Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753128AbdGGAJf (ORCPT ); Thu, 6 Jul 2017 20:09:35 -0400 Received: from mail-pf0-f171.google.com ([209.85.192.171]:33105 "EHLO mail-pf0-f171.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752953AbdGGAJe (ORCPT ); Thu, 6 Jul 2017 20:09:34 -0400 Subject: Re: [PATCH 1/4] kasan: support alloca() poisoning To: Andrey Ryabinin , Alexander Potapenko , Dmitry Vyukov , Masahiro Yamada , Michal Marek Cc: linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-mm@kvack.org, linux-kbuild@vger.kernel.org, Matthias Kaehlcke , Michael Davidson References: <20170706220114.142438-1-ghackmann@google.com> <20170706220114.142438-2-ghackmann@google.com> From: Greg Hackmann Message-ID: <504eb5d1-d505-46fe-86aa-5b2d01497c15@google.com> Date: Thu, 6 Jul 2017 17:09:31 -0700 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.1.1 MIME-Version: 1.0 In-Reply-To: <20170706220114.142438-2-ghackmann@google.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 489 Lines: 13 On 07/06/2017 03:01 PM, Greg Hackmann wrote: > @@ -101,6 +101,9 @@ static const char *get_shadow_bug_type(struct kasan_access_info *info) > break; > case KASAN_USE_AFTER_SCOPE: > bug_type = "use-after-scope"; > + case KASAN_ALLOCA_LEFT: > + case KASAN_ALLOCA_RIGHT: > + bug_type = "alloca-out-of-bounds"; > break; > } There needs to be a "break" above the new case statements. I'll wait to see if there's any other feedback, then send out a V2 patch that fixes this.