* [PATCH] banner: print out enabled sanitizers
@ 2025-04-04 15:58 Ahmad Fatoum
0 siblings, 0 replies; only message in thread
From: Ahmad Fatoum @ 2025-04-04 15:58 UTC (permalink / raw)
To: barebox; +Cc: Ahmad Fatoum
KASAN and UBSAN can currently be detected only indirectly via their test
commands or in case of KASAN by observing the MMIO reservations.
Improve upon this by printing out their status on bootup if they are
enabled.
Signed-off-by: Ahmad Fatoum <a.fatoum@pengutronix.de>
---
arch/arm/cpu/start.c | 2 +-
common/version.c | 12 ++++++++++++
include/linux/kasan-enabled.h | 14 ++++++++++++++
include/linux/kasan.h | 1 +
lib/kasan/generic.c | 10 ++++++++++
5 files changed, 38 insertions(+), 1 deletion(-)
create mode 100644 include/linux/kasan-enabled.h
diff --git a/arch/arm/cpu/start.c b/arch/arm/cpu/start.c
index 0022ea768b26..aa716a10c7b0 100644
--- a/arch/arm/cpu/start.c
+++ b/arch/arm/cpu/start.c
@@ -118,7 +118,7 @@ EXPORT_SYMBOL_GPL(arm_mem_membase_get);
static int barebox_memory_areas_init(void)
{
- if (IS_ENABLED(CONFIG_KASAN))
+ if (kasan_enabled())
request_sdram_region("kasan shadow", kasan_shadow_base,
mem_malloc_start() - kasan_shadow_base);
diff --git a/common/version.c b/common/version.c
index 0cac5ee609e6..77bc0d3396fb 100644
--- a/common/version.c
+++ b/common/version.c
@@ -3,6 +3,7 @@
#include <common.h>
#include <generated/compile.h>
#include <generated/utsrelease.h>
+#include <linux/kasan-enabled.h>
const char version_string[] =
"barebox " UTS_RELEASE " " UTS_VERSION;
@@ -19,11 +20,22 @@ EXPORT_SYMBOL(buildsystem_version_string);
#ifdef CONFIG_BANNER
void barebox_banner (void)
{
+ bool have_asan, have_ubsan;
+
printf("\n\n");
pr_info("%s\n", version_string);
if (strlen(buildsystem_version_string) > 0)
pr_info("Buildsystem version: %s\n", buildsystem_version_string);
printf("\n\n");
pr_info("Board: %s\n", barebox_get_model());
+
+ have_asan = kasan_enabled();
+ have_ubsan = IS_ENABLED(CONFIG_UBSAN);
+
+ if (have_asan || have_ubsan)
+ pr_info("Active sanitizers:%s%s%s\n",
+ have_asan && IS_ENABLED(CONFIG_KASAN) ? " K" : " ",
+ have_asan ? "ASAN" : "",
+ have_ubsan ? " UBSAN" : "");
}
#endif
diff --git a/include/linux/kasan-enabled.h b/include/linux/kasan-enabled.h
new file mode 100644
index 000000000000..890f6e844e1b
--- /dev/null
+++ b/include/linux/kasan-enabled.h
@@ -0,0 +1,14 @@
+/* SPDX-License-Identifier: GPL-2.0 */
+#ifndef _LINUX_KASAN_ENABLED_H
+#define _LINUX_KASAN_ENABLED_H
+
+#ifdef CONFIG_KASAN
+bool kasan_enabled(void);
+#else /* CONFIG_KASAN */
+static inline bool kasan_enabled(void)
+{
+ return IS_ENABLED(CONFIG_ASAN);
+}
+#endif /* CONFIG_KASAN */
+
+#endif /* LINUX_KASAN_ENABLED_H */
diff --git a/include/linux/kasan.h b/include/linux/kasan.h
index 8afdab7c9d4b..fa5ee45d4cf3 100644
--- a/include/linux/kasan.h
+++ b/include/linux/kasan.h
@@ -3,6 +3,7 @@
#define _LINUX_KASAN_H
#include <linux/types.h>
+#include <linux/kasan-enabled.h>
/*
* On 64bit architectures tlsf aligns all allocations to a 64bit
diff --git a/lib/kasan/generic.c b/lib/kasan/generic.c
index 2432f9274401..66eebac15600 100644
--- a/lib/kasan/generic.c
+++ b/lib/kasan/generic.c
@@ -14,6 +14,8 @@
*
*/
+#define pr_fmt(fmt) "kasan: generic: " fmt
+
#include <common.h>
#include "kasan.h"
@@ -149,6 +151,11 @@ static __always_inline bool memory_is_poisoned(unsigned long addr, size_t size)
static bool kasan_initialized;
+bool kasan_enabled(void)
+{
+ return kasan_initialized;
+}
+
static __always_inline bool check_memory_region_inline(unsigned long addr,
size_t size, bool write,
unsigned long ret_ip)
@@ -223,6 +230,9 @@ void kasan_init(unsigned long membase, unsigned long memsize,
kasan_unpoison_shadow((void *)membase, memsize);
kasan_initialized = true;
+
+ pr_debug("initialized for 0x%08lx-0x%lx with shadow at 0x%08lx\n",
+ kasan_shadow_start, kasan_shadowed_end, kasan_shadow_base);
}
bool __no_sanitize_address check_memory_region(unsigned long addr,
--
2.39.5
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2025-04-04 15:59 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2025-04-04 15:58 [PATCH] banner: print out enabled sanitizers Ahmad Fatoum
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox