I wrote a post: "Case study: Searching for a vulnerability pattern in the Linux kernel".
It's a funny story about #syzkaller, @Semmle @LGTM, Coccinelle and a "public 0day".https://a13xp0p0v.github.io/2019/08/10/cfu.html …
-
-
It seems that gcc(version 6.5.0) ignore address_space attribute. And the kernel compiled without this attribute. So the types or decls do not have the information for compiler to do more check.
-
Actually, it seems Clang supports it! https://clang.llvm.org/docs/LanguageExtensions.html#memory-references-to-specified-segments … But it seems GCC does not. :( Comparison:https://godbolt.org/z/lYzuIJ
- Još 3 druga odgovora
Novi razgovor -
-
-
2 things go to my "kernel dev process peculiarities" collection: - another case of lost patch - "sparse pointing to a bug" does not mean anything: not on anybody's radar, fix is still lost, not sparse warning that allowed to recover the fix
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.