From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757243AbcAJS73 (ORCPT ); Sun, 10 Jan 2016 13:59:29 -0500 Received: from mail.skyhub.de ([78.46.96.112]:50747 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1756805AbcAJS72 (ORCPT ); Sun, 10 Jan 2016 13:59:28 -0500 Date: Sun, 10 Jan 2016 19:59:16 +0100 From: Borislav Petkov To: Andy Lutomirski Cc: x86@kernel.org, linux-kernel@vger.kernel.org, Brian Gerst , Dave Hansen , Linus Torvalds , Oleg Nesterov , "linux-mm@kvack.org" , Andrey Ryabinin Subject: Re: [RFC 01/13] x86/paravirt: Turn KASAN off for parvirt.o Message-ID: <20160110185916.GD22896@pd.tnic> References: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org + Andrey. On Fri, Jan 08, 2016 at 03:15:19PM -0800, Andy Lutomirski wrote: > Otherwise terrible things happen if some of the callbacks end up > calling into KASAN in unexpected places. > > This has no obvious symptoms yet, but adding a memory reference to > native_flush_tlb_global without this blows up on KASAN kernels. > > Signed-off-by: Andy Lutomirski > --- > arch/x86/kernel/Makefile | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/arch/x86/kernel/Makefile b/arch/x86/kernel/Makefile > index b1b78ffe01d0..b7cd5bdf314b 100644 > --- a/arch/x86/kernel/Makefile > +++ b/arch/x86/kernel/Makefile > @@ -19,6 +19,7 @@ endif > KASAN_SANITIZE_head$(BITS).o := n > KASAN_SANITIZE_dumpstack.o := n > KASAN_SANITIZE_dumpstack_$(BITS).o := n > +KASAN_SANITIZE_paravirt.o := n > > CFLAGS_irq.o := -I$(src)/../include/asm/trace Shouldn't we take this one irrespectively of what happens to the rest in the patchset? -- Regards/Gruss, Boris. ECO tip #101: Trim your mails when you reply.