Re: [PATCH v9 00/17] Kernel address sanitizer - runtime memory debugger.
> Just to keep it going, here's a funny trace where kasan is catching issues > in ubsan: :) Thanks, I've filed an upstream PR for this https://gcc.gnu.org/bugzilla/show_bug.cgi?id=64741 -- View this message in context: http://linux-kernel.2935.n7.nabble.com/RFC-PATCH-RESEND-next-00-21-Address-sanitizer-for-kernel-kasan-dynamic-memory-error-detector-tp898880p1027990.html Sent from the Linux Kernel mailing list archive at Nabble.com. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Re: [RFC PATCH] UBSan: run-time undefined behavior sanity checker
> Unaligned accesses disabled because they are allowed on some arches (see HAVE_EFFICIENT_UNALIGNED_ACCESS). > Another reason is that there are to many reports. Not because there are > lot of bugs, but because > there are many reports for one bug. A side note - unaligned accesses would prevent KASan from doing it's job well because instrumentation code relies on address alignment when performing the check. -Y -- View this message in context: http://linux-kernel.2935.n7.nabble.com/RFC-UBSan-run-time-undefined-behavior-sanity-checker-tp965203p968477.html Sent from the Linux Kernel mailing list archive at Nabble.com. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/