Loading...
1# SPDX-License-Identifier: GPL-2.0
2ifdef CONFIG_KASAN
3ifdef CONFIG_KASAN_INLINE
4 call_threshold := 10000
5else
6 call_threshold := 0
7endif
8
9KASAN_SHADOW_OFFSET ?= $(CONFIG_KASAN_SHADOW_OFFSET)
10
11CFLAGS_KASAN_MINIMAL := -fsanitize=kernel-address
12
13cc-param = $(call cc-option, -mllvm -$(1), $(call cc-option, --param $(1)))
14
15ifeq ($(call cc-option, $(CFLAGS_KASAN_MINIMAL) -Werror),)
16 ifneq ($(CONFIG_COMPILE_TEST),y)
17 $(warning Cannot use CONFIG_KASAN: \
18 -fsanitize=kernel-address is not supported by compiler)
19 endif
20else
21 # -fasan-shadow-offset fails without -fsanitize
22 CFLAGS_KASAN_SHADOW := $(call cc-option, -fsanitize=kernel-address \
23 -fasan-shadow-offset=$(KASAN_SHADOW_OFFSET), \
24 $(call cc-option, -fsanitize=kernel-address \
25 -mllvm -asan-mapping-offset=$(KASAN_SHADOW_OFFSET)))
26
27 ifeq ($(strip $(CFLAGS_KASAN_SHADOW)),)
28 CFLAGS_KASAN := $(CFLAGS_KASAN_MINIMAL)
29 else
30 # Now add all the compiler specific options that are valid standalone
31 CFLAGS_KASAN := $(CFLAGS_KASAN_SHADOW) \
32 $(call cc-param,asan-globals=1) \
33 $(call cc-param,asan-instrumentation-with-call-threshold=$(call_threshold)) \
34 $(call cc-param,asan-stack=1) \
35 $(call cc-param,asan-use-after-scope=1) \
36 $(call cc-param,asan-instrument-allocas=1)
37 endif
38
39endif
40
41ifdef CONFIG_KASAN_EXTRA
42CFLAGS_KASAN += $(call cc-option, -fsanitize-address-use-after-scope)
43endif
44
45CFLAGS_KASAN_NOSANITIZE := -fno-builtin
46
47endif
1# SPDX-License-Identifier: GPL-2.0
2CFLAGS_KASAN_NOSANITIZE := -fno-builtin
3KASAN_SHADOW_OFFSET ?= $(CONFIG_KASAN_SHADOW_OFFSET)
4
5cc-param = $(call cc-option, -mllvm -$(1), $(call cc-option, --param $(1)))
6
7ifdef CONFIG_KASAN_STACK
8 stack_enable := 1
9else
10 stack_enable := 0
11endif
12
13ifdef CONFIG_KASAN_GENERIC
14
15ifdef CONFIG_KASAN_INLINE
16 call_threshold := 10000
17else
18 call_threshold := 0
19endif
20
21CFLAGS_KASAN_MINIMAL := -fsanitize=kernel-address
22
23# -fasan-shadow-offset fails without -fsanitize
24CFLAGS_KASAN_SHADOW := $(call cc-option, -fsanitize=kernel-address \
25 -fasan-shadow-offset=$(KASAN_SHADOW_OFFSET), \
26 $(call cc-option, -fsanitize=kernel-address \
27 -mllvm -asan-mapping-offset=$(KASAN_SHADOW_OFFSET)))
28
29ifeq ($(strip $(CFLAGS_KASAN_SHADOW)),)
30 CFLAGS_KASAN := $(CFLAGS_KASAN_MINIMAL)
31else
32 # Now add all the compiler specific options that are valid standalone
33 CFLAGS_KASAN := $(CFLAGS_KASAN_SHADOW) \
34 $(call cc-param,asan-globals=1) \
35 $(call cc-param,asan-instrumentation-with-call-threshold=$(call_threshold)) \
36 $(call cc-param,asan-instrument-allocas=1)
37endif
38
39CFLAGS_KASAN += $(call cc-param,asan-stack=$(stack_enable))
40
41endif # CONFIG_KASAN_GENERIC
42
43ifdef CONFIG_KASAN_SW_TAGS
44
45ifdef CONFIG_KASAN_INLINE
46 instrumentation_flags := $(call cc-param,hwasan-mapping-offset=$(KASAN_SHADOW_OFFSET))
47else
48 instrumentation_flags := $(call cc-param,hwasan-instrument-with-calls=1)
49endif
50
51CFLAGS_KASAN := -fsanitize=kernel-hwaddress \
52 $(call cc-param,hwasan-instrument-stack=$(stack_enable)) \
53 $(call cc-param,hwasan-use-short-granules=0) \
54 $(call cc-param,hwasan-inline-all-checks=0) \
55 $(instrumentation_flags)
56
57endif # CONFIG_KASAN_SW_TAGS
58
59export CFLAGS_KASAN CFLAGS_KASAN_NOSANITIZE