2014-06-20 16:16 GMT+04:00 Yuri Gribov <tetra2...@gmail.com>:
> All,
>
> FYI it should now be possible to replace existing Kasan implementation
> (which abuses TSan) with stock userspace Asan. We (well, Andrew) have
> successfully sanitized kernel with CFLAGS = -fsanitize=address --param
> asan-stack=0 --param asan-globals=0 --param use-after-return=0 --param
> asan-instrumentation-with-call-threshold=0. As Dmitry pointed out, we
> could hide all these --param's under -fsanitize=kernel-address.
>
> @Andrey: did I miss anything in CFLAGS?
>

--param asan-memintrin=0 --param asan-fixed-shadow-offset=0

And with  --param asan-stack=1 it also works now.

Am I right to assume that params hidden under -fsantize=kernel-addres
could be overwritten if anyone wants to enable
for e.g. stack instrumentation? Like this:
-fsanitize=kernel-address --param asan-stack=1

> -Y
>
> --
> You received this message because you are subscribed to the Google Groups 
> "address-sanitizer" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to address-sanitizer+unsubscr...@googlegroups.com.
> For more options, visit https://groups.google.com/d/optout.



-- 
Best regards,
Andrey Ryabinin

-- 
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to address-sanitizer+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to