From: Ahmad Fatoum <a.fatoum@pengutronix.de>
To: barebox@lists.infradead.org
Cc: Ahmad Fatoum <a.fatoum@pengutronix.de>
Subject: [PATCH] banner: print out enabled sanitizers
Date: Fri, 4 Apr 2025 17:58:05 +0200 [thread overview]
Message-ID: <20250404155805.2865565-1-a.fatoum@pengutronix.de> (raw)
KASAN and UBSAN can currently be detected only indirectly via their test
commands or in case of KASAN by observing the MMIO reservations.
Improve upon this by printing out their status on bootup if they are
enabled.
Signed-off-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
---
arch/arm/cpu/start.c | 2 +-
common/version.c | 12 ++++++++++++
include/linux/kasan-enabled.h | 14 ++++++++++++++
include/linux/kasan.h | 1 +
lib/kasan/generic.c | 10 ++++++++++
5 files changed, 38 insertions(+), 1 deletion(-)
create mode 100644 include/linux/kasan-enabled.h
diff --git a/arch/arm/cpu/start.c b/arch/arm/cpu/start.c
index 0022ea768b26..aa716a10c7b0 100644
--- a/arch/arm/cpu/start.c
+++ b/arch/arm/cpu/start.c
@@ -118,7 +118,7 @@ EXPORT_SYMBOL_GPL(arm_mem_membase_get);
static int barebox_memory_areas_init(void)
{
- if (IS_ENABLED(CONFIG_KASAN))
+ if (kasan_enabled())
request_sdram_region("kasan shadow", kasan_shadow_base,
mem_malloc_start() - kasan_shadow_base);
diff --git a/common/version.c b/common/version.c
index 0cac5ee609e6..77bc0d3396fb 100644
--- a/common/version.c
+++ b/common/version.c
@@ -3,6 +3,7 @@
#include <common.h>
#include <generated/compile.h>
#include <generated/utsrelease.h>
+#include <linux/kasan-enabled.h>
const char version_string[] =
"barebox " UTS_RELEASE " " UTS_VERSION;
@@ -19,11 +20,22 @@ EXPORT_SYMBOL(buildsystem_version_string);
#ifdef CONFIG_BANNER
void barebox_banner (void)
{
+ bool have_asan, have_ubsan;
+
printf("\n\n");
pr_info("%s\n", version_string);
if (strlen(buildsystem_version_string) > 0)
pr_info("Buildsystem version: %s\n", buildsystem_version_string);
printf("\n\n");
pr_info("Board: %s\n", barebox_get_model());
+
+ have_asan = kasan_enabled();
+ have_ubsan = IS_ENABLED(CONFIG_UBSAN);
+
+ if (have_asan || have_ubsan)
+ pr_info("Active sanitizers:%s%s%s\n",
+ have_asan && IS_ENABLED(CONFIG_KASAN) ? " K" : " ",
+ have_asan ? "ASAN" : "",
+ have_ubsan ? " UBSAN" : "");
}
#endif
diff --git a/include/linux/kasan-enabled.h b/include/linux/kasan-enabled.h
new file mode 100644
index 000000000000..890f6e844e1b
--- /dev/null
+++ b/include/linux/kasan-enabled.h
@@ -0,0 +1,14 @@
+/* SPDX-License-Identifier: GPL-2.0 */
+#ifndef _LINUX_KASAN_ENABLED_H
+#define _LINUX_KASAN_ENABLED_H
+
+#ifdef CONFIG_KASAN
+bool kasan_enabled(void);
+#else /* CONFIG_KASAN */
+static inline bool kasan_enabled(void)
+{
+ return IS_ENABLED(CONFIG_ASAN);
+}
+#endif /* CONFIG_KASAN */
+
+#endif /* LINUX_KASAN_ENABLED_H */
diff --git a/include/linux/kasan.h b/include/linux/kasan.h
index 8afdab7c9d4b..fa5ee45d4cf3 100644
--- a/include/linux/kasan.h
+++ b/include/linux/kasan.h
@@ -3,6 +3,7 @@
#define _LINUX_KASAN_H
#include <linux/types.h>
+#include <linux/kasan-enabled.h>
/*
* On 64bit architectures tlsf aligns all allocations to a 64bit
diff --git a/lib/kasan/generic.c b/lib/kasan/generic.c
index 2432f9274401..66eebac15600 100644
--- a/lib/kasan/generic.c
+++ b/lib/kasan/generic.c
@@ -14,6 +14,8 @@
*
*/
+#define pr_fmt(fmt) "kasan: generic: " fmt
+
#include <common.h>
#include "kasan.h"
@@ -149,6 +151,11 @@ static __always_inline bool memory_is_poisoned(unsigned long addr, size_t size)
static bool kasan_initialized;
+bool kasan_enabled(void)
+{
+ return kasan_initialized;
+}
+
static __always_inline bool check_memory_region_inline(unsigned long addr,
size_t size, bool write,
unsigned long ret_ip)
@@ -223,6 +230,9 @@ void kasan_init(unsigned long membase, unsigned long memsize,
kasan_unpoison_shadow((void *)membase, memsize);
kasan_initialized = true;
+
+ pr_debug("initialized for 0x%08lx-0x%lx with shadow at 0x%08lx\n",
+ kasan_shadow_start, kasan_shadowed_end, kasan_shadow_base);
}
bool __no_sanitize_address check_memory_region(unsigned long addr,
--
2.39.5
reply other threads:[~2025-04-04 15:59 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20250404155805.2865565-1-a.fatoum@pengutronix.de \
--to=a.fatoum@pengutronix.de \
--cc=barebox@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox