[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <172969587091.1722746.16856042092493192617.b4-ty@kernel.org>
Date: Wed, 23 Oct 2024 17:21:21 +0100
From: Will Deacon <will@...nel.org>
To: Marco Elver <elver@...gle.com>
Cc: catalin.marinas@....com,
kernel-team@...roid.com,
Will Deacon <will@...nel.org>,
Andrey Ryabinin <ryabinin.a.a@...il.com>,
Alexander Potapenko <glider@...gle.com>,
Andrey Konovalov <andreyknvl@...il.com>,
Dmitry Vyukov <dvyukov@...gle.com>,
Vincenzo Frascino <vincenzo.frascino@....com>,
Mark Rutland <mark.rutland@....com>,
linux-kernel@...r.kernel.org,
kasan-dev@...glegroups.com,
llvm@...ts.linux.dev,
syzbot+908886656a02769af987@...kaller.appspotmail.com,
Andrew Pinski <pinskia@...il.com>
Subject: Re: [PATCH 1/2] kasan: Fix Software Tag-Based KASAN with GCC
On Mon, 21 Oct 2024 14:00:10 +0200, Marco Elver wrote:
> Per [1], -fsanitize=kernel-hwaddress with GCC currently does not disable
> instrumentation in functions with __attribute__((no_sanitize_address)).
>
> However, __attribute__((no_sanitize("hwaddress"))) does correctly
> disable instrumentation. Use it instead.
>
>
> [...]
Applied to arm64 (for-next/fixes), thanks!
[1/2] kasan: Fix Software Tag-Based KASAN with GCC
https://git.kernel.org/arm64/c/894b00a3350c
[2/2] Revert "kasan: Disable Software Tag-Based KASAN with GCC"
https://git.kernel.org/arm64/c/237ab03e301d
Cheers,
--
Will
https://fixes.arm64.dev
https://next.arm64.dev
https://will.arm64.dev
Powered by blists - more mailing lists