From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 26652ECAAD3 for ; Tue, 6 Sep 2022 03:10:49 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 532C480249; Mon, 5 Sep 2022 23:10:49 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 4E1AA80224; Mon, 5 Sep 2022 23:10:49 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 3B29D80249; Mon, 5 Sep 2022 23:10:49 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0012.hostedemail.com [216.40.44.12]) by kanga.kvack.org (Postfix) with ESMTP id 28D3D80224 for ; Mon, 5 Sep 2022 23:10:49 -0400 (EDT) Received: from smtpin01.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id E406FA9F07 for ; Tue, 6 Sep 2022 03:10:48 +0000 (UTC) X-FDA: 79880183376.01.5D71F8F Received: from mail-pf1-f169.google.com (mail-pf1-f169.google.com [209.85.210.169]) by imf16.hostedemail.com (Postfix) with ESMTP id A154318006C for ; Tue, 6 Sep 2022 03:10:48 +0000 (UTC) Received: by mail-pf1-f169.google.com with SMTP id y136so5113136pfb.3 for ; Mon, 05 Sep 2022 20:10:48 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:from:to:cc:subject:date; bh=0q5/g2xqSDjoX1m4bFjC22V5UplGI4w9R+6ExEXxELc=; b=J64gz2KzhvRwufT6qI2yRk1QrpOGL4+Ijgce9yyEMrmDsic72KQqMzz5Vtc4Fp17KB JYbJSC+w+9TMU+8udxawWQFzbsaHx1PvO1a2lqKvpK7Oy6JR6KMnLAa/t4BvuIkKCcZf oW3s+shJ+7uFVdUw5KMdokaCSiPpmvQfxe7KRM73c/eT//gSF1M45r/hX4Ge2tLNi3H6 15OuAmTNQmGf3JDjhn067whU+XpLJmdh21Z959SlZlIdkXRYYQ9r0K+CO07KZi8y+3Gw czBRXX0O2iXqJPmzz2eSFNcOThf7Qn32h5GyOyoJR8WDrYQqd5khKlwebxrgqP8ifdfX uT8g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date; bh=0q5/g2xqSDjoX1m4bFjC22V5UplGI4w9R+6ExEXxELc=; b=zOEWFgKwUgSXbi3eM99Wj/WoNOkjYizRAz+DCpvaiDmkc+m9taxa3gvYAEKUnPqGHn eGy3gp9TuoId/GLfxb1+8+Pq7Ep9T7Xxl9Pw0vEiWyLvq1rD4i8TbrB+F6LP8bTt5iNE S+70KS6JxbzrkajrLfANsKCNQLz3CkMHDRpUlJ+ns3IGxHWmwRc5IUEp/abQhXSfGvQO aG4uzr0ZwTaN9NyTkg0jWc0UqMhFetHvHI/69WuyupCbDL5eYe1g4LUxEfmXHSwg3aoZ kuuGBhwj7uk+NbQPvOh+oHdGNhzZbs32r3GTmvbq3V/ECILZsNrC42UFPtLInqX+0/wO c5dA== X-Gm-Message-State: ACgBeo1WUg+CBxZx2JTAJ19IPBk3uOa5ggM6fRerlsWOhZbB5rg+RPWM dipKUnyx3aqONWqYwTnjz40= X-Google-Smtp-Source: AA6agR4PNdGoLwzIJQfbmesd5qxQF8UnVgpaYg2wB/pPZTvea4YBq8MPq0UxBOfR2LAN/bZWntoBig== X-Received: by 2002:a05:6a00:1145:b0:52b:78c:fa26 with SMTP id b5-20020a056a00114500b0052b078cfa26mr53065753pfm.27.1662433847595; Mon, 05 Sep 2022 20:10:47 -0700 (PDT) Received: from debian.me (subs03-180-214-233-83.three.co.id. [180.214.233.83]) by smtp.gmail.com with ESMTPSA id k12-20020aa79d0c000000b00537d7cc774bsm8583585pfp.139.2022.09.05.20.10.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 05 Sep 2022 20:10:47 -0700 (PDT) Received: by debian.me (Postfix, from userid 1000) id 79773103CFD; Tue, 6 Sep 2022 10:10:34 +0700 (WIB) Date: Tue, 6 Sep 2022 10:10:26 +0700 From: Bagas Sanjaya To: Alexander Potapenko Cc: Alexander Viro , Alexei Starovoitov , Andrew Morton , Andrey Konovalov , Andy Lutomirski , Arnd Bergmann , Borislav Petkov , Christoph Hellwig , Christoph Lameter , David Rientjes , Dmitry Vyukov , Eric Dumazet , Greg Kroah-Hartman , Herbert Xu , Ilya Leoshkevich , Ingo Molnar , Jens Axboe , Joonsoo Kim , Kees Cook , Marco Elver , Mark Rutland , Matthew Wilcox , "Michael S. Tsirkin" , Pekka Enberg , Peter Zijlstra , Petr Mladek , Steven Rostedt , Thomas Gleixner , Vasily Gorbik , Vegard Nossum , Vlastimil Babka , kasan-dev@googlegroups.com, linux-mm@kvack.org, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org Subject: Re: [PATCH v6 6/44] kmsan: add ReST documentation Message-ID: References: <20220905122452.2258262-1-glider@google.com> <20220905122452.2258262-7-glider@google.com> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="8SFVSXRZNTT5RY83" Content-Disposition: inline In-Reply-To: <20220905122452.2258262-7-glider@google.com> ARC-Authentication-Results: i=1; imf16.hostedemail.com; dkim=pass header.d=gmail.com header.s=20210112 header.b=J64gz2Kz; spf=pass (imf16.hostedemail.com: domain of bagasdotme@gmail.com designates 209.85.210.169 as permitted sender) smtp.mailfrom=bagasdotme@gmail.com; dmarc=pass (policy=none) header.from=gmail.