Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752483AbbDDCGh (ORCPT ); Fri, 3 Apr 2015 22:06:37 -0400 Received: from mail-ig0-f180.google.com ([209.85.213.180]:36161 "EHLO mail-ig0-f180.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751781AbbDDCGf (ORCPT ); Fri, 3 Apr 2015 22:06:35 -0400 Date: Fri, 3 Apr 2015 19:06:32 -0700 (PDT) From: David Rientjes X-X-Sender: rientjes@chino.kir.corp.google.com To: Andrey Ryabinin cc: Andrew Morton , Dave Kleikamp , Christoph Hellwig , Sebastian Ott , Mikulas Patocka , Catalin Marinas , LKML , linux-mm@kvack.org, jfs-discussion@lists.sourceforge.net, Dmitry Chernenkov , Dmitry Vyukov , Alexander Potapenko Subject: Re: [PATCH] mm, mempool: kasan: poison mempool elements In-Reply-To: <1428072467-21668-1-git-send-email-a.ryabinin@samsung.com> Message-ID: References: <1428072467-21668-1-git-send-email-a.ryabinin@samsung.com> User-Agent: Alpine 2.10 (DEB 1266 2009-07-14) MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 744 Lines: 18 On Fri, 3 Apr 2015, Andrey Ryabinin wrote: > Mempools keep allocated objects in reserved for situations > when ordinary allocation may not be possible to satisfy. > These objects shouldn't be accessed before they leave > the pool. > This patch poison elements when get into the pool > and unpoison when they leave it. This will let KASan > to detect use-after-free of mempool's elements. > > Signed-off-by: Andrey Ryabinin Tested-by: David Rientjes -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/