These two patches add SANITIZE_xx.o and SANITIZE to disable all sanitizers for specific files, and apply them to x86 booting code. We need to disable UBSAN for some of ealy stage code: o For code which could operate in one-one mapping mode. In this case, kernel would crash at accessing data parameter when invoking UBSAN handlers. o Since UBSAN handlers are instrumented by KASAN, so invoking UBSAN handlers before KASAN is initiated also is not allowed. Changbin Du (2): sanitize: Add SANITIZE_xx.o and SANITIZE to disable all sanitizers for specific files x86: Disable both KASAN and UBSAN for some booting code Documentation/dev-tools/kasan.rst | 12 ++++++++++++ arch/x86/boot/Makefile | 2 +- arch/x86/boot/compressed/Makefile | 2 +- arch/x86/entry/vdso/Makefile | 3 +-- arch/x86/kernel/Makefile | 10 +++++----- arch/x86/lib/Makefile | 2 +- arch/x86/mm/Makefile | 4 ++-- arch/x86/realmode/Makefile | 2 +- arch/x86/realmode/rm/Makefile | 2 +- scripts/Makefile.lib | 4 ++-- 10 files changed, 27 insertions(+), 16 deletions(-) -- 2.24.0