diff options
author | Peter Zijlstra | 2020-03-05 14:01:25 +0100 |
---|---|---|
committer | Thomas Gleixner | 2020-06-11 15:14:35 +0200 |
commit | 20355e5f73a75e58cee4c80d4cd92ce0d1628023 (patch) | |
tree | c08a32723df6269d808ca1432fa16716b5fba149 | |
parent | 44d7e4fbc08eca153ea4b436a1440639dff2c771 (diff) |
x86/entry: Exclude low level entry code from sanitizing
The sanitizers are not really applicable to the fragile low level entry
code. Entry code needs to carefully setup a normal 'runtime' environment.
Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org>
Signed-off-by: Thomas Gleixner <tglx@linutronix.de>
Reviewed-by: Alexandre Chartre <alexandre.chartre@oracle.com>
Link: https://lkml.kernel.org/r/20200505134059.970057117@linutronix.de
-rw-r--r-- | arch/x86/entry/Makefile | 8 |
1 files changed, 8 insertions, 0 deletions
diff --git a/arch/x86/entry/Makefile b/arch/x86/entry/Makefile index 85eb381259c2..cdf45ff92dc8 100644 --- a/arch/x86/entry/Makefile +++ b/arch/x86/entry/Makefile @@ -3,6 +3,14 @@ # Makefile for the x86 low level entry code # +KASAN_SANITIZE := n +UBSAN_SANITIZE := n +KCOV_INSTRUMENT := n + +CFLAGS_REMOVE_common.o = $(CC_FLAGS_FTRACE) -fstack-protector -fstack-protector-strong +CFLAGS_REMOVE_syscall_32.o = $(CC_FLAGS_FTRACE) -fstack-protector -fstack-protector-strong +CFLAGS_REMOVE_syscall_64.o = $(CC_FLAGS_FTRACE) -fstack-protector -fstack-protector-strong + OBJECT_FILES_NON_STANDARD_entry_64_compat.o := y CFLAGS_syscall_64.o += $(call cc-option,-Wno-override-init,) |