From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8CAC1C00140 for ; Tue, 2 Aug 2022 16:32:02 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id AA8738E0001; Tue, 2 Aug 2022 12:32:01 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id A314A6B0072; Tue, 2 Aug 2022 12:32:01 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 8AAA18E0001; Tue, 2 Aug 2022 12:32:01 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id 7652F6B0071 for ; Tue, 2 Aug 2022 12:32:01 -0400 (EDT) Received: from smtpin16.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay02.hostedemail.com (Postfix) with ESMTP id 383831206A5 for ; Tue, 2 Aug 2022 16:32:01 +0000 (UTC) X-FDA: 79755194442.16.921975D Received: from mail-yb1-f176.google.com (mail-yb1-f176.google.com [209.85.219.176]) by imf22.hostedemail.com (Postfix) with ESMTP id CD4EBC0044 for ; Tue, 2 Aug 2022 16:32:00 +0000 (UTC) Received: by mail-yb1-f176.google.com with SMTP id 21so1745713ybf.4 for ; Tue, 02 Aug 2022 09:32:00 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc; bh=jBLRsOY6b2BWFCEwUDOOLDtlfS4iNN5NSPXBB7OTTdA=; b=C4yceeMrnfpv45TrBL5GxEv4ZUizC3/Vr/jdh5+Zbi+KLMTBmkoAfxkD1EYYg12lXR pVh9AeV8yvh5TuY9NmlD5eP0jKvFj7RP4G22OnxoGm/N4AdkMtswGPXRhOT2BAXTVf+g FxUqNI0/HgsAV4zTTqe6XuZcWKi6X5wZ9M7NjSvOyx1jz7FGR6CrHM8rbpH9l0DxzWoe hf6GZ3KmxjshcXvib72rR5MKZV0MM1F8H1CRVx3BPyeg9Gw1DE8RZTD5fXM+LhoZ5DnJ bgOGwc3ofHcCsX0ffHzVQHWF/qTn8A1ekfgQvNGt/WK7yTeGQxrDPRF9ro3QNUjzbtCk zTkg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc; bh=jBLRsOY6b2BWFCEwUDOOLDtlfS4iNN5NSPXBB7OTTdA=; b=B338q6ifkWKmVrlQ7KeDx4r+B5N2slUvjIiIpIS+OSLjr8MO2aMX3Ut4fiOcb7jueP /O302rX8wTeMKuBoi25NC4rCGJpJvKXlUFMjzR6HGPCNhG9Cmzy2s5qbZ3HAcPi16RN3 bdMvZ5dj+BCpG5LovUkH0kvTdR7dBUoRq1CF+WjizjfapJrmPbAAxR9/laky6YYiR9S4 TH2WtbxKwrM+VeEkUgEH4AoAR1CWz9kW+0EwSQMFzve5z2V4jhWFN3eDde6IzUk4oRPB mNreZ9/IXQxnLoRrGC+RyPfzyNKP7SN5wUWuKU9pbtOloa5ACTnwz/N7LpAp+dnfhV07 VGEA== X-Gm-Message-State: ACgBeo2JL8pNqZCFxxzUPMAIyVbpVg6eipIdNDepJPHCYX+605UCZoAx cmcrYP5h5AxEP+l5URcxAtJK3X2aPec/Had4DBPwfQ== X-Google-Smtp-Source: AA6agR4IP/yDKQLvxlaLVuFqguT0B75J5VxgY1hE7G7tnFEWCGuvYJ1oLYRqlboQgCEcZi6lhGNXNp7TZO+7bdc8488= X-Received: by 2002:a25:b9d1:0:b0:671:49f9:4e01 with SMTP id y17-20020a25b9d1000000b0067149f94e01mr16899347ybj.398.1659457919894; Tue, 02 Aug 2022 09:31:59 -0700 (PDT) MIME-Version: 1.0 References: <20220701142310.2188015-1-glider@google.com> <20220701142310.2188015-16-glider@google.com> In-Reply-To: From: Alexander Potapenko Date: Tue, 2 Aug 2022 18:31:23 +0200 Message-ID: Subject: Re: [PATCH v4 15/45] mm: kmsan: call KMSAN hooks from SLUB code To: Marco Elver Cc: Alexander Viro , Alexei Starovoitov , Andrew Morton , Andrey Konovalov , Andy Lutomirski , Arnd Bergmann , Borislav Petkov , Christoph Hellwig , Christoph Lameter , David Rientjes , Dmitry Vyukov , Eric Dumazet , Greg Kroah-Hartman , Herbert Xu , Ilya Leoshkevich , Ingo Molnar , Jens Axboe , Joonsoo Kim , Kees Cook , Mark Rutland , Matthew Wilcox , "Michael S. Tsirkin" , Pekka Enberg , Peter Zijlstra , Petr Mladek , Steven Rostedt , Thomas Gleixner , Vasily Gorbik , Vegard Nossum , Vlastimil Babka , kasan-dev , Linux Memory Management List , Linux-Arch , LKML Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1659457920; a=rsa-sha256; cv=none; b=rD3PkPITwaXvdpNAvPsnG7ZSMs8iR056yWzQe+f+WZiIm0C3icDwE55u11Yp8+EM2/UHJZ QGkJwAZKf5BO3KLp0K3qVk6F35dKpfeR0JT8uPu4mv2CLg5ByEq6EOhDv5FiU6tUYQlrFn NEeALhlyXao9v6JFh56qUsip8e1iylo= ARC-Authentication-Results: i=1; imf22.hostedemail.com; dkim=pass header.d=google.com header.s=20210112 header.b=C4yceeMr; spf=pass (imf22.hostedemail.com: domain of glider@google.com designates 209.85.219.176 as permitted sender) smtp.mailfrom=glider@google.com; dmarc=pass (policy=reject) header.from=google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1659457920; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=jBLRsOY6b2BWFCEwUDOOLDtlfS4iNN5NSPXBB7OTTdA=; b=Mcvo3Mr9/pHXm1cXcHEXY7sKt++EyaUZKqn8wD9X37SM8XhEiPkp/ZNyEryDUszrijoJPA lQEKC/89B2jZQO86l1SAWPEoaNzbW9SdDGr4tEj/jx4bdnUj4E2qV8Mx6L63PF9nFBO7qA JkDlM+pZUG3AqiNBpoQaoXsw6QV5aCA= X-Rspamd-Server: rspam04 X-Stat-Signature: wgc6qdog6zttzebf5iojt737ztrwbptq Authentication-Results: imf22.hostedemail.com; dkim=pass header.d=google.com header.s=20210112 header.b=C4yceeMr; spf=pass (imf22.hostedemail.com: domain of glider@google.com designates 209.85.219.176 as permitted sender) smtp.mailfrom=glider@google.com; dmarc=pass (policy=reject) header.from=google.com X-Rspamd-Queue-Id: CD4EBC0044 X-Rspam-User: X-HE-Tag: 1659457920-876165 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Tue, Jul 12, 2022 at 3:14 PM Marco Elver wrote: > > On Fri, 1 Jul 2022 at 16:23, 'Alexander Potapenko' via kasan-dev > wrote: > > > > In order to report uninitialized memory coming from heap allocations > > KMSAN has to poison them unless they're created with __GFP_ZERO. > > > > It's handy that we need KMSAN hooks in the places where > > init_on_alloc/init_on_free initialization is performed. > > > > In addition, we apply __no_kmsan_checks to get_freepointer_safe() to > > suppress reports when accessing freelist pointers that reside in freed > > objects. > > > > Signed-off-by: Alexander Potapenko > > Reviewed-by: Marco Elver > > But see comment below. > > > Remove unnecessary whitespace change. Will do, thanks for catching! --=20 Alexander Potapenko Software Engineer Google Germany GmbH Erika-Mann-Stra=C3=9Fe, 33 80636 M=C3=BCnchen Gesch=C3=A4ftsf=C3=BChrer: Paul Manicle, Liana Sebastian Registergericht und -nummer: Hamburg, HRB 86891 Sitz der Gesellschaft: Hamburg