From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id DA6DEC2BA18 for ; Thu, 20 Jun 2024 08:15:12 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 6B1028D00A6; Thu, 20 Jun 2024 04:15:12 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 65F4C8D0091; Thu, 20 Jun 2024 04:15:12 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 527288D00A6; Thu, 20 Jun 2024 04:15:12 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0014.hostedemail.com [216.40.44.14]) by kanga.kvack.org (Postfix) with ESMTP id 39DE98D0091 for ; Thu, 20 Jun 2024 04:15:12 -0400 (EDT) Received: from smtpin29.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id DD6C9A4598 for ; Thu, 20 Jun 2024 08:15:11 +0000 (UTC) X-FDA: 82250556822.29.F3F6B8C Received: from mail-yw1-f176.google.com (mail-yw1-f176.google.com [209.85.128.176]) by imf26.hostedemail.com (Postfix) with ESMTP id 1F26D140004 for ; Thu, 20 Jun 2024 08:15:09 +0000 (UTC) Authentication-Results: imf26.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=raKIpH4b; dmarc=pass (policy=reject) header.from=google.com; spf=pass (imf26.hostedemail.com: domain of glider@google.com designates 209.85.128.176 as permitted sender) smtp.mailfrom=glider@google.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1718871302; a=rsa-sha256; cv=none; b=EH19ByFkG3Yup4kr5Q9wkLeYY6WmcI+4UZ3ts0N6snO3tczK9y5Z+/vLVxaOQ4nY8C7nCm rMa0sEnOPM12MccGpxUS9VCUq7p6Ndy4lB77vPgT2CcTQPMaALvUMdWtVJ6mafZ1xPoLr5 huIu0i1Ep1ZPOmPXGciFoL1pKKCknq0= ARC-Authentication-Results: i=1; imf26.hostedemail.com; dkim=pass header.d=google.com header.s=20230601 header.b=raKIpH4b; dmarc=pass (policy=reject) header.from=google.com; spf=pass (imf26.hostedemail.com: domain of glider@google.com designates 209.85.128.176 as permitted sender) smtp.mailfrom=glider@google.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1718871302; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=VkDyjmmo2mJ4eSIsOzioTK+npaxfD4Q0PqQ0hVQZ66Q=; b=4yZV+ArGNFupjwMNmaR6sGhrlOwGe5Jhsm3TDo6pY8Sl0eWZpJLPdEZgtIZmOoQ+QZWGOo DFfw7gtFUwRpVw4TqkbXushHWIJkSAywDHyrNmVNBlEhQ7slPGOy2fiqG5euJ5caNKafl8 Tocwd+umLzHhzoTEQJedpl+11o7y6yY= Received: by mail-yw1-f176.google.com with SMTP id 00721157ae682-63bca6db118so5952557b3.3 for ; Thu, 20 Jun 2024 01:15:09 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1718871309; x=1719476109; darn=kvack.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=VkDyjmmo2mJ4eSIsOzioTK+npaxfD4Q0PqQ0hVQZ66Q=; b=raKIpH4b62yXICM66sMltkDkE0X8spH9rHS3y540hKv3ahUR5SkOaTWXmsC+7Gw4Ha 9zfqJbNZsQ16FvJQb6YP1baHH4lLmodVmIQhQ5DbesUtqoGjMVJKA6stUl9nJP6r6Vod bYH5blSgXBtIDyfgeanZSjhcW6v1cLA7SLkqdHJWm3bLeyxiewiVgDNWX9vzcp+YRtVX d5yeIliLMBGsbs5gFJSFi2U/rVGPl5llsRVao1sj9s5+MxVFdmawbdMmj1sA0A3I7pTk YkwGEWanqi1Ywi2XoO7gokHh/s122Atb7kW63XCIb7DF0zGj0r4C9mhPaRohf4mcRI2K BLYw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1718871309; x=1719476109; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=VkDyjmmo2mJ4eSIsOzioTK+npaxfD4Q0PqQ0hVQZ66Q=; b=jmRWN1Croi+OhAkcQZ4uu2XjSwSOzsuQWZC0QaTI1Cis4xCzF+x67mVHX2mZATVaUa 3u7lnPACLPwrAffmugmE/8xqwjiev9yvvEsxCIYAJodJwYUL/uwFZT7XOnqdXkYcdIvL RQ1nC4cu2culqXLWgTpkQU9kHLE0zeauXcJEKIxoGOBFv4jgLKpoOTnWCxhrfWZq3i9D