We did not have any protection in place to ensure that KASAN shadow memory isn't overwritten during boot. Add that now to avoid strange effects during debugging. Signed-off-by: Ahmad Fatoum <a.fatoum@xxxxxxxxxxxxxx> --- arch/arm/cpu/start.c | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/arch/arm/cpu/start.c b/arch/arm/cpu/start.c index 15f5b2937227..9f4cdfe67fbf 100644 --- a/arch/arm/cpu/start.c +++ b/arch/arm/cpu/start.c @@ -133,6 +133,10 @@ static int barebox_memory_areas_init(void) request_sdram_region("board data", (unsigned long)barebox_boarddata, barebox_boarddata_size); + if (IS_ENABLED(CONFIG_KASAN)) + request_sdram_region("kasan shadow", kasan_shadow_base, + mem_malloc_start() - kasan_shadow_base); + return 0; } device_initcall(barebox_memory_areas_init); -- 2.39.2