Re: [LSF/MM TOPIC] The kernel address sanitizer

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+some more people

On Thu, Dec 25, 2014 at 3:01 PM, Andrey Ryabinin <ryabinin.a.a@xxxxxxxxx> wrote:
> Hello
>
> I'm working on the kernel address sanitizer (KASan) -
> http://thread.gmane.org/gmane.linux.kernel.mm/120041
> KASan is runtime memory debugger designed to find use-after-free and
> out-of-bounds accesses.
>
> Seems we've come to agreement that KASan is useful and deserves to be
> in mainline, yet the feedback on patches is poor.
> It seems like they are stalled, so I would like to discuss the future
> of it. I hope this will help in pushing it forward.
>
> Besides we have ideas for further improvements, like:
>
>  * Detecting reads of uninitialized memory.
>  * Quarantine - delaying reallocation of freed memory to increase
> chance of catching use after free bugs.
>                     In combination with DEBUG_PAGEALLOC or slab
> poisoning it's useful even without KASan.
>  * and some more...
>
> Perhaps it's worth to discuss them as well. I'll be able to come up
> with some prototype until summit if needed.

--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@xxxxxxxxx.  For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@xxxxxxxxx";> email@xxxxxxxxx </a>



[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]