Received: by 2002:a05:6358:489b:b0:bb:da1:e618 with SMTP id x27csp2501046rwn; Fri, 16 Sep 2022 11:13:48 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5A0YBuA1EEDjDUzg18trwJ5UKvttPmXHlB4pry0mV4HLxxrfwTRFoe3GZ/CSkODLjOQ359 X-Received: by 2002:a05:6402:42c7:b0:451:e6a6:48b5 with SMTP id i7-20020a05640242c700b00451e6a648b5mr5034190edc.113.1663352028677; Fri, 16 Sep 2022 11:13:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663352028; cv=none; d=google.com; s=arc-20160816; b=Wli25e4dtLoYVoBk0/FpQDT1poi1nw5lPLgFskNBH50urDkozmZagSRwMwvLysvUXP m20c5Sv0YaRtqJrMih0k8Y4BdR2wNJRG5S7Ac6L/1m56QlK+vxbfGTwL0Q7DykX/qiDs FWQm4xpY+8KScHlRJl04WTYhAQrx6OQFH7e3DqxLSXcNdC9Mz691ZeFg2lct3IqlCRSY HVFvNnE5Wr5LcZPVpWP0fTdNl7b5wX/rZlm27/4GXnOyN0cqp/gD8W3GoRSIY2QZy0BO MZpOXfk8wC4lGSfhY+Oga2Pb6Ec4wUnl7pA8J5Fv0jJmRNJq6F3gAwoaMudVw2ifJguZ iVlw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature:dkim-signature; bh=lsisgMPvCT3VnHLqKa8pUpcXqHPIsT7c6cznGtgolXM=; b=COvwPWB3VD62gYgsI46Eptn6qJtnSbBlYA30lyGCmV8uD3EWKyAQk8yLTtXt74t4mh 3uQca0r8w95H01q2uWyPMIkxWZXvmNhbgB8dnw34qXkDAyuRqvNAXWe25s/ImXtNF9Dm dNvBn0jD82QhwksVGwlhAgUxoDlxUkwh6UqNX6NTuRP6b3eck+U8jWdQ/RkqorJh1y0B ie7V3GTht7YuwTnib/1P2ac6v/NdeC05Ug91gTfko0QVd6PwQX9aFMmdtK6XgajCXcni aBGij03VCi/zx19iciaXVWmSpOBGHqZn2VrgC3Bnih3Bs3Fg3D5NhDPLOqpZx7xfbv2V tHxg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=YbqxfnG7; dkim=neutral (no key) header.i=@suse.cz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id g8-20020a056402320800b00452ce356136si2783381eda.135.2022.09.16.11.13.23; Fri, 16 Sep 2022 11:13:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@suse.cz header.s=susede2_rsa header.b=YbqxfnG7; dkim=neutral (no key) header.i=@suse.cz; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229568AbiIPRed (ORCPT + 99 others); Fri, 16 Sep 2022 13:34:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35054 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229454AbiIPRec (ORCPT ); Fri, 16 Sep 2022 13:34:32 -0400 Received: from smtp-out2.suse.de (smtp-out2.suse.de [195.135.220.29]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D5AAE2739; Fri, 16 Sep 2022 10:34:30 -0700 (PDT) Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by smtp-out2.suse.de (Postfix) with ESMTPS id 8FBBC1FEC5; Fri, 16 Sep 2022 17:34:29 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_rsa; t=1663349669; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=lsisgMPvCT3VnHLqKa8pUpcXqHPIsT7c6cznGtgolXM=; b=YbqxfnG7uzxLk9Kk2ojLDXzSXCNuWwxsn+n3/hwlrFjBa6I99ubNz1FAxJyUASjX0gSBV5 fNsl3MRXmx0lLgLiTWymxXpBkLLXdt9dpwj6Bxu3Ln18t4FRLngCF0GbjrgWr8rG1gKEh/ NTnXiqOsp7K0eZpd6+vIIwKyQvMm1hw= DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=suse.cz; s=susede2_ed25519; t=1663349669; h=from:from:reply-to:date:date:message-id:message-id:to:to:cc:cc: mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=lsisgMPvCT3VnHLqKa8pUpcXqHPIsT7c6cznGtgolXM=; b=ARwhLTZLiEC5WXth8EDAdV2IFxIrD8+mQv1MT6j67AS2hVWktVIIBbQIaZHLMxQFWcFKXy FFLaJueFKzAwPGCg== Received: from imap2.suse-dmz.suse.de (imap2.suse-dmz.suse.de [192.168.254.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-521) server-digest SHA512) (No client certificate requested) by imap2.suse-dmz.suse.de (Postfix) with ESMTPS id 4AABC1346B; Fri, 16 Sep 2022 17:34:29 +0000 (UTC) Received: from dovecot-director2.suse.de ([192.168.254.65]) by imap2.suse-dmz.suse.de with ESMTPSA id Cg5tEaWzJGMiGwAAMHmgww (envelope-from ); Fri, 16 Sep 2022 17:34:29 +0000 Message-ID: Date: Fri, 16 Sep 2022 19:32:50 +0200 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.11.0 Subject: Re: [PATCH] kasan: call kasan_malloc() from __kmalloc_*track_caller() Content-Language: en-US To: Hyeonggon Yoo <42.hyeyoo@gmail.com>, Peter Collingbourne Cc: Andrey Konovalov , Andrew Morton , linux-mm@kvack.org, linux-kernel@vger.kernel.org, stable@vger.kernel.org References: <20220914020001.2846018-1-pcc@google.com> From: Vlastimil Babka In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-6.2 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 9/14/22 08:52, Hyeonggon Yoo wrote: Thanks for the Cc. > On Tue, Sep 13, 2022 at 07:00:01PM -0700, Peter Collingbourne wrote: >> We were failing to call kasan_malloc() from __kmalloc_*track_caller() >> which was causing us to sometimes fail to produce KASAN error reports >> for allocations made using e.g. devm_kcalloc(), as the KASAN poison was >> not being initialized. Fix it. >> >> Signed-off-by: Peter Collingbourne >> Cc: # 5.15 >> --- >> The same problem is being fixed upstream in: The "upstream" here is now only in -next, not mainline yet, so we still have more options at this point. >> https://lore.kernel.org/all/20220817101826.236819-6-42.hyeyoo@gmail.com/ >> as part of a larger patch series, but this more targeted fix seems >> more suitable for the stable kernel. Hyeonggon, maybe you can add >> this patch to the start of your series and it can be picked up >> by the stable maintainers. ... > > Ah, I should have sent it to stable team ;) > > I think "Option 3" in Documentation/process/stable-kernel-rules.rst will be appropriate, > So will resend this after the series goes to Linus's tree. I'll pick this for sending to Linus after rc6, which means the series in slab.git / -next will afterwards cause a trivial conflict to resolve when merging. AFAIK Linus prefers that over late rebasing. It will also make it simple for stable. > Thank you Peter! >