> -----Original Message----- > From: dev <dev-boun...@dpdk.org> On Behalf Of Volodymyr Fialko > Sent: Tuesday, November 9, 2021 6:46 AM > To: dev@dpdk.org; Bruce Richardson <bruce.richard...@intel.com>; > Anatoly Burakov <anatoly.bura...@intel.com> > Cc: jer...@marvell.com; Volodymyr Fialko <vfia...@marvell.com>; David > Marchand <david.march...@redhat.com> > Subject: [dpdk-dev] [PATCH v2] eal/arm64: support ASan > > This patch defines ASAN_SHADOW_OFFSET for arm64 according to the ASan > documentation. This offset should cover all arm64 VMAs supported by ASan. > > Signed-off-by: Volodymyr Fialko <vfia...@marvell.com> > Reviewed-by: David Marchand <david.march...@redhat.com> > Acked-by: Jerin Jacob <jer...@marvell.com> > --- > Changes since v1: > - changed the subject > - rewrite checks in "elif" manner > --- > config/meson.build | 2 +- > doc/guides/prog_guide/asan.rst | 2 +- > lib/eal/common/malloc_elem.h | 2 ++ > 3 files changed, 4 insertions(+), 2 deletions(-) > > diff --git a/config/meson.build b/config/meson.build index > 17b5bec406..7eb710c08d 100644 > --- a/config/meson.build > +++ b/config/meson.build > @@ -428,7 +428,7 @@ if get_option('b_sanitize') == 'address' or > get_option('b_sanitize') == 'address > dpdk_extra_ldflags += '-lasan' > endif > > - if is_linux and arch_subdir == 'x86' and dpdk_conf.get('RTE_ARCH_64') > + if is_linux and arch_subdir in ['x86', 'arm'] and > + dpdk_conf.get('RTE_ARCH_64') > dpdk_conf.set10('RTE_MALLOC_ASAN', true) > endif > endif > diff --git a/doc/guides/prog_guide/asan.rst > b/doc/guides/prog_guide/asan.rst index 6d1b871c93..28b2382fc7 100644 > --- a/doc/guides/prog_guide/asan.rst > +++ b/doc/guides/prog_guide/asan.rst > @@ -33,7 +33,7 @@ Example:: > "stty echo" command when an error occurs. > > ASan is aware of DPDK memory allocations, thanks to added instrumentation. > -This is only enabled on x86_64 at the moment. > +This is enabled on x86_64 and arm64 at the moment. > Other architectures may have to define ASAN_SHADOW_OFFSET. > > Example heap-buffer-overflow error > diff --git a/lib/eal/common/malloc_elem.h b/lib/eal/common/malloc_elem.h > index 262d69bb3e..26e937cea0 100644 > --- a/lib/eal/common/malloc_elem.h > +++ b/lib/eal/common/malloc_elem.h > @@ -106,6 +106,8 @@ malloc_elem_cookies_ok(const struct malloc_elem > *elem) > > #ifdef RTE_ARCH_X86_64 > #define ASAN_SHADOW_OFFSET 0x00007fff8000 > +#elif defined(RTE_ARCH_ARM64) > +#define ASAN_SHADOW_OFFSET 0x001000000000 As Jerin mentioned, it is better to add a comment on why this value was selected. My search told me that "this value has to match kAArch64_ShadowOffset64 as defined in libsanitizer/asan/asan_mapping.h".
With the change, Acked-by: Ruifeng Wang <ruifeng.w...@arm.com> > #endif > > #define ASAN_SHADOW_GRAIN_SIZE 8 > -- > 2.25.1