From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 47319C433F5 for ; Tue, 11 Oct 2022 08:24:37 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 40E606B0072; Tue, 11 Oct 2022 04:24:36 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 3BE826B0073; Tue, 11 Oct 2022 04:24:36 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 285726B0074; Tue, 11 Oct 2022 04:24:36 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0015.hostedemail.com [216.40.44.15]) by kanga.kvack.org (Postfix) with ESMTP id 1241F6B0072 for ; Tue, 11 Oct 2022 04:24:36 -0400 (EDT) Received: from smtpin11.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay07.hostedemail.com (Postfix) with ESMTP id D1186160FB6 for ; Tue, 11 Oct 2022 08:24:35 +0000 (UTC) X-FDA: 80007982110.11.4DFF2CE Received: from casper.infradead.org (casper.infradead.org [90.155.50.34]) by imf05.hostedemail.com (Postfix) with ESMTP id 9CADE100027 for ; Tue, 11 Oct 2022 08:24:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=casper.20170209; h=In-Reply-To:Content-Type:MIME-Version: References:Message-ID:Subject:Cc:To:From:Date:Sender:Reply-To: Content-Transfer-Encoding:Content-ID:Content-Description; bh=UykTJ7aWjC0CKU4x9PgcpHxD5DYk8iJQd5iBQkWjMTk=; b=c+MzSjAxmmB0/S1jD//ocqinK1 RiN3+LuJMBRcdZ+TdbDvXcKuRj61y8IbMoawQiCVBzoXh39LlkTu/Eb6E5dQJ5270kWTAoXpDuyMV /AJS63N2Q9nsseYasm6d032m92km9XGf3N6Ppy9tk0jOzcNMUb4PJbfb7jtujUSVU4L66j13bvLCm numbJxW7IuXv7ZaSLs05jFNnW4GzUO4HoGIZfNGrV62c9FRBbO3VIMhzWs7DKjigg10ixHZjAVMbo dDa6hF/vuC6WqgWVP+hxoMsLbiDOtL/WmPHzqQ3C0+K3/oZwt3Xuue7AsC8POttpNdjDnKIHJbBM6 y2ePx0dQ==; Received: from j130084.upc-j.chello.nl ([24.132.130.84] helo=noisy.programming.kicks-ass.net) by casper.infradead.org with esmtpsa (Exim 4.94.2 #2 (Red Hat Linux)) id 1oiAYy-004o4V-Kq; Tue, 11 Oct 2022 08:24:32 +0000 Received: from hirez.programming.kicks-ass.net (hirez.programming.kicks-ass.net [192.168.1.225]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits)) (Client did not present a certificate) by noisy.programming.kicks-ass.net (Postfix) with ESMTPS id 3DBBC3001CB; Tue, 11 Oct 2022 10:24:27 +0200 (CEST) Received: by hirez.programming.kicks-ass.net (Postfix, from userid 1000) id 2082B20E1D7E5; Tue, 11 Oct 2022 10:24:27 +0200 (CEST) Date: Tue, 11 Oct 2022 10:24:27 +0200 From: Peter Zijlstra To: Linus Torvalds Cc: Andrew Morton , Alexander Potapenko , Andrey Konovalov , Josh Poimboeuf , mm-commits@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: Re: [GIT PULL] MM updates for 6.1-rc1 Message-ID: References: <20221008132113.919b9b894426297de78ac00f@linux-foundation.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1665476675; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=UykTJ7aWjC0CKU4x9PgcpHxD5DYk8iJQd5iBQkWjMTk=; b=B5ajqqLeV5gG3d1+I+RPr+k9BxhxB0n5KxLzQMVar8dThpsPiQwJShnKopBnZD67ODqoW3 0KO7HdUU3JKWu5Z1nQesZdKKsXvlss5VJt0YlF7nVaHFeUpe4PTk+YwBgv9eQAbaiWpNyC iJ0hiVsZu6lRjM22jNjuS5/31xko61Q= ARC-Authentication-Results: i=1; imf05.hostedemail.com; dkim=pass header.d=infradead.org header.s=casper.20170209 header.b=c+MzSjAx; dmarc=none; spf=none (imf05.hostedemail.com: domain of peterz@infradead.org has no SPF policy when checking 90.155.50.34) smtp.mailfrom=peterz@infradead.org ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1665476675; a=rsa-sha256; cv=none; b=NyaRR++R3OfQFp36ahMt92IDkNL8wnorJNU3yHBsGKjvzbCQw63VWhgwSrs9ya1s1+mhH2 7NpQSreh+an7YVsgpE8Op2arD9zGxjRAz6Ng35fhhOwZKW6ALnBn9n3Uw95o7bFr3eeek5 RcFcWw7xzQdDN7T2gKAjz8niwzmHA34= Authentication-Results: imf05.hostedemail.com; dkim=pass header.d=infradead.org header.s=casper.20170209 header.b=c+MzSjAx; dmarc=none; spf=none (imf05.hostedemail.com: domain of peterz@infradead.org has no SPF policy when checking 90.155.50.34) smtp.mailfrom=peterz@infradead.org X-Stat-Signature: kpgksz4oft1s37u8j63x587ez5qgayyx X-Rspamd-Queue-Id: 9CADE100027 X-Rspam-User: X-Rspamd-Server: rspam06 X-HE-Tag: 1665476674-354139 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Mon, Oct 10, 2022 at 06:20:00PM -0700, Linus Torvalds wrote: > The other thing I notice from just doing a build is that I now get > > vmlinux.o: warning: objtool: kasan_report+0x12: call to > stackleak_track_stack() with UACCESS enabled So kasan_report() is already marked as being special; and it does the mandatory user_access_save() / user_access_restore() things to fix it up. But it looks like kasan code itself is now getting instrumented by the stackleak stuff and that inserts a call outside of the user_access_save()/restore() thing, and *that* is getting flagged. Looking at mm/kasan/Makefile it disables a lot of the instrumentation, but perhaps not enough? I've not yet tried to reproduce, I'm taking this is allyesconfig or something glorious like that? LLVM-15 ?