Comment #3 on issue 289 by [email protected]: kasan: instrumentation of
atomic operations
http://code.google.com/p/address-sanitizer/issues/detail?id=289
2. We don't want to do it in gcc (clang if anything).
Why? I thought they are compatible at least in this regard.
3. I suspect that we actually don't want to instrument most of kernel
assembly code
And I'd say this feature is useful for non-kernel code as well. This can be
a separate issue though.
(e.g. task switching, interrupt thunks, syscall thunks, user memory
access routines, etc).
I see. Can we attach attributes to inline asm? no_sanitize_address may come
to rescue.
--
You received this message because this project is configured to send all
issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings
--
You received this message because you are subscribed to the Google Groups
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.