Received: by 2002:a25:86ce:0:0:0:0:0 with SMTP id y14csp406911ybm; Wed, 22 May 2019 05:22:26 -0700 (PDT) X-Google-Smtp-Source: APXvYqwynr6N63GDG0ol00pS1DzVnofRDt3iZ6YifMhVZxeQk5G88R88oc0boCMqBl9c7nZmMe0T X-Received: by 2002:a17:902:2983:: with SMTP id h3mr63936916plb.267.1558527746264; Wed, 22 May 2019 05:22:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558527746; cv=none; d=google.com; s=arc-20160816; b=bo8FxXTVCzx6ybsy9jKd/6SRqemn7GfqzGyw/eEHpcvRJC1eqCmu+RKERvMzgfuZsl KazeNPeKTZo6Ao2t0LTfUhSYzJ3uKZ1pq7M08l8uUwhwtEINgX9qWq+GxpRYXvJ1/tX/ YOSzaHHM4FiXweAOUBO53OMGQg2kkkiX7Ba7NcMHD/Jor8JQFRTBMOcF0VkVVrVts3n9 7GVHSUqfMR46TAj4ggKNaIrgRPCZHztA/0dB2I584CIhdgchFTZ1obZdoORe/Lo4BdNT obRwCkW6QzAcmreXvBX+nQnUwfVO8kYOk2C04dPau02X0ja2fa9EaBPrx9PuWJS8XlZX cd3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=+9fW0PRxz+4bfLfbCFiuVFbnUn0YIXpiH5KfbMS39MA=; b=WXA2VzKQbta5dBjwwHIgot1YGaUImVDgejOZx9WnoenOAoVCQH9jEg9Hjl25E8zNe/ hj/vAPGnkDuR5DegtbR3Gy6xXK/H3BH+X/9FUlDrZBE7xff5uz8atXcAbRxp9zgWu3Ya mqjhbsP1lbiYw62cvx1sSfVtXsobYfo5i6VhmJY1l1t971/GGUNEpKtlErub07S6cTSL twv4dm1imtBKlVZO1Xcsw1liYg4TzQr+qLD+JREd1kWy1pF9lDQF+P9APvtfq1bGy4VJ 0pU3FIZ0F7jQQJyoW/FcudsSy/19OY9DhlP/AbtkpX1F/qbSYAENaBpepE2Xpv/cCCAY oSrQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=virtuozzo.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f5si25322463plt.420.2019.05.22.05.22.11; Wed, 22 May 2019 05:22:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=virtuozzo.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729352AbfEVMTP (ORCPT + 99 others); Wed, 22 May 2019 08:19:15 -0400 Received: from relay.sw.ru ([185.231.240.75]:49986 "EHLO relay.sw.ru" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728438AbfEVMTP (ORCPT ); Wed, 22 May 2019 08:19:15 -0400 Received: from [172.16.25.12] by relay.sw.ru with esmtp (Exim 4.91) (envelope-from ) id 1hTQDA-0003Xw-1H; Wed, 22 May 2019 15:19:12 +0300 Subject: Re: [PATCH v3] mm/kasan: Print frame description for stack bugs To: Marco Elver , dvyukov@google.com, glider@google.com, andreyknvl@google.com, akpm@linux-foundation.org Cc: linux-kernel@vger.kernel.org, linux-mm@kvack.org, kasan-dev@googlegroups.com References: <20190522100048.146841-1-elver@google.com> From: Andrey Ryabinin Message-ID: Date: Wed, 22 May 2019 15:19:30 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: <20190522100048.146841-1-elver@google.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 5/22/19 1:00 PM, Marco Elver wrote: > This adds support for printing stack frame description on invalid stack > accesses. The frame description is embedded by the compiler, which is > parsed and then pretty-printed. > > Currently, we can only print the stack frame info for accesses to the > task's own stack, but not accesses to other tasks' stacks. > > Example of what it looks like: > > [ 17.924050] page dumped because: kasan: bad access detected > [ 17.924908] > [ 17.925153] addr ffff8880673ef98a is located in stack of task insmod/2008 at offset 106 in frame: > [ 17.926542] kasan_stack_oob+0x0/0xf5 [test_kasan] > [ 17.927932] > [ 17.928206] this frame has 2 objects: > [ 17.928783] [32, 36) 'i' > [ 17.928784] [96, 106) 'stack_array' > [ 17.929216] > [ 17.930031] Memory state around the buggy address: > > Bugzilla: https://bugzilla.kernel.org/show_bug.cgi?id=198435 > Signed-off-by: Marco Elver Reviewed-by: Andrey Ryabinin