-
Notifications
You must be signed in to change notification settings - Fork 400
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reconsider ASAN "hardening" by default #341
Comments
@thestinger again:
|
There are links to the CopperheadOS (Android) implementation of that on top of OpenBSD malloc here: http://permalink.gmane.org/gmane.comp.security.oss.general/18854. |
👍 Would be nice if that wasn't the case in the next release. |
I've sent a patch to disable ASAN and tested it on SubgraphOS. It works. |
Fixed by 3031a56 |
Here's an interesting thread discussing why ASAN is not very effective for hardening:
http://comments.gmane.org/gmane.comp.security.oss.general/18851
Quoting parts of the reply from Daniel Micay (@thestinger):
We've also seen people confused by the memory leak detection (#322) and the 16TB virtual allocation on 64bit Linux. ASAN is causing runtime issues on some systems (e.g. #334). The memory overhead on OS X is significant - 700-1200MB of memory usage is not uncommon, and might be more than we can tolerate.
We'll keep it for debug builds, but I'm starting to reconsider enabling it by default in release. @ioerror, any thoughts?
Some good news:
(although few systems have a GCC/clang new enough to build ubsan, we do use it when available)
The text was updated successfully, but these errors were encountered: