From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 8701 invoked by alias); 23 Oct 2014 07:15:06 -0000 Mailing-List: contact gcc-patches-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: Sender: gcc-patches-owner@gcc.gnu.org Received: (qmail 8684 invoked by uid 89); 23 Oct 2014 07:15:05 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-2.9 required=5.0 tests=AWL,BAYES_00,RP_MATCHES_RCVD,SPF_HELO_PASS,SPF_PASS autolearn=ham version=3.3.2 X-HELO: mx1.redhat.com Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES256-GCM-SHA384 encrypted) ESMTPS; Thu, 23 Oct 2014 07:15:04 +0000 Received: from int-mx09.intmail.prod.int.phx2.redhat.com (int-mx09.intmail.prod.int.phx2.redhat.com [10.5.11.22]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id s9N7F2f6004381 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 23 Oct 2014 03:15:02 -0400 Received: from tucnak.zalov.cz (ovpn-116-116.ams2.redhat.com [10.36.116.116]) by int-mx09.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with ESMTP id s9N7EnqX015524 (version=TLSv1/SSLv3 cipher=AES128-GCM-SHA256 bits=128 verify=NO); Thu, 23 Oct 2014 03:15:02 -0400 Received: from tucnak.zalov.cz (localhost [127.0.0.1]) by tucnak.zalov.cz (8.14.9/8.14.9) with ESMTP id s9N7ED4l026288; Thu, 23 Oct 2014 09:14:21 +0200 Received: (from jakub@localhost) by tucnak.zalov.cz (8.14.9/8.14.9/Submit) id s9N7Drwv026287; Thu, 23 Oct 2014 09:13:53 +0200 Date: Thu, 23 Oct 2014 07:20:00 -0000 From: Jakub Jelinek To: Yury Gribov Cc: GCC Patches , Konstantin Serebryany , Dmitry Vyukov , Andrey Ryabinin , Konstantin Khlebnikov Subject: Re: [PATCHv4] Enable -fsanitize-recover for KASan Message-ID: <20141023071353.GY10376@tucnak.redhat.com> Reply-To: Jakub Jelinek References: <54095E23.6050900@samsung.com> <5416B3A2.4050200@samsung.com> <54299507.7090800@samsung.com> <5448AA21.9080601@samsung.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <5448AA21.9080601@samsung.com> User-Agent: Mutt/1.5.23 (2014-03-12) X-IsSubscribed: yes X-SW-Source: 2014-10/txt/msg02337.txt.bz2 On Thu, Oct 23, 2014 at 11:11:29AM +0400, Yury Gribov wrote: > Hi all, > > On 09/29/2014 09:21 PM, Yury Gribov wrote: > >>>This patch enables -fsanitize-recover for KASan by default. This causes > >>>KASan to continue execution after error in case of inline > >>>instrumentation. This feature is needed because > >>>- reports during early bootstrap won't even be printed > >>>- needed to run all tests w/o rebooting machine for every test > >>>- needed for interactive work on desktop > > > >This is the third version of patch which renames -fsanitize-recover to > >-fubsan-recover and introduces -fasan-recover (enabled by default for > >KASan). It also moves flag handling to finish_options per Jakub's request. > > A new version of patch based upon Jakub's recent changes to > -fsanitize-recover=. I've renamed __asan_report_recover_load* to > __asan_report_load*_noabort to match UBSan's style. > > Note that currently -fsanitize=kernel-address > -fno-sanitize-recover=kernel-address won't work as expected because we miss > __asan_load*_abort family of functions in libasan. I thought __asan_* functions are provided by the kernel, not libasan, for -fsanitize=kernel-address. Or is kernel linked with real libasan.a or some stripped down version thereof? Jakub