Re: [PATCH v9 00/17] Kernel address sanitizer - runtime memory debugger.

2015-01-23 Thread Andrey Ryabinin
On 01/23/2015 12:46 AM, Sasha Levin wrote: > Just to keep it going, here's a funny trace where kasan is catching issues > in ubsan: :) > Thanks, it turns out to be a GCC bug: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=64741 As a workaround you could put

Re: [PATCH v9 00/17] Kernel address sanitizer - runtime memory debugger.

2015-01-23 Thread y.gribov
> Just to keep it going, here's a funny trace where kasan is catching issues > in ubsan: :) Thanks, I've filed an upstream PR for this https://gcc.gnu.org/bugzilla/show_bug.cgi?id=64741 -- View this message in context:

Re: [PATCH v9 00/17] Kernel address sanitizer - runtime memory debugger.

2015-01-23 Thread Andrey Ryabinin
On 01/23/2015 12:46 AM, Sasha Levin wrote: Just to keep it going, here's a funny trace where kasan is catching issues in ubsan: :) Thanks, it turns out to be a GCC bug: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=64741 As a workaround you could put kasan_disable_local()/kasan_enable_local()

Re: [PATCH v9 00/17] Kernel address sanitizer - runtime memory debugger.

2015-01-23 Thread y.gribov
Just to keep it going, here's a funny trace where kasan is catching issues in ubsan: :) Thanks, I've filed an upstream PR for this https://gcc.gnu.org/bugzilla/show_bug.cgi?id=64741 -- View this message in context:

Re: [PATCH v9 00/17] Kernel address sanitizer - runtime memory debugger.

2015-01-22 Thread Sasha Levin
On 01/22/2015 12:53 AM, Andrey Ryabinin wrote: > 2015-01-22 8:34 GMT+03:00 Andrey Ryabinin : >> 2015-01-22 3:22 GMT+03:00 Sasha Levin : >>> On 01/21/2015 11:51 AM, Andrey Ryabinin wrote: Changes since v8: - Fixed unpoisoned redzones for not-allocated-yet object in

Re: [PATCH v9 00/17] Kernel address sanitizer - runtime memory debugger.

2015-01-22 Thread Sasha Levin
On 01/22/2015 12:53 AM, Andrey Ryabinin wrote: 2015-01-22 8:34 GMT+03:00 Andrey Ryabinin ryabinin@gmail.com: 2015-01-22 3:22 GMT+03:00 Sasha Levin sasha.le...@oracle.com: On 01/21/2015 11:51 AM, Andrey Ryabinin wrote: Changes since v8: - Fixed unpoisoned redzones for

Re: [PATCH v9 00/17] Kernel address sanitizer - runtime memory debugger.

2015-01-21 Thread Andrey Ryabinin
2015-01-22 8:34 GMT+03:00 Andrey Ryabinin : > 2015-01-22 3:22 GMT+03:00 Sasha Levin : >> On 01/21/2015 11:51 AM, Andrey Ryabinin wrote: >>> Changes since v8: >>> - Fixed unpoisoned redzones for not-allocated-yet object >>> in newly allocated slab page. (from Dmitry C.) >>> >>>

Re: [PATCH v9 00/17] Kernel address sanitizer - runtime memory debugger.

2015-01-21 Thread Andrey Ryabinin
2015-01-22 3:22 GMT+03:00 Sasha Levin : > On 01/21/2015 11:51 AM, Andrey Ryabinin wrote: >> Changes since v8: >> - Fixed unpoisoned redzones for not-allocated-yet object >> in newly allocated slab page. (from Dmitry C.) >> >> - Some minor non-function cleanups in kasan

Re: [PATCH v9 00/17] Kernel address sanitizer - runtime memory debugger.

2015-01-21 Thread Sasha Levin
On 01/21/2015 11:51 AM, Andrey Ryabinin wrote: > Changes since v8: > - Fixed unpoisoned redzones for not-allocated-yet object > in newly allocated slab page. (from Dmitry C.) > > - Some minor non-function cleanups in kasan internals. > > - Added ack from Catalin > >

[PATCH v9 00/17] Kernel address sanitizer - runtime memory debugger.

2015-01-21 Thread Andrey Ryabinin
KASan is a runtime memory debugger designed to find use-after-free and out-of-bounds bugs. Currently KASAN supported only for x86_64 architecture and requires kernel to be build with SLUB allocator. KASAN uses compile-time instrumentation for checking every memory access, therefore you will need

[PATCH v9 00/17] Kernel address sanitizer - runtime memory debugger.

2015-01-21 Thread Andrey Ryabinin
KASan is a runtime memory debugger designed to find use-after-free and out-of-bounds bugs. Currently KASAN supported only for x86_64 architecture and requires kernel to be build with SLUB allocator. KASAN uses compile-time instrumentation for checking every memory access, therefore you will need

Re: [PATCH v9 00/17] Kernel address sanitizer - runtime memory debugger.

2015-01-21 Thread Sasha Levin
On 01/21/2015 11:51 AM, Andrey Ryabinin wrote: Changes since v8: - Fixed unpoisoned redzones for not-allocated-yet object in newly allocated slab page. (from Dmitry C.) - Some minor non-function cleanups in kasan internals. - Added ack from Catalin -

Re: [PATCH v9 00/17] Kernel address sanitizer - runtime memory debugger.

2015-01-21 Thread Andrey Ryabinin
2015-01-22 8:34 GMT+03:00 Andrey Ryabinin ryabinin@gmail.com: 2015-01-22 3:22 GMT+03:00 Sasha Levin sasha.le...@oracle.com: On 01/21/2015 11:51 AM, Andrey Ryabinin wrote: Changes since v8: - Fixed unpoisoned redzones for not-allocated-yet object in newly allocated slab

Re: [PATCH v9 00/17] Kernel address sanitizer - runtime memory debugger.

2015-01-21 Thread Andrey Ryabinin
2015-01-22 3:22 GMT+03:00 Sasha Levin sasha.le...@oracle.com: On 01/21/2015 11:51 AM, Andrey Ryabinin wrote: Changes since v8: - Fixed unpoisoned redzones for not-allocated-yet object in newly allocated slab page. (from Dmitry C.) - Some minor non-function cleanups in