From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mail-io1-f71.google.com (mail-io1-f71.google.com [209.85.166.71]) by kanga.kvack.org (Postfix) with ESMTP id D81EB8E0001 for ; Tue, 18 Sep 2018 14:42:59 -0400 (EDT) Received: by mail-io1-f71.google.com with SMTP id z25-v6so3300652iog.17 for ; Tue, 18 Sep 2018 11:42:59 -0700 (PDT) Received: from mail-sor-f65.google.com (mail-sor-f65.google.com. [209.85.220.65]) by mx.google.com with SMTPS id k197-v6sor6267050ite.54.2018.09.18.11.42.57 for (Google Transport Security); Tue, 18 Sep 2018 11:42:58 -0700 (PDT) MIME-Version: 1.0 In-Reply-To: References: <1a3b3030b6ee01931b397583b69f3af94e2a2308.1535462971.git.andreyknvl@google.com> From: Andrey Konovalov Date: Tue, 18 Sep 2018 20:42:56 +0200 Message-ID: Subject: Re: [PATCH v6 17/18] khwasan: update kasan documentation Content-Type: text/plain; charset="UTF-8" Sender: owner-linux-mm@kvack.org List-ID: To: Dmitry Vyukov Cc: Andrey Ryabinin , Alexander Potapenko , Catalin Marinas , Will Deacon , Christoph Lameter , Andrew Morton , Mark Rutland , Nick Desaulniers , Marc Zyngier , Dave Martin , Ard Biesheuvel , "Eric W . Biederman" , Ingo Molnar , Paul Lawrence , Geert Uytterhoeven , Arnd Bergmann , "Kirill A . Shutemov" , Greg Kroah-Hartman , Kate Stewart , Mike Rapoport , kasan-dev , "open list:DOCUMENTATION" , LKML , Linux ARM , linux-sparse@vger.kernel.org, Linux-MM , "open list:KERNEL BUILD + fi..." , Kostya Serebryany , Evgeniy Stepanov , Lee Smith , Ramana Radhakrishnan , Jacob Bramley , Ruben Ayrapetyan , Jann Horn , Mark Brand , Chintan Pandya , Vishwath Mohan On Wed, Sep 12, 2018 at 8:39 PM, Dmitry Vyukov wrote: > On Wed, Aug 29, 2018 at 1:35 PM, Andrey Konovalov wrote: >> This patch updates KASAN documentation to reflect the addition of KHWASAN. >> -Currently KASAN is supported only for the x86_64 and arm64 architectures. >> +KASAN uses compile-time instrumentation to insert validity checks before every >> +memory access, and therefore requires a compiler version that supports that. >> +For classic KASAN you need GCC version 4.9.2 or later. GCC 5.0 or later is >> +required for detection of out-of-bounds accesses on stack and global variables. >> +KHWASAN in turns is only supported in clang and requires revision 330044 or > > in turn? > >> -and choose between CONFIG_KASAN_OUTLINE and CONFIG_KASAN_INLINE. Outline and >> -inline are compiler instrumentation types. The former produces smaller binary >> -the latter is 1.1 - 2 times faster. Inline instrumentation requires a GCC >> +and choose between CONFIG_KASAN_GENERIC (to enable classic KASAN) and >> +CONFIG_KASAN_HW (to enabled KHWASAN). You also need to choose choose between > > to enable > >> + print_address_description+0x73/0x280 mm/kasan/report.c:254 > > > KASAN does not print line numbers per se. > I think we need to show unmodified output to not confuse readers > (probably remove the useless ? lines). Will fix all in v7.