X-Git-Url: http://git.cascardo.info/?a=blobdiff_plain;f=Documentation%2Fkasan.txt;h=7dd95b35cd7cd2dd17cbbd9bb9db48fc3590d542;hb=7e4c224abfe8e2a00f56a2ef0198e6de3ca1852c;hp=aa1e0c91e368885ba90e152abd377ce18dd4bdc3;hpb=b84da9fa47cf6e8dfd71d673a2f744ec1cac452c;p=cascardo%2Flinux.git diff --git a/Documentation/kasan.txt b/Documentation/kasan.txt index aa1e0c91e368..7dd95b35cd7c 100644 --- a/Documentation/kasan.txt +++ b/Documentation/kasan.txt @@ -12,8 +12,7 @@ KASAN uses compile-time instrumentation for checking every memory access, therefore you will need a GCC version 4.9.2 or later. GCC 5.0 or later is required for detection of out-of-bounds accesses to stack or global variables. -Currently KASAN is supported only for x86_64 architecture and requires the -kernel to be built with the SLUB allocator. +Currently KASAN is supported only for x86_64 architecture. 1. Usage ======== @@ -27,7 +26,7 @@ inline are compiler instrumentation types. The former produces smaller binary the latter is 1.1 - 2 times faster. Inline instrumentation requires a GCC version 5.0 or later. -Currently KASAN works only with the SLUB memory allocator. +KASAN works with both SLUB and SLAB memory allocators. For better bug detection and nicer reporting, enable CONFIG_STACKTRACE. To disable instrumentation for specific files or directories, add a line