lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1422006653293-1027990.post@n7.nabble.com> Date: Fri, 23 Jan 2015 02:50:53 -0700 (MST) From: "y.gribov" <y.gribov@...sung.com> To: linux-kernel@...r.kernel.org Subject: Re: [PATCH v9 00/17] Kernel address sanitizer - runtime memory debugger. > Just to keep it going, here's a funny trace where kasan is catching issues > in ubsan: :) Thanks, I've filed an upstream PR for this https://gcc.gnu.org/bugzilla/show_bug.cgi?id=64741 -- View this message in context: http://linux-kernel.2935.n7.nabble.com/RFC-PATCH-RESEND-next-00-21-Address-sanitizer-for-kernel-kasan-dynamic-memory-error-detector-tp898880p1027990.html Sent from the Linux Kernel mailing list archive at Nabble.com. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/