lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20151005111818.GA25898@nazgul.tnic> Date: Mon, 5 Oct 2015 13:18:18 +0200 From: Borislav Petkov <bp@...en8.de> To: Andrey Ryabinin <aryabinin@...tuozzo.com> Cc: Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>, "H. Peter Anvin" <hpa@...or.com>, x86@...nel.org, linux-kernel@...r.kernel.org, Andy Lutomirski <luto@...capital.net>, Andrey Konovalov <andreyknvl@...gle.com>, Kostya Serebryany <kcc@...gle.com>, Alexander Potapenko <glider@...gle.com>, kasan-dev <kasan-dev@...glegroups.com>, Denys Vlasenko <dvlasenk@...hat.com>, Andi Kleen <ak@...ux.intel.com>, Dmitry Vyukov <dvyukov@...gle.com>, Sasha Levin <sasha.levin@...cle.com>, Wolfram Gloger <wmglo@...t.med.uni-muenchen.de> Subject: Re: [PATCH] x86/process: Silence KASAN warnings in get_wchan() On Mon, Oct 05, 2015 at 01:28:26PM +0300, Andrey Ryabinin wrote: > get_wchan() is racy by design, it may access volatile stack > of running task, thus it may access redzone in a stack frame > and cause KASAN to warn about this. > > Use kasan_disable_current()/kasan_enable_current() to silence > these warnings. So we're going to be sprinkling those around code which kasan doesn't like? Can't we do better, without touching all code everywhere? Probably not but let me ask that just in case... -- Regards/Gruss, Boris. ECO tip #101: Trim your mails when you reply. -- -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists