github.com/google/syzkaller@v0.0.0-20240517125934-c0f1611a36d6/dashboard/config/linux/bits/kasan.yml (about) 1 # Copyright 2020 syzkaller project authors. All rights reserved. 2 # Use of this source code is governed by Apache 2 LICENSE that can be found in the LICENSE file. 3 4 config: 5 - KASAN 6 - KASAN_GENERIC: [v4.16] 7 # TODO: KASAN_INLINE is now broken for riscv+gcc. Revert -riscv once it is fixed. 8 - KASAN_INLINE: [-arm, -riscv, -cuttlefish] 9 - KASAN_STACK_ENABLE: [clang, v4.16, -v5.11] 10 - KASAN_STACK: [clang, v5.11] 11 - KASAN_VMALLOC: [v5.5, -arm, -arm64, -s390] 12 # This was historically enabled in the KASAN section without explanation. 13 - SPARSEMEM_VMEMMAP: [-arm, -riscv] 14 # This is required to enable SPARSEMEM_VMEMMAP. 15 - SPARSEMEM_MANUAL: [-arm, -arm64, -s390, -v5.17] 16 # This allows to get alloc/free stacks for UAFs on freed pages. 17 # This also needs page_owner=on in cmdline. 18 - PAGE_OWNER 19 20 - UBSAN: [v5.8] 21 - UBSAN_SANITIZE_ALL: [v5.8, -arm, -riscv, -v6.9] 22 - UBSAN_TRAP: n 23 - UBSAN_MISC: n 24 - UBSAN_BOUNDS: [v5.8] 25 - UBSAN_SHIFT: [v5.11] 26 # Already detected well by the exception handler. 27 - UBSAN_DIV_ZERO: n 28 # Produces too many reports: 29 # https://groups.google.com/forum/#!msg/syzkaller-bugs/i0xhp3rFSmo/KwZ0r9IIBQAJ 30 - UBSAN_BOOL: n 31 # Produces too many reports: 32 # https://groups.google.com/g/syzkaller-bugs/c/b_y3xw0wvOI/m/L074F0v3BQAJ 33 - UBSAN_OBJECT_SIZE: n 34 # This does not produce any reports, which suggests that it does not work somehow. 35 - UBSAN_SIGNED_OVERFLOW: n 36 - UBSAN_UNSIGNED_OVERFLOW: n 37 # This does not produce any reports, which suggests that it does not work somehow. 38 - UBSAN_ENUM: n 39 # Presumably can produce lots of working-as-intended reports, but this wasn't checked. 40 - UBSAN_ALIGNMENT: [n, v5.8] 41 # Depends on STACK_VALIDATION=n which we have enabled. 42 - UBSAN_UNREACHABLE: n