* [LSF/MM TOPIC] The kernel address sanitizer
@ 2014-12-25 12:01 Andrey Ryabinin
2014-12-25 12:13 ` Dmitry Vyukov
2015-01-13 22:00 ` Dave Hansen
0 siblings, 2 replies; 4+ messages in thread
From: Andrey Ryabinin @ 2014-12-25 12:01 UTC (permalink / raw)
To: lsf-pc; +Cc: linux-mm, Sasha Levin, Dmitry Vyukov, Konstantin Khlebnikov
Hello
I'm working on the kernel address sanitizer (KASan) -
http://thread.gmane.org/gmane.linux.kernel.mm/120041
KASan is runtime memory debugger designed to find use-after-free and
out-of-bounds accesses.
Seems we've come to agreement that KASan is useful and deserves to be
in mainline, yet the feedback on patches is poor.
It seems like they are stalled, so I would like to discuss the future
of it. I hope this will help in pushing it forward.
Besides we have ideas for further improvements, like:
* Detecting reads of uninitialized memory.
* Quarantine - delaying reallocation of freed memory to increase
chance of catching use after free bugs.
In combination with DEBUG_PAGEALLOC or slab
poisoning it's useful even without KASan.
* and some more...
Perhaps it's worth to discuss them as well. I'll be able to come up
with some prototype until summit if needed.
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [LSF/MM TOPIC] The kernel address sanitizer
2014-12-25 12:01 [LSF/MM TOPIC] The kernel address sanitizer Andrey Ryabinin
@ 2014-12-25 12:13 ` Dmitry Vyukov
2015-01-13 22:00 ` Dave Hansen
1 sibling, 0 replies; 4+ messages in thread
From: Dmitry Vyukov @ 2014-12-25 12:13 UTC (permalink / raw)
To: Andrey Ryabinin
Cc: lsf-pc, linux-mm, Sasha Levin, Konstantin Khlebnikov, kasan-dev,
Kostya Serebryany, Dmitry Chernenkov, Andrey Konovalov
+some more people
On Thu, Dec 25, 2014 at 3:01 PM, Andrey Ryabinin <ryabinin.a.a@gmail.com> wrote:
> Hello
>
> I'm working on the kernel address sanitizer (KASan) -
> http://thread.gmane.org/gmane.linux.kernel.mm/120041
> KASan is runtime memory debugger designed to find use-after-free and
> out-of-bounds accesses.
>
> Seems we've come to agreement that KASan is useful and deserves to be
> in mainline, yet the feedback on patches is poor.
> It seems like they are stalled, so I would like to discuss the future
> of it. I hope this will help in pushing it forward.
>
> Besides we have ideas for further improvements, like:
>
> * Detecting reads of uninitialized memory.
> * Quarantine - delaying reallocation of freed memory to increase
> chance of catching use after free bugs.
> In combination with DEBUG_PAGEALLOC or slab
> poisoning it's useful even without KASan.
> * and some more...
>
> Perhaps it's worth to discuss them as well. I'll be able to come up
> with some prototype until summit if needed.
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [LSF/MM TOPIC] The kernel address sanitizer
2014-12-25 12:01 [LSF/MM TOPIC] The kernel address sanitizer Andrey Ryabinin
2014-12-25 12:13 ` Dmitry Vyukov
@ 2015-01-13 22:00 ` Dave Hansen
2015-01-14 8:18 ` Andrey Ryabinin
1 sibling, 1 reply; 4+ messages in thread
From: Dave Hansen @ 2015-01-13 22:00 UTC (permalink / raw)
To: Andrey Ryabinin, lsf-pc
Cc: linux-mm, Sasha Levin, Dmitry Vyukov, Konstantin Khlebnikov
On 12/25/2014 04:01 AM, Andrey Ryabinin wrote:
> Seems we've come to agreement that KASan is useful and deserves to be
> in mainline, yet the feedback on patches is poor.
> It seems like they are stalled, so I would like to discuss the future
> of it. I hope this will help in pushing it forward.
I think this should more broadly be a talk about our memory-related
debugging options. This is an especially good audience for seeing what
gets used and if we need to start culling any of them.
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [LSF/MM TOPIC] The kernel address sanitizer
2015-01-13 22:00 ` Dave Hansen
@ 2015-01-14 8:18 ` Andrey Ryabinin
0 siblings, 0 replies; 4+ messages in thread
From: Andrey Ryabinin @ 2015-01-14 8:18 UTC (permalink / raw)
To: Dave Hansen
Cc: lsf-pc, linux-mm, Sasha Levin, Dmitry Vyukov, Konstantin Khlebnikov
2015-01-14 1:00 GMT+03:00 Dave Hansen <dave.hansen@intel.com>:
> On 12/25/2014 04:01 AM, Andrey Ryabinin wrote:
>> Seems we've come to agreement that KASan is useful and deserves to be
>> in mainline, yet the feedback on patches is poor.
>> It seems like they are stalled, so I would like to discuss the future
>> of it. I hope this will help in pushing it forward.
>
> I think this should more broadly be a talk about our memory-related
> debugging options. This is an especially good audience for seeing what
> gets used and if we need to start culling any of them.
>
No objections, I tend to agree with you.
--
To unsubscribe, send a message with 'unsubscribe linux-mm' in
the body to majordomo@kvack.org. For more info on Linux MM,
see: http://www.linux-mm.org/ .
Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2015-01-14 8:18 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2014-12-25 12:01 [LSF/MM TOPIC] The kernel address sanitizer Andrey Ryabinin
2014-12-25 12:13 ` Dmitry Vyukov
2015-01-13 22:00 ` Dave Hansen
2015-01-14 8:18 ` Andrey Ryabinin
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox