Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp1504780ybg; Tue, 2 Jun 2020 11:47:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyVgTwelrlnplxB1yoOKo98EJuJiH4pooy1XprnTa86AMYC/bv0Xl6vIhhK4hcUw+FzeRRD X-Received: by 2002:aa7:c2ca:: with SMTP id m10mr9037914edp.221.1591123644660; Tue, 02 Jun 2020 11:47:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591123644; cv=none; d=google.com; s=arc-20160816; b=P1BN1UhH/4r845/JrEOdaZkXtR+BxcQ6LW49K6yoJAKduOZZrPITvOJDRCYOGZKyO/ pcBSuCJ1HfDms9IxaBCoQsq2Id+r17vBDCcq0tMhdm/4Ggexhxe5grH/8y2bRearRc32 rIFHaq9ag7XVVETTZREsdVJCD1mofFeblqoW4p15aUm6W6UsrLGAPduR4yw/UXeuQhaG qR+kLN4v+AzICo6F922uCCbjSrnYS36LxD9EkPdAL42nk4bhBEbF1yOsRO7/z552/RML pmB4pJmIpgvEZH44XtHbtr21SXZOmIg2V2axjcavnMFxQepfD8oJKlrHmw4NeuX4Hbnt +SLw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:from:subject:mime-version :message-id:date:dkim-signature; bh=051VEaYf6qrL8JFuh/5zzz3L2mMvFIzQDHhJf0eGSZs=; b=Tb3qUYoN/ZkSzNiVbqVwrPdRWHawrXJJEasg7ROH5tCXTWmyGy7Ue90lvIkx4xzAk1 Mqz6Fa4VRwJxYi0torIIzJ3Ak3IRXp8SnBJLJXxsfBCx4JFieVgj/vKeU2UG6xNe3whi zoZajArYSIO2mUzgVTxX/jzb9lf40GUAZI5JgekSC2DYfeu9WS7V00Ie/0/UncodAhCj 3Nzs5IIw2N4tj9iGbr/5Un5FqGVcYWEVQ9yLZWx1U5dVx4r2w0SKpXmPC02zQyiqLHW1 LRB7l3p0l9ncwxTbzE39rDYqQPLGO1XUrZHJ7a0jXO3K8mPHU6kPLNKMabJWe0k5n19v V49g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Bo8SJMR+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id oe24si1870803ejb.598.2020.06.02.11.47.00; Tue, 02 Jun 2020 11:47:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Bo8SJMR+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726875AbgFBSoQ (ORCPT + 99 others); Tue, 2 Jun 2020 14:44:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42266 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726000AbgFBSoP (ORCPT ); Tue, 2 Jun 2020 14:44:15 -0400 Received: from mail-yb1-xb49.google.com (mail-yb1-xb49.google.com [IPv6:2607:f8b0:4864:20::b49]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5357EC08C5C0 for ; Tue, 2 Jun 2020 11:44:14 -0700 (PDT) Received: by mail-yb1-xb49.google.com with SMTP id k186so18241876ybc.19 for ; Tue, 02 Jun 2020 11:44:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:message-id:mime-version:subject:from:to:cc; bh=051VEaYf6qrL8JFuh/5zzz3L2mMvFIzQDHhJf0eGSZs=; b=Bo8SJMR+1yrygCRvaywJimf7JrrVS59Dt2LCUT2K8JVmIhbzQ7yVZJMM6nQZ0E+EAW fQZf3M2jxFgcgHfb1c66JQFO59GSOnCmiRXJjzLccRbxBNZetMr0c1Ozo147m94PPhb3 Zoy2pYqc5wUAeBd/OJ/i+p/HdNh9f2P4oqOBmR4APfazA7ImZPSD/itREUPQrFciTvxh PC9SZCDTMtxb3oYCQnroUCnOhigQ+1vvm+rc3X8WNVAocWFa24rNe1c5OfeTFjYO1Upd v8edIf8wkgkVJlxiTFodSw/TbRwmYgcB83nd42BOJgdU4Im13V3J1IwUc0+qLTF2LVpV mmIg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:message-id:mime-version:subject:from:to:cc; bh=051VEaYf6qrL8JFuh/5zzz3L2mMvFIzQDHhJf0eGSZs=; b=qB+WzYKGGrmCjTCtMb249NejOYl66IoJNpjNFiBxyKdPHftdRJUjoeWTQ3yHy6wp47 EsMFMG9PZEui5qevsVv97NHET9jM3ERV49dOJLAXISP0/MZj4t8+d2O4p+yB71SAd9EL 15w5VLTTDTgFD7ygeJxt/5H2ZloLfAdL98p0QejtM/cngPH0PsaMLfJ+5l0RY9wr8/6b Q2hqv9agscR6opGRFKfeCB8mt3jjrdaAWgu6IWkfOu+un/vii3/FkNU6A0EMmAme3TYo XwQkGRAXRb05JbSsggtosJBkJE01dR3jp4jgsophUuImxK0nyEbgVOAGZDxj9s+yEhqV Q0RQ== X-Gm-Message-State: AOAM531Qyd4Utaj40NOFGPBC9PP5ZQexHf84YcF4NpOZEHS9PDnhG9fn S9UDqWZktfv+8ADU1gV8gSFq+sVK4w== X-Received: by 2002:a25:c606:: with SMTP id k6mr31464032ybf.10.1591123453516; Tue, 