Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Thu, 7 May 2015 12:37:51 +0300
From: Vasily Kulikov <>
To: Solar Designer <>
Cc: Wen Xu <>,,
Subject: Re: Linux kernel pointer poisoning (was: CVE request for a fixed bug
 existed in all versions of linux kernel from KeenTeam)

On Thu, May 07, 2015 at 12:36 +0300, Vasily Kulikov wrote:
> b) how to check for an insane POISON_POINTER() arg in case of
> TIMER_ENTRY_STATIC (and such)?  The current implementation of
> POISON_POINTER() fails as following:
> mm/page_alloc.c: In function 'free_pages_prepare':
> mm/page_alloc.c:840:23: error: call to '__compiletime_assert_840' declared with attribute error: BUILD_BUG_ON failed: 0x0111400 >= POISON_AREA_SIZE

Sorry, I've copied a wrong error message.  The right one is as

kernel/irq/spurious.c:23:8: error: braced-group within expression allowed only inside a function

Vasily Kulikov - bringing security into open computing environments

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