Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934363AbcDMIUn (ORCPT ); Wed, 13 Apr 2016 04:20:43 -0400 Received: from mail-lf0-f45.google.com ([209.85.215.45]:35830 "EHLO mail-lf0-f45.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S934173AbcDMIUk (ORCPT ); Wed, 13 Apr 2016 04:20:40 -0400 MIME-Version: 1.0 In-Reply-To: <192b213b1a3518e98ed7e458aae19283b415ce3d.1460394567.git.glider@google.com> References: <192b213b1a3518e98ed7e458aae19283b415ce3d.1460394567.git.glider@google.com> Date: Wed, 13 Apr 2016 11:20:39 +0300 Message-ID: Subject: Re: [PATCH v1] mm, kasan: don't call kasan_krealloc() from ksize(). Add a ksize() test. From: Andrey Ryabinin To: Alexander Potapenko Cc: Andrey Konovalov , Christoph Lameter , Dmitry Vyukov , Andrew Morton , Kostya Serebryany , kasan-dev , LKML , "linux-mm@kvack.org" Content-Type: text/plain; charset=UTF-8 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 371 Lines: 10 2016-04-11 20:10 GMT+03:00 Alexander Potapenko : > Instead of calling kasan_krealloc(), which replaces the memory allocation > stack ID (if stack depot is used), just unpoison the whole memory chunk. > Add a test that makes sure ksize() unpoisons the whole chunk. > Split in two please. > Signed-off-by: Alexander Potapenko > ---