xref: /openbmc/linux/scripts/Makefile.kasan (revision 65844828)
1# SPDX-License-Identifier: GPL-2.0
2CFLAGS_KASAN_NOSANITIZE := -fno-builtin
3KASAN_SHADOW_OFFSET ?= $(CONFIG_KASAN_SHADOW_OFFSET)
4
5cc-param = $(call cc-option, -mllvm -$(1), $(call cc-option, --param $(1)))
6
7ifdef CONFIG_KASAN_STACK
8	stack_enable := 1
9else
10	stack_enable := 0
11endif
12
13ifdef CONFIG_KASAN_GENERIC
14
15ifdef CONFIG_KASAN_INLINE
16	call_threshold := 10000
17else
18	call_threshold := 0
19endif
20
21CFLAGS_KASAN_MINIMAL := -fsanitize=kernel-address
22
23# -fasan-shadow-offset fails without -fsanitize
24CFLAGS_KASAN_SHADOW := $(call cc-option, -fsanitize=kernel-address \
25			-fasan-shadow-offset=$(KASAN_SHADOW_OFFSET), \
26			$(call cc-option, -fsanitize=kernel-address \
27			-mllvm -asan-mapping-offset=$(KASAN_SHADOW_OFFSET)))
28
29ifeq ($(strip $(CFLAGS_KASAN_SHADOW)),)
30	CFLAGS_KASAN := $(CFLAGS_KASAN_MINIMAL)
31else
32	# Now add all the compiler specific options that are valid standalone
33	CFLAGS_KASAN := $(CFLAGS_KASAN_SHADOW) \
34	 $(call cc-param,asan-globals=1) \
35	 $(call cc-param,asan-instrumentation-with-call-threshold=$(call_threshold)) \
36	 $(call cc-param,asan-instrument-allocas=1)
37endif
38
39CFLAGS_KASAN += $(call cc-param,asan-stack=$(stack_enable))
40
41endif # CONFIG_KASAN_GENERIC
42
43ifdef CONFIG_KASAN_SW_TAGS
44
45ifdef CONFIG_KASAN_INLINE
46    instrumentation_flags := $(call cc-param,hwasan-mapping-offset=$(KASAN_SHADOW_OFFSET))
47else
48    instrumentation_flags := $(call cc-param,hwasan-instrument-with-calls=1)
49endif
50
51CFLAGS_KASAN := -fsanitize=kernel-hwaddress \
52		$(call cc-param,hwasan-instrument-stack=$(stack_enable)) \
53		$(call cc-param,hwasan-use-short-granules=0) \
54		$(call cc-param,hwasan-inline-all-checks=0) \
55		$(instrumentation_flags)
56
57endif # CONFIG_KASAN_SW_TAGS
58
59export CFLAGS_KASAN CFLAGS_KASAN_NOSANITIZE
60