Bug 217612
Summary: | KASAN: consider checking container_of | ||
---|---|---|---|
Product: | Memory Management | Reporter: | Andrey Konovalov (andreyknvl) |
Component: | Sanitizers | Assignee: | MM/Sanitizers virtual assignee (mm_sanitizers) |
Status: | NEW --- | ||
Severity: | normal | CC: | dvyukov, kasan-dev |
Priority: | P3 | ||
Hardware: | All | ||
OS: | Linux | ||
Kernel Version: | Subsystem: | ||
Regression: | No | Bisected commit-id: |
Description
Andrey Konovalov
2023-06-29 21:11:03 UTC
For reference, a comment from one of the paper's authors wrt the idea [1]: > The simple case (checking if the first and last byte are NOT redzones) > probably provides a good tradeoff between adaptability and accuracy. > Ofc doing it 'proper' will be much more complicated with incomplete redzones > ('complex allocs, arrays, etc). [1] https://twitter.com/JakobKoschel/status/1674548273338515456 Another potential idea: if we introduce NEW(foo) macro instead of (struct foo*)kmalloc(sizeof(foo)) (or perhaps make compiler automatically detect such patterns), then we can have full object type info at runtime and check not just sizes during casts, but also types. void* is frequently downcasted to struct pointers, that could be checked as well. |