[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20200311141848.GG3216816@arrakis.emea.arm.com>
Date: Wed, 11 Mar 2020 14:18:48 +0000
From: Catalin Marinas <catalin.marinas@....com>
To: Qian Cai <cai@....pw>
Cc: akpm@...ux-foundation.org, elver@...gle.com, linux-mm@...ck.org,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH -next 1/2] mm: disable KCSAN for kmemleak
On Tue, Mar 03, 2020 at 02:28:35PM -0500, Qian Cai wrote:
> Kmemleak could scan task stacks while plain writes happens to those
> stack variables which could results in data races. For example, in
> sys_rt_sigaction and do_sigaction(), it could have plain writes in
> a 32-byte size. Since the kmemleak does not care about the actual values
> of a non-pointer and all do_sigaction() call sites only copy to stack
> variables, just disable KCSAN for kmemleak to avoid annotating anything
> outside Kmemleak just because Kmemleak scans everything.
>
> Suggested-by: Marco Elver <elver@...gle.com>
> Signed-off-by: Qian Cai <cai@....pw>
Acked-by: Catalin Marinas <catalin.marinas@....com>
Powered by blists - more mailing lists