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1662433848; a=rsa-sha256; cv=none; b=3aME13Q1dpE7V+l921qWStHQAbVXOBUWkbe60+7a4Otgp2gGp5Z1hj3bTVlcWDX0M3y/Gk yjkwHF1uW8Hdc6D6mIeaLXomPiwIUGn25+oPmcUw/r95yLAZgVEXeSLiau4QHnIgBF22VD 4hWDL3lGCOyrK+UFfQfPmV9wKpvuRbY= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1662433848; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=0q5/g2xqSDjoX1m4bFjC22V5UplGI4w9R+6ExEXxELc=; b=E+03bFmMLwjA4aSFNj3FzkAJE5FzFWbNzlZhSDuSJb4L0LF+Z7J5UhQ6YWGuqnCjOo/rbM op3jpAzooPd/H7TZsP6XCE9Q3ssLuVuzO5c+yvH2v0oeEDuH5dLEJM60HRbdWDLVsmDoEO 3kmPUhS0mEqdnmU9sbKz4ENr7RAaUuo= Authentication-Results: imf16.hostedemail.com; dkim=pass header.d=gmail.com header.s=20210112 header.b=J64gz2Kz; spf=pass (imf16.hostedemail.com: domain of bagasdotme@gmail.com designates 209.85.210.169 as permitted sender) smtp.mailfrom=bagasdotme@gmail.com; dmarc=pass (policy=none) header.from=gmail.com X-Rspam-User: X-Stat-Signature: uq9pn86xp4epzjsptkyo7i1kkq8xcjwz X-Rspamd-Queue-Id: A154318006C X-Rspamd-Server: rspam05 X-HE-Tag: 1662433848-836038 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: --8SFVSXRZNTT5RY83 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, Sep 05, 2022 at 02:24:14PM +0200, Alexander Potapenko wrote: > +Here is an example of a KMSAN report:: > + > + =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D > + BUG: KMSAN: uninit-value in test_uninit_kmsan_check_memory+0x1be/0x380= [kmsan_test] > + test_uninit_kmsan_check_memory+0x1be/0x380 mm/kmsan/kmsan_test.c:273 > + kunit_run_case_internal lib/kunit/test.c:333 > + kunit_try_run_case+0x206/0x420 lib/kunit/test.c:374 > + kunit_generic_run_threadfn_adapter+0x6d/0xc0 lib/kunit/try-catch.c:28 > + kthread+0x721/0x850 kernel/kthread.c:327 > + ret_from_fork+0x1f/0x30 ??:? > + > + Uninit was stored to memory at: > + do_uninit_local_array+0xfa/0x110 mm/kmsan/kmsan_test.c:260 > + test_uninit_kmsan_check_memory+0x1a2/0x380 mm/kmsan/kmsan_test.c:271 > + kunit_run_case_internal lib/kunit/test.c:333 > + kunit_try_run_case+0x206/0x420 lib/kunit/test.c:374 > + kunit_generic_run_threadfn_adapter+0x6d/0xc0 lib/kunit/try-catch.c:28 > + kthread+0x721/0x850 kernel/kthread.c:327 > + ret_from_fork+0x1f/0x30 ??:? > + > + Local variable uninit created at: > + do_uninit_local_array+0x4a/0x110 mm/kmsan/kmsan_test.c:256 > + test_uninit_kmsan_check_memory+0x1a2/0x380 mm/kmsan/kmsan_test.c:271 > + > + Bytes 4-7 of 8 are uninitialized > + Memory access of size 8 starts at ffff888083fe3da0 > + > + CPU: 0 PID: 6731 Comm: kunit_try_catch Tainted: G B E 5.1= 6.0-rc3+ #104 > + Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 0= 4/01/2014 > + =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D Are these table markers in the code block above part of kmsan output? > +A use of uninitialized value ``v`` is reported by KMSAN in the following= cases: > + - in a condition, e.g. ``if (v) { ... }``; > + - in an indexing or pointer dereferencing, e.g. ``array[v]`` or ``*v``; > + - when it is copied to userspace or hardware, e.g. ``copy_to_user(..., = &v, ...)``; > + - when it is passed as an argument to a function, and > + ``CONFIG_KMSAN_CHECK_PARAM_RETVAL`` is enabled (see below). The sentence before the list above is rendered as definition list term instead, so I add the blank line separator: ---- >8 ---- diff --git a/Documentation/dev-tools/kmsan.rst b/Documentation/dev-tools/km= san.rst index 2a53a801198cbf..55fa82212eb255 100644 --- a/Documentation/dev-tools/kmsan.rst +++ b/Documentation/dev-tools/kmsan.rst @@ -67,6 +67,7 @@ uninitialized in the local variable, as well as the stack= where the value was copied to another memory location before use. =20 A use of uninitialized value ``v`` is reported by KMSAN in the following c= ases: + - in a condition, e.g. ``if (v) { ... }``; - in an indexing or pointer dereferencing, e.g. ``array[v]`` or ``*v``; - when it is copied to userspace or hardware, e.g. ``copy_to_user(..., &v= , ...)``; Thanks.=20 --=20 An old man doll... just what I always wanted! - Clara --8SFVSXRZNTT5RY83 Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iHUEABYIAB0WIQSSYQ6Cy7oyFNCHrUH2uYlJVVFOowUCYxa6FQAKCRD2uYlJVVFO o5TjAP4pqdJtF2silbpITwEaYJyueteQAD2tnShYfmi4k/CwmwD+Kf2knjEANX/1 NS87UnfEtAMR4Gyq0gGFXh2B5ITIaww= =3svA -----END PGP SIGNATURE----- --8SFVSXRZNTT5RY83--