lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 21 Oct 2014 10:06:25 -0700 From: Randy Dunlap <rdunlap@...radead.org> To: Andrey Ryabinin <a.ryabinin@...sung.com>, Andrew Morton <akpm@...ux-foundation.org>, Thomas Gleixner <tglx@...utronix.de>, Ingo Molnar <mingo@...hat.com>, "H. Peter Anvin" <hpa@...or.com>, Peter Zijlstra <peterz@...radead.org>, Michal Marek <mmarek@...e.cz>, Sasha Levin <sasha.levin@...cle.com>, x86@...nel.org, linux-kbuild@...r.kernel.org, linux-kernel@...r.kernel.org CC: Theodore Ts'o <tytso@....edu>, Andreas Dilger <adilger.kernel@...ger.ca>, Dmitry Vyukov <dvyukov@...gle.com>, Konstantin Khlebnikov <koct9i@...il.com> Subject: Re: [RFC PATCH] UBSan: run-time undefined behavior sanity checker On 10/20/14 03:54, Andrey Ryabinin wrote: > > diff --git a/lib/Kconfig.debug b/lib/Kconfig.debug > index 4e35a5d..7dc9b89 100644 > --- a/lib/Kconfig.debug > +++ b/lib/Kconfig.debug > @@ -646,6 +646,29 @@ config DEBUG_SHIRQ > Drivers ought to be able to handle interrupts coming in at those > points; some don't and need to be caught. > > +config HAVE_ARCH_UBSAN_SANTIZE_ALL > + bool > + > +config UBSAN > + bool "Undefined behaviour sanity checker" > + help > + This option enables undefined behaviour sanity checker checker. > + Compile-time instrumentataion used to detect various undefined instrumentation is used > + behaviours in runtime. Different kinds of checks could be enabled prefer: may be enabled > + via boot parameter ubsan_handle (see: Documentation/ubsan.txt). > + (TODO: write docs). > + > +config UBSAN_SANITIZE_ALL > + bool "Enable instrumentation for the entire kernel" > + depends on UBSAN > + depends on HAVE_ARCH_UBSAN_SANTIZE_ALL > + default y > + help > + This option acitivates instrumentation for the entire kernel. activates > + If you don't enable this option, you have to explicitly specify > + UBSAN_SANITIZE := y for the files/directories you want to check for UB. > + > + > menu "Debug Lockups and Hangs" > > config LOCKUP_DETECTOR -- ~Randy -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists