| # SPDX-License-Identifier: GPL-2.0 |
| |
| ifdef CONFIG_CC_HAS_KASAN_MEMINTRINSIC_PREFIX |
| # Safe for compiler to generate meminstrinsic calls in uninstrumented files. |
| CFLAGS_KASAN_NOSANITIZE := |
| else |
| # Don't let compiler generate memintrinsic calls in uninstrumented files |
| # because they are instrumented. |
| CFLAGS_KASAN_NOSANITIZE := -fno-builtin |
| endif |
| |
| KASAN_SHADOW_OFFSET ?= $(CONFIG_KASAN_SHADOW_OFFSET) |
| |
| cc-param = $(call cc-option, -mllvm -$(1), $(call cc-option, --param $(1))) |
| |
| ifdef CONFIG_KASAN_STACK |
| stack_enable := 1 |
| else |
| stack_enable := 0 |
| endif |
| |
| ifdef CONFIG_KASAN_GENERIC |
| |
| ifdef CONFIG_KASAN_INLINE |
| call_threshold := 10000 |
| else |
| call_threshold := 0 |
| endif |
| |
| CFLAGS_KASAN_MINIMAL := -fsanitize=kernel-address |
| |
| # -fasan-shadow-offset fails without -fsanitize |
| CFLAGS_KASAN_SHADOW := $(call cc-option, -fsanitize=kernel-address \ |
| -fasan-shadow-offset=$(KASAN_SHADOW_OFFSET), \ |
| $(call cc-option, -fsanitize=kernel-address \ |
| -mllvm -asan-mapping-offset=$(KASAN_SHADOW_OFFSET))) |
| |
| ifeq ($(strip $(CFLAGS_KASAN_SHADOW)),) |
| CFLAGS_KASAN := $(CFLAGS_KASAN_MINIMAL) |
| else |
| # Now add all the compiler specific options that are valid standalone |
| CFLAGS_KASAN := $(CFLAGS_KASAN_SHADOW) \ |
| $(call cc-param,asan-globals=1) \ |
| $(call cc-param,asan-instrumentation-with-call-threshold=$(call_threshold)) \ |
| $(call cc-param,asan-instrument-allocas=1) |
| endif |
| |
| CFLAGS_KASAN += $(call cc-param,asan-stack=$(stack_enable)) |
| |
| # Instrument memcpy/memset/memmove calls by using instrumented __asan_mem*() |
| # instead. With compilers that don't support this option, compiler-inserted |
| # memintrinsics won't be checked by KASAN on GENERIC_ENTRY architectures. |
| CFLAGS_KASAN += $(call cc-param,asan-kernel-mem-intrinsic-prefix=1) |
| |
| endif # CONFIG_KASAN_GENERIC |
| |
| ifdef CONFIG_KASAN_SW_TAGS |
| |
| ifdef CONFIG_KASAN_INLINE |
| instrumentation_flags := $(call cc-param,hwasan-mapping-offset=$(KASAN_SHADOW_OFFSET)) |
| else |
| instrumentation_flags := $(call cc-param,hwasan-instrument-with-calls=1) |
| endif |
| |
| CFLAGS_KASAN := -fsanitize=kernel-hwaddress \ |
| $(call cc-param,hwasan-instrument-stack=$(stack_enable)) \ |
| $(call cc-param,hwasan-use-short-granules=0) \ |
| $(call cc-param,hwasan-inline-all-checks=0) \ |
| $(instrumentation_flags) |
| |
| # Instrument memcpy/memset/memmove calls by using instrumented __hwasan_mem*(). |
| ifeq ($(call clang-min-version, 150000)$(call gcc-min-version, 130000),y) |
| CFLAGS_KASAN += $(call cc-param,hwasan-kernel-mem-intrinsic-prefix=1) |
| endif |
| |
| endif # CONFIG_KASAN_SW_TAGS |
| |
| export CFLAGS_KASAN CFLAGS_KASAN_NOSANITIZE |