Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp2820219rwb; Fri, 16 Dec 2022 06:59:08 -0800 (PST) X-Google-Smtp-Source: AA0mqf5q8joX2y4au3j2DPfoF3ZsgmE98HNXBK8TpVwseAzMuHsTLmd/HeZcbE7qR54c8HtEDTz7 X-Received: by 2002:a17:902:8f81:b0:188:6300:596a with SMTP id z1-20020a1709028f8100b001886300596amr30874177plo.7.1671202748762; Fri, 16 Dec 2022 06:59:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1671202748; cv=none; d=google.com; s=arc-20160816; b=0MQY3iQCdlaXc8BVK53JZ89LOFief/GwJuGPQqYToDwLnTA7UNrTz5cKJB7+sJHswO DpmEZY0wc11KbhvzjOZhFRofDdSTt8pAWhaAlUEii4cDs/9BD85iOroKiZuR2SP50Lf1 ddu3+qfwykJ9iGFxwrmB4pBsnrg+OQiH3d5wbwIk8zcwTz6AQ4K55mGrSSKV5a9tllao UWmPBeMTXEGiHMZF3UjodGAIa6Up9cL7A+OfjNZPknLKzOhamKobfwJSeO/JxDp8vj9b PaQRORmQUhF9rp2/tsRrbFYwnYqaNp3JWoctCY6ZKM3aCgpjsr+wi2c60vy8Mq+04eaw HedQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=JmN6Qb5TwETYe7n7na4BfG+Mf9CO0IdnNSi7mBlEtvg=; b=p/7DX+1RuY1y9jlHkgd/WDwIrJ40cXvtVJ3IO8uIEYHfB9ydoHi3DnOkfLAkPbj14J +pxcKoP536okDRvErlyp9eq4C/vzmW9FubzYFy+UAB2Y1ZiKmYR5XYzwIyIebfW3XnCp 1CR7J5gIXZbhNVvu/AY9V3sLF/0ZT87cce9xyCBuoL2pw6Zy2vCHIVPY35HYd1R+0umM 91XwfCel0OA1qzwA3OpVhIZ9u37lpkxWYec1yp45Ic+JhPGQERIJ0PQ9EHQCs2lBWAzx aR48iCuAOaQXYWIyUAaC529Wl6Qai28hC1aloiLbYeq6xJP1AodUvitrL8VCQYTkk2w7 iCxw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t2-20020a170902e1c200b001897a8b5367si2606899pla.56.2022.12.16.06.59.00; Fri, 16 Dec 2022 06:59:08 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230096AbiLPODc (ORCPT + 68 others); Fri, 16 Dec 2022 09:03:32 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41210 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229453AbiLPOD3 (ORCPT ); Fri, 16 Dec 2022 09:03:29 -0500 Received: from www262.sakura.ne.jp (www262.sakura.ne.jp [202.181.97.72]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3DE6EA19D; Fri, 16 Dec 2022 06:03:28 -0800 (PST) Received: from fsav315.sakura.ne.jp (fsav315.sakura.ne.jp [153.120.85.146]) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTP id 2BGE30pY022162; Fri, 16 Dec 2022 23:03:00 +0900 (JST) (envelope-from penguin-kernel@I-love.SAKURA.ne.jp) Received: from www262.sakura.ne.jp (202.181.97.72) by fsav315.sakura.ne.jp (F-Secure/fsigk_smtp/550/fsav315.sakura.ne.jp); Fri, 16 Dec 2022 23:03:00 +0900 (JST) X-Virus-Status: clean(F-Secure/fsigk_smtp/550/fsav315.sakura.ne.jp) Received: from [192.168.1.9] (M106072142033.v4.enabler.ne.jp [106.72.142.33]) (authenticated bits=0) by www262.sakura.ne.jp (8.15.2/8.15.2) with ESMTPSA id 2BGE2xnN022155 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NO); Fri, 16 Dec 2022 23:03:00 +0900 (JST) (envelope-from penguin-kernel@I-love.SAKURA.ne.jp) Message-ID: <86bdfea2-7125-2e54-c2c0-920f28ff80ce@I-love.SAKURA.ne.jp> Date: Fri, 16 Dec 2022 23:02:56 +0900 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.6.0 Subject: Re: [PATCH] fbcon: Use kzalloc() in fbcon_prepare_logo() Content-Language: en-US To: Geert Uytterhoeven , Alexander Potapenko , Marco Elver , Dmitry Vyukov , kasan-dev Cc: Daniel Vetter , Helge Deller , Linux Fbdev development list , DRI , Linux Kernel Mailing List References: From: Tetsuo Handa In-Reply-To: Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2022/12/15 18:36, Geert Uytterhoeven wrote: > The next line is: > > scr_memsetw(save, erase, array3_size(logo_lines, new_cols, 2)); > > So how can this turn out to be uninitialized later below? > > scr_memcpyw(q, save, array3_size(logo_lines, new_cols, 2)); > > What am I missing? Good catch. It turned out that this was a KMSAN problem (i.e. a false positive report). On x86_64, scr_memsetw() is implemented as static inline void scr_memsetw(u16 *s, u16 c, unsigned int count) { memset16(s, c, count / 2); } and memset16() is implemented as static inline void *memset16(uint16_t *s, uint16_t v, size_t n) { long d0, d1; asm volatile("rep\n\t" "stosw" : "=&c" (d0), "=&D" (d1) : "a" (v), "1" (s), "0" (n) : "memory"); return s; } . Plain memset() in arch/x86/include/asm/string_64.h is redirected to __msan_memset() but memsetXX() are not redirected to __msan_memsetXX(). That is, memory initialization via memsetXX() results in KMSAN's shadow memory being not updated. KMSAN folks, how should we fix this problem? Redirect assembly-implemented memset16(size) to memset(size*2) if KMSAN is enabled?