w8J4GiDzXOLG4t0cT4UThj25vsIjlTdAGdsMQh1PHgYxjOxh4T+vsPeOhVyk2q5EOa60 5BiGPmXfQ42z+ZyPgZ8q1oW1GQgNmcfz9Ta7bsqw28640D+H/JBZJj3PbMtg+XGfUC9x SBsQ== X-Forwarded-Encrypted: i=1; AJvYcCVz/ZvkBwXVnLLF3m41Y6Fd9URgq1fOoxfjpcGl6K8ZHbsHU1k6KJLVcLWqX6s1o6kGVJkmv1nXb1JP2msTL+yWOUg= X-Gm-Message-State: AOJu0YzkknZYv3byfyQrxJwdwJbXmNyAyjvHGJXs8BDFYihLBYtFl/iJ yd3ByiUVNly/NfTU78mlr9qkBSUryBORc4hgBGnZgQIfsy85IWZdP+qPzMlw1Md7Cro0cCb2eLS tEAsSWQO8Q4sPD56+MMrdj0X8XJ9nGha6d8Mv X-Google-Smtp-Source: AGHT+IEov8tA6WgC+NocZnlJNfskZn/sCcpgNQNbOkch4CKnuKF2F+01qvPEG14FlebgcmBeM68GwMaerknT5zuvZsM= X-Received: by 2002:a0d:f185:0:b0:61b:3345:a349 with SMTP id 00721157ae682-63a8d44ac47mr43240177b3.3.1718871308642; Thu, 20 Jun 2024 01:15:08 -0700 (PDT) MIME-Version: 1.0 References: <20240619154530.163232-1-iii@linux.ibm.com> <20240619154530.163232-13-iii@linux.ibm.com> In-Reply-To: <20240619154530.163232-13-iii@linux.ibm.com> From: Alexander Potapenko Date: Thu, 20 Jun 2024 10:14:27 +0200 Message-ID: Subject: Re: [PATCH v5 12/37] kmsan: Introduce memset_no_sanitize_memory() To: Ilya Leoshkevich Cc: Alexander Gordeev , Andrew Morton , Christoph Lameter , David Rientjes , Heiko Carstens , Joonsoo Kim , Marco Elver , Masami Hiramatsu , Pekka Enberg , Steven Rostedt , Vasily Gorbik , Vlastimil Babka , Christian Borntraeger , Dmitry Vyukov , Hyeonggon Yoo <42.hyeyoo@gmail.com>, kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, linux-mm@kvack.org, linux-s390@vger.kernel.org, linux-trace-kernel@vger.kernel.org, Mark Rutland , Roman Gushchin , Sven Schnelle Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Rspamd-Server: rspam12 X-Rspamd-Queue-Id: 1F26D140004 X-Stat-Signature: r9de63dbu88ye6e1odp7d58jk6zrbdsm X-Rspam-User: X-HE-Tag: 1718871309-794002 X-HE-Meta: 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 HzJkEW1g ed65Fo7U7yIU6Nps0Jbr4zxiPU7Wfr84sOtv2FfeHuYEdtPwZzOYKrPH7NXrOLbXBS5PdNoeSMOpDwFoBYLbNLzb2sY5FZhHIoR8lsdHW1htu5RdiCRmzpLaiq8+kBTpPt4HpR8WcmLB8z1zM8DeqQN/la9wzPmwqYlIeOwduLYCPZb6DUpOW/mGEpOP6QfG74ZKZNfwZdDsWLAWzwslHH5RFI7/SzBT4Bat8OLC+zeoQxIU9IyYaJrUHgEEwiKgvFApfIAb1i4fq+ZRoNea8rPzdU+4Tk3PbpP+bkMTQzO7CN14t4nODGmG0aJs6nkmLfc4B00Bj05/ryB/+d3z2Hd/atA== X-Bogosity: Ham, tests=bogofilter, spamicity=0.005041, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: List-Subscribe: List-Unsubscribe: On Wed, Jun 19, 2024 at 5:45=E2=80=AFPM Ilya Leoshkevich wrote: > > Add a wrapper for memset() that prevents unpoisoning. This is useful > for filling memory allocator redzones. > > Signed-off-by: Ilya Leoshkevich Reviewed-by: Alexander Potapenko > --- > include/linux/kmsan.h | 13 +++++++++++++ > 1 file changed, 13 insertions(+) > > diff --git a/include/linux/kmsan.h b/include/linux/kmsan.h > index 23de1b3d6aee..5f50885f2023 100644 > --- a/include/linux/kmsan.h > +++ b/include/linux/kmsan.h > @@ -255,6 +255,14 @@ void kmsan_enable_current(void); > */ > void kmsan_disable_current(void); > > +/* > + * memset_no_sanitize_memory(): memset() without KMSAN instrumentation. > + */ Please make this a doc comment, like in the rest of the file. (Please also fix kmsan_enable_current/kmsan_disable_current in the respective patch)