From: Paul Lawrence <paullawrence@google.com> To: Andrey Ryabinin <aryabinin@virtuozzo.com>, Alexander Potapenko <glider@google.com>, Dmitry Vyukov <dvyukov@google.com>, Masahiro Yamada <yamada.masahiro@socionext.com> Cc: linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-mm@kvack.org, linux-kbuild@vger.kernel.org, Matthias Kaehlcke <mka@chromium.org>, Michael Davidson <md@google.com>, Greg Hackmann <ghackmann@google.com>, Paul Lawrence <paullawrence@google.com> Subject: [PATCH v4 1/5] kasan: add compiler support for clang Date: Mon, 4 Dec 2017 11:17:31 -0800 [thread overview] Message-ID: <20171204191735.132544-2-paullawrence@google.com> (raw) In-Reply-To: <20171204191735.132544-1-paullawrence@google.com> For now we can hard-code ASAN ABI level 5, since historical clang builds can't build the kernel anyway. We also need to emulate gcc's __SANITIZE_ADDRESS__ flag, or memset() calls won't be instrumented. Signed-off-by: Greg Hackmann <ghackmann@google.com> Signed-off-by: Paul Lawrence <paullawrence@google.com> --- include/linux/compiler-clang.h | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/include/linux/compiler-clang.h b/include/linux/compiler-clang.h index 3b609edffa8f..d02a4df3f473 100644 --- a/include/linux/compiler-clang.h +++ b/include/linux/compiler-clang.h @@ -19,3 +19,11 @@ #define randomized_struct_fields_start struct { #define randomized_struct_fields_end }; + +/* all clang versions usable with the kernel support KASAN ABI version 5 */ +#define KASAN_ABI_VERSION 5 + +/* emulate gcc's __SANITIZE_ADDRESS__ flag */ +#if __has_feature(address_sanitizer) +#define __SANITIZE_ADDRESS__ +#endif -- 2.15.0.531.g2ccb3012c9-goog
WARNING: multiple messages have this Message-ID (diff)
From: Paul Lawrence <paullawrence@google.com> To: Andrey Ryabinin <aryabinin@virtuozzo.com>, Alexander Potapenko <glider@google.com>, Dmitry Vyukov <dvyukov@google.com>, Masahiro Yamada <yamada.masahiro@socionext.com> Cc: linux-kernel@vger.kernel.org, kasan-dev@googlegroups.com, linux-mm@kvack.org, linux-kbuild@vger.kernel.org, Matthias Kaehlcke <mka@chromium.org>, Michael Davidson <md@google.com>, Greg Hackmann <ghackmann@google.com>, Paul Lawrence <paullawrence@google.com> Subject: [PATCH v4 1/5] kasan: add compiler support for clang Date: Mon, 4 Dec 2017 11:17:31 -0800 [thread overview] Message-ID: <20171204191735.132544-2-paullawrence@google.com> (raw) In-Reply-To: <20171204191735.132544-1-paullawrence@google.com> For now we can hard-code ASAN ABI level 5, since historical clang builds can't build the kernel anyway. We also need to emulate gcc's __SANITIZE_ADDRESS__ flag, or memset() calls won't be instrumented. Signed-off-by: Greg Hackmann <ghackmann@google.com> Signed-off-by: Paul Lawrence <paullawrence@google.com> --- include/linux/compiler-clang.h | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/include/linux/compiler-clang.h b/include/linux/compiler-clang.h index 3b609edffa8f..d02a4df3f473 100644 --- a/include/linux/compiler-clang.h +++ b/include/linux/compiler-clang.h @@ -19,3 +19,11 @@ #define randomized_struct_fields_start struct { #define randomized_struct_fields_end }; + +/* all clang versions usable with the kernel support KASAN ABI version 5 */ +#define KASAN_ABI_VERSION 5 + +/* emulate gcc's __SANITIZE_ADDRESS__ flag */ +#if __has_feature(address_sanitizer) +#define __SANITIZE_ADDRESS__ +#endif -- 2.15.0.531.g2ccb3012c9-goog -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: <a href=mailto:"dont@kvack.org"> email@kvack.org </a>
next prev parent reply other threads:[~2017-12-04 19:18 UTC|newest] Thread overview: 22+ messages / expand[flat|nested] mbox.gz Atom feed top 2017-12-04 19:17 [PATCH v4 0/5] kasan: support alloca, LLVM Paul Lawrence 2017-12-04 19:17 ` Paul Lawrence 2017-12-04 19:17 ` Paul Lawrence [this message] 2017-12-04 19:17 ` [PATCH v4 1/5] kasan: add compiler support for clang Paul Lawrence 2017-12-05 16:35 ` Andrey Ryabinin 2017-12-05 16:35 ` Andrey Ryabinin 2017-12-04 19:17 ` [PATCH v4 2/5] kasan/Makefile: Support LLVM style asan parameters Paul Lawrence 2017-12-04 19:17 ` Paul Lawrence 2017-12-08 9:25 ` Alexander Potapenko 2017-12-08 9:25 ` Alexander Potapenko 2017-12-04 19:17 ` [PATCH v4 3/5] kasan: support alloca() poisoning Paul Lawrence 2017-12-04 19:17 ` Paul Lawrence 2017-12-05 16:36 ` Andrey Ryabinin 2017-12-05 16:36 ` Andrey Ryabinin 2017-12-04 19:17 ` [PATCH v4 4/5] kasan: Add tests for alloca poisoning Paul Lawrence 2017-12-04 19:17 ` Paul Lawrence 2017-12-05 16:36 ` Andrey Ryabinin 2017-12-05 16:36 ` Andrey Ryabinin 2017-12-04 19:17 ` [PATCH v4 5/5] kasan: added functions for unpoisoning stack variables Paul Lawrence 2017-12-04 19:17 ` Paul Lawrence 2017-12-05 16:37 ` Andrey Ryabinin 2017-12-05 16:37 ` Andrey Ryabinin
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20171204191735.132544-2-paullawrence@google.com \ --to=paullawrence@google.com \ --cc=aryabinin@virtuozzo.com \ --cc=dvyukov@google.com \ --cc=ghackmann@google.com \ --cc=glider@google.com \ --cc=kasan-dev@googlegroups.com \ --cc=linux-kbuild@vger.kernel.org \ --cc=linux-kernel@vger.kernel.org \ --cc=linux-mm@kvack.org \ --cc=md@google.com \ --cc=mka@chromium.org \ --cc=yamada.masahiro@socionext.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.