Re: [PATCH -next] x86/efi_64: fix a user-memory-access in runtime

From: Qian Cai
Date: Sat Jan 18 2020 - 06:04:34 EST




> On Jan 18, 2020, at 3:00 AM, Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> wrote:
>
> Can't we just use READ_ONCE_NOCHECK() instead?

My understanding is that KASAN actually want to make sure there is a no dereference of user memory because it has security implications. Does that make no sense here?