02 Jun 2020 11:44:13 -0700 (PDT) Date: Tue, 2 Jun 2020 20:44:08 +0200 Message-Id: <20200602184409.22142-1-elver@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.27.0.rc2.251.g90737beb825-goog Subject: [PATCH -tip 1/2] Kconfig: Bump required compiler version of KASAN and UBSAN From: Marco Elver To: elver@google.com Cc: will@kernel.org, peterz@infradead.org, bp@alien8.de, tglx@linutronix.de, mingo@kernel.org, clang-built-linux@googlegroups.com, paulmck@kernel.org, dvyukov@google.com, glider@google.com, andreyknvl@google.com, kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Adds config variable CC_HAS_WORKING_NOSANITIZE, which will be true if we have a compiler that does not fail builds due to no_sanitize functions. This does not yet mean they work as intended, but for automated build-tests, this is the minimum requirement. For example, we require that __always_inline functions used from no_sanitize functions do not generate instrumentation. On GCC <= 7 this fails to build entirely, therefore we make the minimum version GCC 8. For KCSAN this is a non-functional change, however, we should add it in case this variable changes in future. Link: https://lkml.kernel.org/r/20200602175859.GC2604@hirez.programming.kicks-ass.net Suggested-by: Peter Zijlstra Signed-off-by: Marco Elver --- Apply after: https://lkml.kernel.org/r/20200602173103.931412766@infradead.org --- init/Kconfig | 3 +++ lib/Kconfig.kasan | 1 + lib/Kconfig.kcsan | 1 + lib/Kconfig.ubsan | 1 + 4 files changed, 6 insertions(+) diff --git a/init/Kconfig b/init/Kconfig index 0f72eb4ffc87..3e8565bc8376 100644 --- a/init/Kconfig +++ b/init/Kconfig @@ -39,6 +39,9 @@ config TOOLS_SUPPORT_RELR config CC_HAS_ASM_INLINE def_bool $(success,echo 'void foo(void) { asm inline (""); }' | $(CC) -x c - -c -o /dev/null) +config CC_HAS_WORKING_NOSANITIZE + def_bool !CC_IS_GCC || GCC_VERSION >= 80000 + config CONSTRUCTORS bool depends on !UML diff --git a/lib/Kconfig.kasan b/lib/Kconfig.kasan index 81f5464ea9e1..15e6c4b26a40 100644 --- a/lib/Kconfig.kasan +++ b/lib/Kconfig.kasan @@ -20,6 +20,7 @@ config KASAN depends on (HAVE_ARCH_KASAN && CC_HAS_KASAN_GENERIC) || \ (HAVE_ARCH_KASAN_SW_TAGS && CC_HAS_KASAN_SW_TAGS) depends on (SLUB && SYSFS) || (SLAB && !DEBUG_SLAB) + depends on CC_HAS_WORKING_NOSANITIZE help Enables KASAN (KernelAddressSANitizer) - runtime memory debugger, designed to find out-of-bounds accesses and use-after-free bugs. diff --git a/lib/Kconfig.kcsan b/lib/Kconfig.kcsan index 5ee88e5119c2..2ab4a7f511c9 100644 --- a/lib/Kconfig.kcsan +++ b/lib/Kconfig.kcsan @@ -5,6 +5,7 @@ config HAVE_ARCH_KCSAN config HAVE_KCSAN_COMPILER def_bool CC_IS_CLANG && $(cc-option,-fsanitize=thread -mllvm -tsan-distinguish-volatile=1) + depends on CC_HAS_WORKING_NOSANITIZE help For the list of compilers that support KCSAN, please see . diff --git a/lib/Kconfig.ubsan b/lib/Kconfig.ubsan index a5ba2fd51823..f725d126af7d 100644 --- a/lib/Kconfig.ubsan +++ b/lib/Kconfig.ubsan @@ -4,6 +4,7 @@ config ARCH_HAS_UBSAN_SANITIZE_ALL menuconfig UBSAN bool "Undefined behaviour sanity checker" + depends on CC_HAS_WORKING_NOSANITIZE help This option enables the Undefined Behaviour sanity checker. Compile-time instrumentation is used to detect various undefined -- 2.27.0.rc2.251.g90737beb825-goog