Re: [PATCH] page_poison: plays nicely with KASAN

2019-01-11 Thread Andrey Ryabinin
On 1/8/19 1:36 AM, Qian Cai wrote: > > diff --git a/mm/page_poison.c b/mm/page_poison.c > index f0c15e9017c0..e546b70e592a 100644 > --- a/mm/page_poison.c > +++ b/mm/page_poison.c > @@ -6,6 +6,7 @@ > #include > #include > #include > +#include > > static bool want_page_poisoning __re

[PATCH] page_poison: plays nicely with KASAN

2019-01-07 Thread Qian Cai
KASAN does not play well with the page poisoning (CONFIG_PAGE_POISONING). It triggers false positives in the allocation path, BUG: KASAN: use-after-free in memchr_inv+0x2ea/0x330 Read of size 8 at addr 1f80 by task swapper/0 CPU: 0 PID: 0 Comm: swapper Not tainted 5.0.0-rc1+ #54 Call T