Re: [PATCH] KASAN: prohibit KASAN+STRUCTLEAK combination

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Apr 19, 2018 at 7:21 PM, Andrey Ryabinin
<aryabinin@xxxxxxxxxxxxx> wrote:
>
>
> On 04/19/2018 12:48 PM, Dmitry Vyukov wrote:
>
>> --- a/arch/Kconfig
>> +++ b/arch/Kconfig
>> @@ -464,6 +464,10 @@ config GCC_PLUGIN_LATENT_ENTROPY
>>  config GCC_PLUGIN_STRUCTLEAK
>>       bool "Force initialization of variables containing userspace addresses"
>>       depends on GCC_PLUGINS
>> +     # Currently STRUCTLEAK inserts initialization out of live scope of
>> +     # variables from KASAN point of view. This leads to KASAN false
>> +     # positive reports. Prohibit this combination for now.
>> +     depends on !KASAN
>                     KASAN_EXTRA

Remailed, thanks.




[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux OMAP]     [Linux MIPS]     [eCos]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux