HardenedBSD/share/mk/bsd.sanitizer.mk
Gordon Bergling d835a2f8be bsd.sanitizer.mk: Fix a typo in a comment
- s/santizers/sanitizers/

MFC after:	3 days
2022-11-01 09:18:34 +01:00

44 lines
1.6 KiB
Makefile

.include <bsd.opts.mk>
_use_sanitizers= no
# Add the necessary sanitizer flags if requested
.if ${MK_ASAN} == "yes" && ${NO_SHARED:Uno:tl} == "no"
SANITIZER_CFLAGS+= -fsanitize=address -fPIC
# TODO: remove this once all basic errors have been fixed:
# https://github.com/google/sanitizers/wiki/AddressSanitizer#faq
SANITIZER_CFLAGS+= -fsanitize-recover=address
SANITIZER_LDFLAGS+= -fsanitize=address
_use_sanitizers= yes
.endif # ${MK_ASAN} == "yes"
.if ${MK_UBSAN} == "yes" && ${NO_SHARED:Uno:tl} == "no"
# Unlike the other sanitizers, UBSan could also work for static libraries.
# However, this currently results in linker errors (even with the
# -fsanitize-minimal-runtime flag), so only enable it for dynamically linked
# code for now.
SANITIZER_CFLAGS+= -fsanitize=undefined
SANITIZER_CFLAGS+= -fsanitize-recover=undefined
SANITIZER_LDFLAGS+= -fsanitize=undefined
_use_sanitizers= yes
.endif # ${MK_UBSAN} == "yes"
.if !defined(BOOTSTRAPPING) && ${_use_sanitizers} != "no" && \
${COMPILER_TYPE} != "clang" && make(all)
.error Sanitizer instrumentation currently only supported with clang
.endif
# For libraries we only instrument the shared and PIE libraries by setting
# SHARED_CFLAGS instead of CFLAGS. We do this since static executables are not
# compatible with the sanitizers (interceptors do not work).
.if ${_use_sanitizers} != "no"
.include "../../lib/libclang_rt/compiler-rt-vars.mk"
.if target(__<bsd.lib.mk>__)
SHARED_CFLAGS+= ${SANITIZER_CFLAGS}
SOLINKOPTS+= ${SANITIZER_LDFLAGS}
LDFLAGS:= ${LDFLAGS:N-Wl,-no-undefined:N-Wl,--no-undefined}
.else
CFLAGS+= ${SANITIZER_CFLAGS}
LDFLAGS+= ${SANITIZER_LDFLAGS}
.endif
.endif # ${_use_sanitizers} != "no"