-fsanitize=[kernel-]address-sanitizer allows compile-time instrumentation of memory accesses to detect some classes of runtime undefined behavior. In preparation for allowing arches to provide infrastructure in support of this feature, add the generic KASAN options. These are only shown in the debug menu when the arch selects the appropriate symbol. The option is named equally to their Linux counterparts. Signed-off-by: Ahmad Fatoum <ahmad@xxxxxx> --- common/Kconfig | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/common/Kconfig b/common/Kconfig index 0db7b21a3b30..edbc4b3a160f 100644 --- a/common/Kconfig +++ b/common/Kconfig @@ -1316,6 +1316,13 @@ config UBSAN_NO_ALIGNMENT config UBSAN_ALIGNMENT def_bool !UBSAN_NO_ALIGNMENT +config KASAN + bool "KASAN: runtime memory debugger" + depends on HAVE_ARCH_KASAN + help + Enables KASAN (KernelAddressSANitizer) - runtime memory debugger, + designed to find out-of-bounds accesses and use-after-free bugs. + endmenu config HAS_DEBUG_LL @@ -1328,3 +1335,5 @@ config DDR_SPD config ARCH_HAS_UBSAN_SANITIZE_ALL bool +config HAVE_ARCH_KASAN + bool -- 2.20.1 _______________________________________________ barebox mailing list barebox@xxxxxxxxxxxxxxxxxxx http://lists.infradead.org/mailman/listinfo/barebox