|
Message-ID: <564ADBDA.10901@gmail.com>
Date: Tue, 17 Nov 2015 02:48:42 -0500
From: Daniel Micay <danielmicay@...il.com>
To: kernel-hardening@...ts.openwall.com
Subject: What ever happened to the kernel UBSan work?
I remember seeing the UBSan submission at one point but it appears that
it never landed. It would be really nice to have it because among other
things it will encourage fixing all kinds of things that conflict with
features like SIZE_OVERFLOW and soon RAP. Maybe the kernel could even
begin migrating away from relying on signed overflow (by marking the
cases of intentional overflow with wrappers around the overflow
intrinsics like addw(a, b)).
There are also some niches where a 20% performance hit for something
like this makes sense (maybe only ~10% for just the parts that are
relevant to security, especially if it's just set to trap instead of
calling functions producing debug output).
Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.