From: Ahmad Fatoum <ahmad@a3f.at>
To: barebox@lists.infradead.org
Cc: afa@pengutronix.de
Subject: [PATCH 3/5] common: add generic CONFIG_KASAN option
Date: Thu, 22 Aug 2019 08:19:39 +0200 [thread overview]
Message-ID: <20190822061941.6093-4-ahmad@a3f.at> (raw)
In-Reply-To: <20190822061941.6093-1-ahmad@a3f.at>
-fsanitize=[kernel-]address-sanitizer allows compile-time instrumentation
of memory accesses to detect some classes of runtime undefined behavior.
In preparation for allowing arches to provide infrastructure in support
of this feature, add the generic KASAN options.
These are only shown in the debug menu when the arch selects the
appropriate symbol. The option is named equally to their Linux counterparts.
Signed-off-by: Ahmad Fatoum <ahmad@a3f.at>
---
common/Kconfig | 9 +++++++++
1 file changed, 9 insertions(+)
diff --git a/common/Kconfig b/common/Kconfig
index 0db7b21a3b30..edbc4b3a160f 100644
--- a/common/Kconfig
+++ b/common/Kconfig
@@ -1316,6 +1316,13 @@ config UBSAN_NO_ALIGNMENT
config UBSAN_ALIGNMENT
def_bool !UBSAN_NO_ALIGNMENT
+config KASAN
+ bool "KASAN: runtime memory debugger"
+ depends on HAVE_ARCH_KASAN
+ help
+ Enables KASAN (KernelAddressSANitizer) - runtime memory debugger,
+ designed to find out-of-bounds accesses and use-after-free bugs.
+
endmenu
config HAS_DEBUG_LL
@@ -1328,3 +1335,5 @@ config DDR_SPD
config ARCH_HAS_UBSAN_SANITIZE_ALL
bool
+config HAVE_ARCH_KASAN
+ bool
--
2.20.1
_______________________________________________
barebox mailing list
barebox@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/barebox
next prev parent reply other threads:[~2019-08-22 6:19 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-08-22 6:19 [PATCH 0/5] sandbox: support -fsanitize={address,ubsan} Ahmad Fatoum
2019-08-22 6:19 ` [PATCH 1/5] sandbox: include header to provide missing prototype Ahmad Fatoum
2019-08-22 6:19 ` [PATCH 2/5] common: add generic CONFIG_UBSAN_SANITIZE_ALL plumbing Ahmad Fatoum
2019-08-22 6:19 ` Ahmad Fatoum [this message]
2019-08-22 6:19 ` [PATCH 4/5] sandbox: support Address and UndefinedBehavior sanitizers Ahmad Fatoum
2019-08-22 6:19 ` [PATCH 5/5] commands: fix unaligned accesses of aliased commands on amd64 Ahmad Fatoum
2019-08-23 7:36 ` Sascha Hauer
2019-08-23 9:08 ` Ahmad Fatoum
2019-08-23 9:13 ` [PATCH 0/5] sandbox: support -fsanitize={address,ubsan} Ahmad Fatoum
2019-08-23 12:31 ` Ahmad Fatoum
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20190822061941.6093-4-ahmad@a3f.at \
--to=ahmad@a3f.at \
--cc=afa@pengutronix.de \
--cc=barebox@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox