lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 2 Dec 2020 16:44:34 -0800 From: Kees Cook <keescook@...omium.org> To: Andrew Morton <akpm@...ux-foundation.org> Cc: Kees Cook <keescook@...omium.org>, Nathan Chancellor <natechancellor@...il.com>, Linus Torvalds <torvalds@...ux-foundation.org>, Ard Biesheuvel <ardb@...nel.org>, Arnd Bergmann <arnd@...db.de>, Masahiro Yamada <masahiroy@...nel.org>, Michal Marek <michal.lkml@...kovi.net>, Nick Desaulniers <ndesaulniers@...gle.com>, Marco Elver <elver@...gle.com>, Randy Dunlap <rdunlap@...radead.org>, Dmitry Vyukov <dvyukov@...gle.com>, George Popescu <georgepope@...roid.com>, Herbert Xu <herbert@...dor.apana.org.au>, Peter Oberparleiter <oberpar@...ux.ibm.com>, Andrey Ryabinin <aryabinin@...tuozzo.com>, clang-built-linux@...glegroups.com, linux-kbuild@...r.kernel.org, linux-kernel@...r.kernel.org Subject: [PATCH v2 4/7] ubsan: Disable UBSAN_TRAP for all*config Doing all*config builds attempts to build as much as possible. UBSAN_TRAP effectively short-circuits lib/usban.c, so it should be disabled for COMPILE_TEST so that the lib/ubsan.c code gets built. Reviewed-by: Nathan Chancellor <natechancellor@...il.com> Signed-off-by: Kees Cook <keescook@...omium.org> --- lib/Kconfig.ubsan | 1 + 1 file changed, 1 insertion(+) diff --git a/lib/Kconfig.ubsan b/lib/Kconfig.ubsan index 4190a99b1eaa..6e8b67d4b0d9 100644 --- a/lib/Kconfig.ubsan +++ b/lib/Kconfig.ubsan @@ -14,6 +14,7 @@ if UBSAN config UBSAN_TRAP bool "On Sanitizer warnings, abort the running kernel code" + depends on !COMPILE_TEST depends on $(cc-option, -fsanitize-undefined-trap-on-error) help Building kernels with Sanitizer features enabled tends to grow -- 2.25.1
Powered by blists - more mailing lists