``array[v]`` or ``*v``; - when it is copied to userspace or hardware, e.g. ``copy_to_user(..., &v= , ...)``; Thanks.=20 --=20 An old man doll... just what I always wanted! - Clara --8SFVSXRZNTT5RY83 Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEABYIAB0WIQSSYQ6Cy7oyFNCHrUH2uYlJVVFOowUCYxa6FQAKCRD2uYlJVVFO o5TjAP4pqdJtF2silbpITwEaYJyueteQAD2tnShYfmi4k/CwmwD+Kf2knjEANX/1 NS87UnfEtAMR4Gyq0gGFXh2B5ITIaww= =3svA -----END PGP SIGNATURE----- --8SFVSXRZNTT5RY83--