1 # SPDX-License-Identifier: GPL-2.0-only
3 # This config refers to the generic KASAN mode.
7 config HAVE_ARCH_KASAN_SW_TAGS
10 config HAVE_ARCH_KASAN_HW_TAGS
13 config HAVE_ARCH_KASAN_VMALLOC
16 config ARCH_DISABLE_KASAN_INLINE
19 Disables both inline and stack instrumentation. Selected by
20 architectures that do not support these instrumentation types.
22 config CC_HAS_KASAN_GENERIC
23 def_bool $(cc-option, -fsanitize=kernel-address)
25 config CC_HAS_KASAN_SW_TAGS
26 def_bool $(cc-option, -fsanitize=kernel-hwaddress)
28 # This option is only required for software KASAN modes.
29 # Old GCC versions do not have proper support for no_sanitize_address.
30 # See https://gcc.gnu.org/bugzilla/show_bug.cgi?id=89124 for details.
31 config CC_HAS_WORKING_NOSANITIZE_ADDRESS
32 def_bool !CC_IS_GCC || GCC_VERSION >= 80300
35 bool "KASAN: dynamic memory safety error detector"
36 depends on (((HAVE_ARCH_KASAN && CC_HAS_KASAN_GENERIC) || \
37 (HAVE_ARCH_KASAN_SW_TAGS && CC_HAS_KASAN_SW_TAGS)) && \
38 CC_HAS_WORKING_NOSANITIZE_ADDRESS) || \
39 HAVE_ARCH_KASAN_HW_TAGS
40 depends on (SLUB && SYSFS) || (SLAB && !DEBUG_SLAB)
41 select STACKDEPOT_ALWAYS_INIT
43 Enables KASAN (Kernel Address Sanitizer) - a dynamic memory safety
44 error detector designed to find out-of-bounds and use-after-free bugs.
46 See Documentation/dev-tools/kasan.rst for details.
48 For better error reports, also enable CONFIG_STACKTRACE.
56 KASAN has three modes:
58 1. Generic KASAN (supported by many architectures, enabled with
59 CONFIG_KASAN_GENERIC, similar to userspace ASan),
60 2. Software Tag-Based KASAN (arm64 only, based on software memory
61 tagging, enabled with CONFIG_KASAN_SW_TAGS, similar to userspace
63 3. Hardware Tag-Based KASAN (arm64 only, based on hardware memory
64 tagging, enabled with CONFIG_KASAN_HW_TAGS).
66 See Documentation/dev-tools/kasan.rst for details about each mode.
70 depends on HAVE_ARCH_KASAN && CC_HAS_KASAN_GENERIC
71 depends on CC_HAS_WORKING_NOSANITIZE_ADDRESS
72 select SLUB_DEBUG if SLUB
75 Enables Generic KASAN.
77 Requires GCC 8.3.0+ or Clang.
79 Consumes about 1/8th of available memory at kernel start and adds an
80 overhead of ~50% for dynamic allocations.
81 The performance slowdown is ~x3.
83 (Incompatible with CONFIG_DEBUG_SLAB: the kernel does not boot.)
86 bool "Software Tag-Based KASAN"
87 depends on HAVE_ARCH_KASAN_SW_TAGS && CC_HAS_KASAN_SW_TAGS
88 depends on CC_HAS_WORKING_NOSANITIZE_ADDRESS
89 select SLUB_DEBUG if SLUB
92 Enables Software Tag-Based KASAN.
94 Requires GCC 11+ or Clang.
96 Supported only on arm64 CPUs and relies on Top Byte Ignore.
98 Consumes about 1/16th of available memory at kernel start and
99 add an overhead of ~20% for dynamic allocations.
101 May potentially introduce problems related to pointer casting and
102 comparison, as it embeds a tag into the top byte of each pointer.
104 (Incompatible with CONFIG_DEBUG_SLAB: the kernel does not boot.)
107 bool "Hardware Tag-Based KASAN"
108 depends on HAVE_ARCH_KASAN_HW_TAGS
111 Enables Hardware Tag-Based KASAN.
113 Requires GCC 10+ or Clang 12+.
115 Supported only on arm64 CPUs starting from ARMv8.5 and relies on
116 Memory Tagging Extension and Top Byte Ignore.
118 Consumes about 1/32nd of available memory.
120 May potentially introduce problems related to pointer casting and
121 comparison, as it embeds a tag into the top byte of each pointer.
126 prompt "Instrumentation type"
127 depends on KASAN_GENERIC || KASAN_SW_TAGS
128 default KASAN_OUTLINE
131 bool "Outline instrumentation"
133 Makes the compiler insert function calls that check whether the memory
134 is accessible before each memory access. Slower than KASAN_INLINE, but
135 does not bloat the size of the kernel's .text section so much.
138 bool "Inline instrumentation"
139 depends on !ARCH_DISABLE_KASAN_INLINE
141 Makes the compiler directly insert memory accessibility checks before
142 each memory access. Faster than KASAN_OUTLINE (gives ~x2 boost for
143 some workloads), but makes the kernel's .text size much bigger.
148 bool "Stack instrumentation (unsafe)" if CC_IS_CLANG && !COMPILE_TEST
149 depends on KASAN_GENERIC || KASAN_SW_TAGS
150 depends on !ARCH_DISABLE_KASAN_INLINE
151 default y if CC_IS_GCC
153 Disables stack instrumentation and thus KASAN's ability to detect
154 out-of-bounds bugs in stack variables.
156 With Clang, stack instrumentation has a problem that causes excessive
157 stack usage, see https://bugs.llvm.org/show_bug.cgi?id=38809. Thus,
158 with Clang, this option is deemed unsafe.
160 This option is always disabled when compile-testing with Clang to
161 avoid cluttering the log with stack overflow warnings.
163 With GCC, enabling stack instrumentation is assumed to be safe.
165 If the architecture disables inline instrumentation via
166 ARCH_DISABLE_KASAN_INLINE, stack instrumentation gets disabled
167 as well, as it adds inline-style instrumentation that is run
170 config KASAN_TAGS_IDENTIFY
171 bool "Memory corruption type identification"
172 depends on KASAN_SW_TAGS || KASAN_HW_TAGS
174 Enables best-effort identification of the bug types (use-after-free
175 or out-of-bounds) at the cost of increased memory consumption.
176 Only applicable for the tag-based KASAN modes.
179 bool "Check accesses to vmalloc allocations"
180 depends on HAVE_ARCH_KASAN_VMALLOC
182 Makes KASAN check the validity of accesses to vmalloc allocations.
184 With software KASAN modes, all types vmalloc allocations are
185 checked. Enabling this option leads to higher memory usage.
187 With Hardware Tag-Based KASAN, only non-executable VM_ALLOC mappings
188 are checked. There is no additional memory usage.
190 config KASAN_KUNIT_TEST
191 tristate "KUnit-compatible tests of KASAN bug detection capabilities" if !KUNIT_ALL_TESTS
192 depends on KASAN && KUNIT
193 default KUNIT_ALL_TESTS
195 A KUnit-based KASAN test suite. Triggers different kinds of
196 out-of-bounds and use-after-free accesses. Useful for testing whether
197 KASAN can detect certain bug types.
199 For more information on KUnit and unit tests in general, please refer
200 to the KUnit documentation in Documentation/dev-tools/kunit/.
202 config KASAN_MODULE_TEST
203 tristate "KUnit-incompatible tests of KASAN bug detection capabilities"
204 depends on m && KASAN && !KASAN_HW_TAGS
206 A part of the KASAN test suite that is not integrated with KUnit.
207 Incompatible with Hardware Tag-Based KASAN.