xref: /openbmc/linux/scripts/Makefile.kasan (revision 249592bf)
1# SPDX-License-Identifier: GPL-2.0
2CFLAGS_KASAN_NOSANITIZE := -fno-builtin
3KASAN_SHADOW_OFFSET ?= $(CONFIG_KASAN_SHADOW_OFFSET)
4
5cc-param = $(call cc-option, -mllvm -$(1), $(call cc-option, --param $(1)))
6
7ifdef CONFIG_KASAN_STACK
8	stack_enable := 1
9else
10	stack_enable := 0
11endif
12
13ifdef CONFIG_KASAN_GENERIC
14
15ifdef CONFIG_KASAN_INLINE
16	call_threshold := 10000
17else
18	call_threshold := 0
19endif
20
21CFLAGS_KASAN_MINIMAL := -fsanitize=kernel-address
22
23# -fasan-shadow-offset fails without -fsanitize
24CFLAGS_KASAN_SHADOW := $(call cc-option, -fsanitize=kernel-address \
25			-fasan-shadow-offset=$(KASAN_SHADOW_OFFSET), \
26			$(call cc-option, -fsanitize=kernel-address \
27			-mllvm -asan-mapping-offset=$(KASAN_SHADOW_OFFSET)))
28
29ifeq ($(strip $(CFLAGS_KASAN_SHADOW)),)
30	CFLAGS_KASAN := $(CFLAGS_KASAN_MINIMAL)
31else
32	# Now add all the compiler specific options that are valid standalone
33	CFLAGS_KASAN := $(CFLAGS_KASAN_SHADOW) \
34	 $(call cc-param,asan-globals=1) \
35	 $(call cc-param,asan-instrumentation-with-call-threshold=$(call_threshold)) \
36	 $(call cc-param,asan-stack=$(stack_enable)) \
37	 $(call cc-param,asan-instrument-allocas=1)
38endif
39
40endif # CONFIG_KASAN_GENERIC
41
42ifdef CONFIG_KASAN_SW_TAGS
43
44ifdef CONFIG_KASAN_INLINE
45    instrumentation_flags := $(call cc-param,hwasan-mapping-offset=$(KASAN_SHADOW_OFFSET))
46else
47    instrumentation_flags := $(call cc-param,hwasan-instrument-with-calls=1)
48endif
49
50CFLAGS_KASAN := -fsanitize=kernel-hwaddress \
51		$(call cc-param,hwasan-instrument-stack=$(stack_enable)) \
52		$(call cc-param,hwasan-use-short-granules=0) \
53		$(instrumentation_flags)
54
55endif # CONFIG_KASAN_SW_TAGS
56
57export CFLAGS_KASAN CFLAGS_KASAN_NOSANITIZE
58