Re: [PATCH v10 02/17] x86_64: add KASan support

2015-01-30 Thread Andrey Ryabinin
2015-01-31 0:37 GMT+03:00 Andrew Morton : > On Fri, 30 Jan 2015 19:15:42 +0300 Andrey Ryabinin > wrote: > >> >> --- a/lib/Kconfig.kasan >> >> +++ b/lib/Kconfig.kasan >> >> @@ -5,6 +5,7 @@ if HAVE_ARCH_KASAN >> >> >> >> config KASAN >> >>bool "AddressSanitizer: runtime memory debugger" >> >>

Re: [PATCH v10 02/17] x86_64: add KASan support

2015-01-30 Thread Andrew Morton
On Fri, 30 Jan 2015 19:15:42 +0300 Andrey Ryabinin wrote: > >> --- a/lib/Kconfig.kasan > >> +++ b/lib/Kconfig.kasan > >> @@ -5,6 +5,7 @@ if HAVE_ARCH_KASAN > >> > >> config KASAN > >>bool "AddressSanitizer: runtime memory debugger" > >> + depends on !MEMORY_HOTPLUG > >>help > >>

Re: [PATCH v10 02/17] x86_64: add KASan support

2015-01-30 Thread Andrew Morton
On Fri, 30 Jan 2015 19:15:42 +0300 Andrey Ryabinin wrote: > >> --- a/lib/Kconfig.kasan > >> +++ b/lib/Kconfig.kasan > >> @@ -5,6 +5,7 @@ if HAVE_ARCH_KASAN > >> > >> config KASAN > >>bool "AddressSanitizer: runtime memory debugger" > >> + depends on !MEMORY_HOTPLUG > >>help > >>

Re: [PATCH v10 02/17] x86_64: add KASan support

2015-01-30 Thread Andrey Ryabinin
On 01/30/2015 02:12 AM, Andrew Morton wrote: > On Thu, 29 Jan 2015 18:11:46 +0300 Andrey Ryabinin > wrote: > >> This patch adds arch specific code for kernel address sanitizer. >> >> 16TB of virtual addressed used for shadow memory. >> It's located in range [ec00 - fc00]

Re: [PATCH v10 02/17] x86_64: add KASan support

2015-01-29 Thread Andrew Morton
On Thu, 29 Jan 2015 18:11:46 +0300 Andrey Ryabinin wrote: > This patch adds arch specific code for kernel address sanitizer. > > 16TB of virtual addressed used for shadow memory. > It's located in range [ec00 - fc00] > between vmemmap and %esp fixup stacks. > > At early

[PATCH v10 02/17] x86_64: add KASan support

2015-01-29 Thread Andrey Ryabinin
This patch adds arch specific code for kernel address sanitizer. 16TB of virtual addressed used for shadow memory. It's located in range [ec00 - fc00] between vmemmap and %esp fixup stacks. At early stage we map whole shadow region with zero page. Latter, after pages mappe