13a0682340
In function kasan_set_poison: { ... while (size--) { p[size] = value; } } This will optimize to 'memset' function when compile option > O2. But the memset must be instrument by kasan, so there is recursive Signed-off-by: ligd <liguiding1@xiaomi.com>
54 lines
1.5 KiB
Plaintext
54 lines
1.5 KiB
Plaintext
############################################################################
|
|
# mm/kasan/Make.defs
|
|
#
|
|
# SPDX-License-Identifier: Apache-2.0
|
|
#
|
|
# Licensed to the Apache Software Foundation (ASF) under one or more
|
|
# contributor license agreements. See the NOTICE file distributed with
|
|
# this work for additional information regarding copyright ownership. The
|
|
# ASF licenses this file to you under the Apache License, Version 2.0 (the
|
|
# "License"); you may not use this file except in compliance with the
|
|
# License. You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
#
|
|
############################################################################
|
|
|
|
CSRCS += hook.c
|
|
|
|
ifeq ($(CONFIG_MM_KASAN),y)
|
|
|
|
ifeq ($(CONFIG_ARCH_TOOLCHAIN_GNU),y)
|
|
|
|
ifeq ($(CONFIG_MM_KASAN_GENERIC),y)
|
|
CSRCS += generic.c
|
|
CFLAGS += -fno-sanitize=kernel-address
|
|
endif
|
|
|
|
ifeq ($(CONFIG_MM_KASAN_SW_TAGS),y)
|
|
CSRCS += sw_tags.c
|
|
CFLAGS += -fno-sanitize=kernel-hwaddress
|
|
endif
|
|
|
|
ifeq ($(CONFIG_LTO_NONE),n)
|
|
CFLAGS += -fno-lto
|
|
endif
|
|
|
|
endif
|
|
endif
|
|
|
|
CFLAGS += -fno-builtin
|
|
|
|
# Add the core heap directory to the build
|
|
|
|
DEPPATH += --dep-path kasan
|
|
VPATH += :kasan
|
|
|
|
|