2014-06-20 16:16 GMT+04:00 Yuri Gribov <tetra2...@gmail.com>: > All, > > FYI it should now be possible to replace existing Kasan implementation > (which abuses TSan) with stock userspace Asan. We (well, Andrew) have > successfully sanitized kernel with CFLAGS = -fsanitize=address --param > asan-stack=0 --param asan-globals=0 --param use-after-return=0 --param > asan-instrumentation-with-call-threshold=0. As Dmitry pointed out, we > could hide all these --param's under -fsanitize=kernel-address. > > @Andrey: did I miss anything in CFLAGS? >
--param asan-memintrin=0 --param asan-fixed-shadow-offset=0 And with --param asan-stack=1 it also works now. Am I right to assume that params hidden under -fsantize=kernel-addres could be overwritten if anyone wants to enable for e.g. stack instrumentation? Like this: -fsanitize=kernel-address --param asan-stack=1 > -Y > > -- > You received this message because you are subscribed to the Google Groups > "address-sanitizer" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to address-sanitizer+unsubscr...@googlegroups.com. > For more options, visit https://groups.google.com/d/optout. -- Best regards, Andrey Ryabinin -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to address-sanitizer+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.