]>
Commit | Line | Data |
---|---|---|
b2441318 | 1 | # SPDX-License-Identifier: GPL-2.0 |
0b24becc AR |
2 | ifdef CONFIG_KASAN |
3 | ifdef CONFIG_KASAN_INLINE | |
4 | call_threshold := 10000 | |
5 | else | |
6 | call_threshold := 0 | |
7 | endif | |
8 | ||
39d114dd AR |
9 | KASAN_SHADOW_OFFSET ?= $(CONFIG_KASAN_SHADOW_OFFSET) |
10 | ||
0b24becc AR |
11 | CFLAGS_KASAN_MINIMAL := -fsanitize=kernel-address |
12 | ||
1a69e7ce | 13 | cc-param = $(call cc-option, -mllvm -$(1), $(call cc-option, --param $(1))) |
0b24becc AR |
14 | |
15 | ifeq ($(call cc-option, $(CFLAGS_KASAN_MINIMAL) -Werror),) | |
6e54abac | 16 | ifneq ($(CONFIG_COMPILE_TEST),y) |
0b24becc AR |
17 | $(warning Cannot use CONFIG_KASAN: \ |
18 | -fsanitize=kernel-address is not supported by compiler) | |
6e54abac | 19 | endif |
0b24becc | 20 | else |
1a69e7ce AR |
21 | # -fasan-shadow-offset fails without -fsanitize |
22 | CFLAGS_KASAN_SHADOW := $(call cc-option, -fsanitize=kernel-address \ | |
23 | -fasan-shadow-offset=$(KASAN_SHADOW_OFFSET), \ | |
24 | $(call cc-option, -fsanitize=kernel-address \ | |
25 | -mllvm -asan-mapping-offset=$(KASAN_SHADOW_OFFSET))) | |
26 | ||
27 | ifeq ($(strip $(CFLAGS_KASAN_SHADOW)),) | |
28 | CFLAGS_KASAN := $(CFLAGS_KASAN_MINIMAL) | |
29 | else | |
30 | # Now add all the compiler specific options that are valid standalone | |
31 | CFLAGS_KASAN := $(CFLAGS_KASAN_SHADOW) \ | |
32 | $(call cc-param,asan-globals=1) \ | |
33 | $(call cc-param,asan-instrumentation-with-call-threshold=$(call_threshold)) \ | |
34 | $(call cc-param,asan-stack=1) \ | |
342061ee PL |
35 | $(call cc-param,asan-use-after-scope=1) \ |
36 | $(call cc-param,asan-instrument-allocas=1) | |
1a69e7ce AR |
37 | endif |
38 | ||
0b24becc | 39 | endif |
c5caf21a | 40 | |
e7c52b84 | 41 | ifdef CONFIG_KASAN_EXTRA |
c5caf21a | 42 | CFLAGS_KASAN += $(call cc-option, -fsanitize-address-use-after-scope) |
e7c52b84 | 43 | endif |
0e410e15 AK |
44 | |
45 | CFLAGS_KASAN_NOSANITIZE := -fno-builtin | |
46 | ||
0b24becc | 47 | endif |