From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-qg0-f41.google.com (mail-qg0-f41.google.com [209.85.192.41]) by kanga.kvack.org (Postfix) with ESMTP id 91A566B0038 for ; Fri, 26 Sep 2014 13:10:22 -0400 (EDT) Received: by mail-qg0-f41.google.com with SMTP id i50so1129559qgf.0 for ; Fri, 26 Sep 2014 10:10:22 -0700 (PDT) Received: from mail-qc0-x229.google.com (mail-qc0-x229.google.com [2607:f8b0:400d:c01::229]) by mx.google.com with ESMTPS id b10si6473464qaw.76.2014.09.26.10.10.21 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 26 Sep 2014 10:10:21 -0700 (PDT) Received: by mail-qc0-f169.google.com with SMTP id r5so5786484qcx.0 for ; Fri, 26 Sep 2014 10:10:21 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: <1411562649-28231-12-git-send-email-a.ryabinin@samsung.com> References: <1404905415-9046-1-git-send-email-a.ryabinin@samsung.com> <1411562649-28231-1-git-send-email-a.ryabinin@samsung.com> <1411562649-28231-12-git-send-email-a.ryabinin@samsung.com> From: Dmitry Vyukov Date: Fri, 26 Sep 2014 10:10:01 -0700 Message-ID: Subject: Re: [PATCH v3 11/13] kmemleak: disable kasan instrumentation for kmemleak Content-Type: text/plain; charset=UTF-8 Sender: owner-linux-mm@kvack.org List-ID: To: Andrey Ryabinin Cc: LKML , Konstantin Serebryany , Dmitry Chernenkov , Andrey Konovalov , Yuri Gribov , Konstantin Khlebnikov , Sasha Levin , Christoph Lameter , Joonsoo Kim , Andrew Morton , Dave Hansen , Andi Kleen , Vegard Nossum , "H. Peter Anvin" , Dave Jones , x86@kernel.org, linux-mm@kvack.org, Catalin Marinas Looks good to me. We can disable kasan instrumentation of this file as well. On Wed, Sep 24, 2014 at 5:44 AM, Andrey Ryabinin wrote: > kmalloc internally round up allocation size, and kmemleak > uses rounded up size as object's size. This makes kasan > to complain while kmemleak scans memory or calculates of object's > checksum. The simplest solution here is to disable kasan. > > Signed-off-by: Andrey Ryabinin > --- > mm/kmemleak.c | 6 ++++++ > 1 file changed, 6 insertions(+) > > diff --git a/mm/kmemleak.c b/mm/kmemleak.c > index 3cda50c..9bda1b3 100644 > --- a/mm/kmemleak.c > +++ b/mm/kmemleak.c > @@ -98,6 +98,7 @@ > #include > #include > > +#include > #include > #include > #include > @@ -1113,7 +1114,10 @@ static bool update_checksum(struct kmemleak_object *object) > if (!kmemcheck_is_obj_initialized(object->pointer, object->size)) > return false; > > + kasan_disable_local(); > object->checksum = crc32(0, (void *)object->pointer, object->size); > + kasan_enable_local(); > + > return object->checksum != old_csum; > } > > @@ -1164,7 +1168,9 @@ static void scan_block(void *_start, void *_end, > BYTES_PER_POINTER)) > continue; > > + kasan_disable_local(); > pointer = *ptr; > + kasan_enable_local(); > > object = find_and_get_object(pointer, 1); > if (!object) > -- > 2.1.1 > -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org