KASan: runtime memory debugger
modulename: kasan_init.ko
and/orcommon.ko
configname: CONFIG_KASAN
Linux Kernel Configuration
└─>Kernel hacking
└─>Memory Debugging
└─>KASan: runtime memory debugger
In linux kernel since version 3.10 (release Date: 2013-06-30)
Enables kernel address sanitizer - runtime memory debugger,
designed to find out-of-bounds accesses and use-after-free bugs.
This is strictly a debugging feature and it requires a gcc version
of 4.9.2 or later. Detection of out of bounds accesses to stack or
global variables requires gcc 5.0 or later.
This feature consumes about 1/8 of available memory and brings about
~x3 performance slowdown.
For better error detection enable CONFIG_STACKTRACE.
Currently CONFIG_KASAN doesn't work with CONFIG_DEBUG_SLAB
(the resulting kernel does not boot).
designed to find out-of-bounds accesses and use-after-free bugs.
This is strictly a debugging feature and it requires a gcc version
of 4.9.2 or later. Detection of out of bounds accesses to stack or
global variables requires gcc 5.0 or later.
This feature consumes about 1/8 of available memory and brings about
~x3 performance slowdown.
For better error detection enable CONFIG_STACKTRACE.
Currently CONFIG_KASAN doesn't work with CONFIG_DEBUG_SLAB
(the resulting kernel does not boot).
source code:
depends
CONFIG_HAVE_ARCH_KASANCONFIG_SLUB
CONFIG_SYSFS or CONFIG_SLAB
NOT CONFIG_DEBUG_SLAB or CONFIG_HAVE_ARCH_KASAN_HW_TAGS or CONFIG_CC_HAS_WORKING_NOSANITIZE_ADDRESS or CONFIG_CC_HAS_KASAN_GENERIC or CONFIG_HAVE_ARCH_KASAN or CONFIG_CC_HAS_KASAN_SW_TAGS or CONFIG_HAVE_ARCH_KASAN_SW_TAGS