lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 11 May 2020 10:32:31 +0800 From: Walter Wu <walter-zh.wu@...iatek.com> To: Andrey Ryabinin <aryabinin@...tuozzo.com>, Alexander Potapenko <glider@...gle.com>, Dmitry Vyukov <dvyukov@...gle.com>, Jonathan Corbet <corbet@....net> CC: <kasan-dev@...glegroups.com>, <linux-mm@...ck.org>, <linux-kernel@...r.kernel.org>, <linux-arm-kernel@...ts.infradead.org>, wsd_upstream <wsd_upstream@...iatek.com>, <linux-mediatek@...ts.infradead.org>, Walter Wu <walter-zh.wu@...iatek.com> Subject: [PATCH v2 3/3] kasan: update documentation for generic kasan Generic KASAN will support to record first and last call_rcu() call stack and print them in KASAN report. so we update documentation. Signed-off-by: Walter Wu <walter-zh.wu@...iatek.com> Cc: Andrey Ryabinin <aryabinin@...tuozzo.com> Cc: Dmitry Vyukov <dvyukov@...gle.com> Cc: Alexander Potapenko <glider@...gle.com> Cc: Jonathan Corbet <corbet@....net> --- Documentation/dev-tools/kasan.rst | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/Documentation/dev-tools/kasan.rst b/Documentation/dev-tools/kasan.rst index c652d740735d..d4efcfde9fff 100644 --- a/Documentation/dev-tools/kasan.rst +++ b/Documentation/dev-tools/kasan.rst @@ -193,6 +193,12 @@ function calls GCC directly inserts the code to check the shadow memory. This option significantly enlarges kernel but it gives x1.1-x2 performance boost over outline instrumented kernel. +Currently generic KASAN can print call_rcu() call stack in KASAN report, it +can't increase the cost of memory consumption, but it has one limitations. +It can't get both call_rcu() call stack and free stack, so that it can't +print free stack for allocation objects in KASAN report. This feature is +only suitable for generic KASAN. + Software tag-based KASAN ~~~~~~~~~~~~~~~~~~~~~~~~ -- 2.18.0
Powered by blists - more mailing lists