mirror of
https://git.hardenedbsd.org/hardenedbsd/HardenedBSD.git
synced 2024-11-22 03:04:34 +01:00
d835a2f8be
- s/santizers/sanitizers/ MFC after: 3 days
44 lines
1.6 KiB
Makefile
44 lines
1.6 KiB
Makefile
.include <bsd.opts.mk>
|
|
|
|
_use_sanitizers= no
|
|
# Add the necessary sanitizer flags if requested
|
|
.if ${MK_ASAN} == "yes" && ${NO_SHARED:Uno:tl} == "no"
|
|
SANITIZER_CFLAGS+= -fsanitize=address -fPIC
|
|
# TODO: remove this once all basic errors have been fixed:
|
|
# https://github.com/google/sanitizers/wiki/AddressSanitizer#faq
|
|
SANITIZER_CFLAGS+= -fsanitize-recover=address
|
|
SANITIZER_LDFLAGS+= -fsanitize=address
|
|
_use_sanitizers= yes
|
|
.endif # ${MK_ASAN} == "yes"
|
|
|
|
.if ${MK_UBSAN} == "yes" && ${NO_SHARED:Uno:tl} == "no"
|
|
# Unlike the other sanitizers, UBSan could also work for static libraries.
|
|
# However, this currently results in linker errors (even with the
|
|
# -fsanitize-minimal-runtime flag), so only enable it for dynamically linked
|
|
# code for now.
|
|
SANITIZER_CFLAGS+= -fsanitize=undefined
|
|
SANITIZER_CFLAGS+= -fsanitize-recover=undefined
|
|
SANITIZER_LDFLAGS+= -fsanitize=undefined
|
|
_use_sanitizers= yes
|
|
.endif # ${MK_UBSAN} == "yes"
|
|
|
|
.if !defined(BOOTSTRAPPING) && ${_use_sanitizers} != "no" && \
|
|
${COMPILER_TYPE} != "clang" && make(all)
|
|
.error Sanitizer instrumentation currently only supported with clang
|
|
.endif
|
|
|
|
# For libraries we only instrument the shared and PIE libraries by setting
|
|
# SHARED_CFLAGS instead of CFLAGS. We do this since static executables are not
|
|
# compatible with the sanitizers (interceptors do not work).
|
|
.if ${_use_sanitizers} != "no"
|
|
.include "../../lib/libclang_rt/compiler-rt-vars.mk"
|
|
.if target(__<bsd.lib.mk>__)
|
|
SHARED_CFLAGS+= ${SANITIZER_CFLAGS}
|
|
SOLINKOPTS+= ${SANITIZER_LDFLAGS}
|
|
LDFLAGS:= ${LDFLAGS:N-Wl,-no-undefined:N-Wl,--no-undefined}
|
|
.else
|
|
CFLAGS+= ${SANITIZER_CFLAGS}
|
|
LDFLAGS+= ${SANITIZER_LDFLAGS}
|
|
.endif
|
|
.endif # ${_use_sanitizers} != "no"
|