From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.1 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id A2A36C4742C for ; Mon, 16 Nov 2020 17:29:27 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 59D932225B for ; Mon, 16 Nov 2020 17:29:27 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=kernel.org header.i=@kernel.org header.b="tPhJ636O" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732884AbgKPR30 (ORCPT ); Mon, 16 Nov 2020 12:29:26 -0500 Received: from mail.kernel.org ([198.145.29.99]:45550 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732876AbgKPR3Y (ORCPT ); Mon, 16 Nov 2020 12:29:24 -0500 Received: from quaco.ghostprotocols.net (unknown [179.97.37.151]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9EC7E2225E; Mon, 16 Nov 2020 17:29:23 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1605547763; bh=h0kQPBBQt3mMrkvg6WqzvqOQC9S+K6ABgDjq5RmEljs=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=tPhJ636OaSphhVlpwW7nPGW4NkbF8cq1HauK07Klo4nk8PwoOsOEtbCu077Jdj0Vb xJqY5l3pP4ffVANeyb3UXwcnc85LgBuRHTFtGLMVT6TqUTuRG8Kn6v9xVb50fMd1pz N6kpqdinxjqko+bQQLKAkcWkqIi/vlTU4KXxhuhU= Received: by quaco.ghostprotocols.net (Postfix, from userid 1000) id 95D6940E29; Mon, 16 Nov 2020 14:29:20 -0300 (-03) Date: Mon, 16 Nov 2020 14:29:20 -0300 From: Arnaldo Carvalho de Melo To: Ian Rogers Cc: Peter Zijlstra , Ingo Molnar , Mark Rutland , Alexander Shishkin , Jiri Olsa , Namhyung Kim , linux-kernel@vger.kernel.org, clang-built-linux@googlegroups.com, Stephane Eranian , Sandeep Dasgupta Subject: Re: [PATCH] perf test: Avoid an msan warning in a copied stack. Message-ID: <20201116172920.GI509215@kernel.org> References: <20201113182053.754625-1-irogers@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20201113182053.754625-1-irogers@google.com> X-Url: http://acmel.wordpress.com Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Em Fri, Nov 13, 2020 at 10:20:53AM -0800, Ian Rogers escreveu: > This fix is for a failure that occurred in the DWARF unwind perf test. > Stack unwinders may probe memory when looking for frames. Memory > sanitizer will poison and track uninitialized memory on the stack, and > on the heap if the value is copied to the heap. This can lead to false > memory sanitizer failures for the use of an uninitialized value. Avoid > this problem by removing the poison on the copied stack. > > The full msan failure with track origins looks like: Thanks, applied. - Arnaldo