From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 942D0C433EF for ; Mon, 4 Apr 2022 15:04:15 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id A2DF66B0072; Mon, 4 Apr 2022 10:57:23 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 9DD1D6B0073; Mon, 4 Apr 2022 10:57:23 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 87DED6B0074; Mon, 4 Apr 2022 10:57:23 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0061.hostedemail.com [216.40.44.61]) by kanga.kvack.org (Postfix) with ESMTP id 796556B0072 for ; Mon, 4 Apr 2022 10:57:23 -0400 (EDT) Received: from smtpin20.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay05.hostedemail.com (Postfix) with ESMTP id 3CB37183E39B4 for ; Mon, 4 Apr 2022 14:57:13 +0000 (UTC) X-FDA: 79319499504.20.A1E91C3 Received: from mail-yb1-f172.google.com (mail-yb1-f172.google.com [209.85.219.172]) by imf06.hostedemail.com (Postfix) with ESMTP id C1137180019 for ; Mon, 4 Apr 2022 14:57:12 +0000 (UTC) Received: by mail-yb1-f172.google.com with SMTP id j2so18187407ybu.0 for ; Mon, 04 Apr 2022 07:57:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=oQXip11/mOq1QEIb7Uh7PfUGeTnBxSjdGMNgDU3H0ac=; b=sFPpy6/1ERVilOjkhoNtdU6pzyexFt9dvn8SKKMJfIG2Qtk3XLX6kW46rCfdemme06 QLVikzfPklS+9789YRedbVZNG9vCKmAXYBqTm+oxmSoXtl7AEU9lAaUa5jWqs9UYE9sM yFECOLoBML1fKtj4hqurE1FBRLG7nsR1mpmLYtb5ijpgb6frVlG1HTH0L96Epwz/Kyz7 /DjT9HpXAGnx+MUwOrA9zFVUEGhhPS2zohqq/7QJJDqEBtdzjIkyXPAaZ4+FGbv9CfFv fBMcu+KM0UNHhn7zzrqdnQFSR6CG0Sk216wg118fddoib1KIuZl5NG+K4xOVbSVAQT4D CY1Q== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=oQXip11/mOq1QEIb7Uh7PfUGeTnBxSjdGMNgDU3H0ac=; b=nLY67mbWsCbagIJjW0+F/3s+6i6L2LkzyUqCjFB2OAMi2Roc7tcoIfLqDh9ZutDNUh +TthA2rlK5KvQczUKyzmyd34//uKWrz3XSRhx0h9XNeXEZ7l+HKeDt/8ywvBS5npNvsL EUwZueE8xRy6hOQCfjPwVSr7mcKWhKHzg2vKVca4PuCBkjtg8J3l81IDwaOLJ7u2a/9B 8aJQpoFU4ugz5LzSkTezOZCMXWysgPVt3s6BfY8hY3nFOqrOHP5IWixLf83kYtb75eM1 PWPHqUetRv+e4gJ2cETD2w+Q7lzIwiV+6i9Dflq6dPf/0CqXXlOVlj4D7o6TDpOf/sUN j1AQ== X-Gm-Message-State: AOAM533DT4TIuq0IIyTkvVOJCRc0t1H0x9V68iuzKUFaNhj/xtPAo450 rXOihV7CAtGvlP+aHufcnwJ8JWX/PMWTZJdlmvaN+Q== X-Google-Smtp-Source: ABdhPJzw1DgZAsjP77DWhNJHF9MxDZ8jfkBeWpV+GnWhN3Ppz05CKQlwJDA6qtB0VyPTIdnI6RaZeiSysOLf9uEgkgU= X-Received: by 2002:a25:d897:0:b0:63d:af73:1115 with SMTP id p145-20020a25d897000000b0063daf731115mr185537ybg.274.1649084231809; Mon, 04 Apr 2022 07:57:11 -0700 (PDT) MIME-Version: 1.0 References: <20220329124017.737571-1-glider@google.com> <20220329124017.737571-32-glider@google.com> In-Reply-To: <20220329124017.737571-32-glider@google.com> From: Alexander Potapenko Date: Mon, 4 Apr 2022 16:56:35 +0200 Message-ID: Subject: Re: [PATCH v2 31/48] kernel: kmsan: don't instrument stacktrace.c To: Alexander Potapenko Cc: Alexander Viro , Andrew Morton , Andrey Konovalov , Andy Lutomirski , Arnd Bergmann , Borislav Petkov , Christoph Hellwig , Christoph Lameter , David Rientjes , Dmitry Vyukov , Eric Dumazet , Greg Kroah-Hartman , Herbert Xu , Ilya Leoshkevich , Ingo Molnar , Jens Axboe , Joonsoo Kim , Kees Cook , Marco Elver , Mark Rutland , Matthew Wilcox , "Michael S. Tsirkin" , Pekka Enberg , Peter Zijlstra , Petr Mladek , Steven Rostedt , Thomas Gleixner , Vasily Gorbik , Vegard Nossum , Vlastimil Babka , Linux Memory Management List , Linux-Arch , LKML Content-Type: text/plain; charset="UTF-8" X-Rspamd-Server: rspam09 X-Rspam-User: X-Stat-Signature: nbnx5zwkg8gsr6acecubsy1h475tx13i Authentication-Results: imf06.hostedemail.com; dkim=pass header.d=google.com header.s=20210112 header.b="sFPpy6/1"; dmarc=pass (policy=reject) header.from=google.com; spf=pass (imf06.hostedemail.com: domain of glider@google.com designates 209.85.219.172 as permitted sender) smtp.mailfrom=glider@google.com X-Rspamd-Queue-Id: C1137180019 X-HE-Tag: 1649084232-15714 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: On Tue, Mar 29, 2022 at 2:41 PM Alexander Potapenko wrote: > > When unwinding stack traces, the kernel may pick uninitialized data from > the stack. To avoid false reports on that data, we do not instrument > stacktrace.c This patch is not needed anymore if we unpoison the stack traces passed to __stack_depot_save() from KMSAN core.