Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp1510268ybg; Tue, 2 Jun 2020 11:57:55 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzYrOSYWUUTax4y5kAHPehlk8Kf6eqOPEGR12onbSDO1a1BaBhYUd/Ry352aQkgxXIQihJ9 X-Received: by 2002:a50:e44d:: with SMTP id e13mr27043320edm.373.1591124275042; Tue, 02 Jun 2020 11:57:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591124275; cv=none; d=google.com; s=arc-20160816; b=Jja9+zGSSx8UF3yu+oZr+9mnGWcXNL95LCK0Yb+tb8mfviOUCTYxAOnFmZEL3ZY7bm BWu9NLxs0LoVetsM+g49fVvR8oLMGvwP235hESBMfCMgfsi+sfe2GT6P6XdRgy4dF9Kc 3hoXlAj+f+x9i0L/1sx34CI1S/M5IseRGKBYxEXUXkWjfnwdTjPp7pieVPu6dA87OTz1 Y5tBTU4k/+1AiQIHfrrdEvGPqwRwul2kKOkJw8qrkpIdxTRHzeFyz5gCkKA++8IPrxuB fFqGuTNmlVIyvswL38Ka3uHLlRaP54W0XzxFUexr4XeNJOxs+tzdU/Z/DLgO3Oudgxsg yHZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=lcbY1VrV57GqPoFo7ptDB2znFdFUv0Mj9KOWNzaUW2E=; b=E9iI8IUkrModpCSfrq+vLzRKbCzLyttufHkTOS8Ovog34XurDl9FurprlZyWq7fmMy smtcCmHIGiTS+pcqYtIpTVuG2PUDA1olay4js8tZWehQ10VGjbeeI38Y5ap9HMyRdXAN djqL/JVs7lZZY4XTSzgnKzRwACDw+Jf12HlKs/7VJoq28WhPlcmN6XrF/M4+RyELmGGt F/EkHssMBvYtZFQLB4A3O7xKXBJnCQHTjqUFGKxukHzyWc9/L3Vfalk9rLGoBNOb+z5v W/KnfpH8eH0F6G8/thCxpK5jWQTq3ReF1kJGRg21fpm4Wb2pTTqegSIpb/qgEzZTIbSA 1RDA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=iY81CrGf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ce20si2178795edb.478.2020.06.02.11.57.29; Tue, 02 Jun 2020 11:57:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=iY81CrGf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726625AbgFBSxc (ORCPT + 99 others); Tue, 2 Jun 2020 14:53:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43704 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726139AbgFBSxc (ORCPT ); Tue, 2 Jun 2020 14:53:32 -0400 Received: from mail-pj1-x1043.google.com (mail-pj1-x1043.google.com [IPv6:2607:f8b0:4864:20::1043]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id D11B7C08C5C0 for ; Tue, 2 Jun 2020 11:53:31 -0700 (PDT) Received: by mail-pj1-x1043.google.com with SMTP id k2so1873281pjs.2 for ; Tue, 02 Jun 2020 11:53:31 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=lcbY1VrV57GqPoFo7ptDB2znFdFUv0Mj9KOWNzaUW2E=; b=iY81CrGfmojXqpZOwyWc5FJulkMA+MB1PD+DNvpbGMwLjk7EYSts9ax8jyweSuxnOg L1+M2+C3ihJ82bHBfyap8X7f3NG70bmLnsr8DMinGcXbaH0O5E9eF/m3NsmINlBfIdTX AGWgLaj3tjCGuDPCnVzA0fSIvFfH/n/9TFFtMaJAPlTkWQJySbKn6dJ+ejCxuClfTIhf 04dpsphQqr8AXP2CIoyfADPkQvuHgQBIvZDx6WWLohI8DG5Q8xx+oh18PBRXNHspMMhB 5E49XHTWn7hBb/IFXbQzOASEnpD2TMwhBzXf7Rkdp1KgmtTfH6Haq0y+J3dO0L0Ngj5U tzhA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=lcbY1VrV57GqPoFo7ptDB2znFdFUv0Mj9KOWNzaUW2E=; b=XuphZP3/Tmy7YCiCF3npuM7Tbu00KySM51Vwgycyhes9kYzvlCSpMbOyTp4IVInRy9 k0DR/MKP6l6xfEmbc69csboxybBf7Hx0lfQ7JsQ2R0Vfnve8h/vkkkfjc7B/a15Ws4Hq JoKd3dRHEsiTopXvDDOcW8UA82LHq/4s2YSrK30L8QtJxf8y4rBG3dHP8gFZzwiIY46E OAByNIoIHJEOkXTRKhhEI2I7mY7avUNd5NSHxp7rKUvdljpsafISQazQYAUzTZ58AsLU VsJvR7hrIWQekwQObMfPMxAw6KZFMHm7bZGLEJc4oM2bR0hRstMHMgVmPDFUXGm+34qu ko/w== X-Gm-Message-State: AOAM533XOSSJtELIgSGnROA6TFTKKQDuUBAPoHT/oHqAFR6VG/zZL7Ii 8aYo4PaqJaE1V38GVbggrLbtBFkHqyQp3kPww9EGqw== X-Received: by 2002:a17:90a:2a8e:: with SMTP id j14mr627704pjd.136.1591124010835; Tue, 02 Jun 2020 11:53:30 -0700 (PDT) MIME-Version: 1.0 References: <20200602184409.22142-1-elver@google.com> In-Reply-To: <20200602184409.22142-1-elver@google.com> From: Andrey Konovalov Date: Tue, 2 Jun 2020 20:53:19 +0200 Message-ID: Subject: Re: [PATCH -tip 1/2] Kconfig: Bump required compiler version of KASAN and UBSAN To: Marco Elver Cc: Will Deacon , Peter Zijlstra , Borislav Petkov , Thomas Gleixner , Ingo Molnar , clang-built-linux , "Paul E . McKenney" , Dmitry Vyukov , Alexander Potapenko , kasan-dev , LKML Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jun 2, 2020 at 8:44 PM Marco Elver wrote: > > Adds config variable CC_HAS_WORKING_NOSANITIZE, which will be true if we > have a compiler that does not fail builds due to no_sanitize functions. > This does not yet mean they work as intended, but for automated > build-tests, this is the minimum requirement. > > For example, we require that __always_inline functions used from > no_sanitize functions do not generate instrumentation. On GCC <= 7 this > fails to build entirely, therefore we make the minimum version GCC 8. Could you also update KASAN docs to mention this requirement? As a separate patch or in v2, up to you. > > For KCSAN this is a non-functional change, however, we should add it in > case this variable changes in future. > > Link: https://lkml.kernel.org/r/20200602175859.GC2604@hirez.programming.kicks-ass.net > Suggested-by: Peter Zijlstra > Signed-off-by: Marco Elver > --- > Apply after: > https://lkml.kernel.org/r/20200602173103.931412766@infradead.org > --- > init/Kconfig | 3 +++ > lib/Kconfig.kasan | 1 + > lib/Kconfig.kcsan | 1 + > lib/Kconfig.ubsan | 1 + > 4 files changed, 6 insertions(+) > > diff --git a/init/Kconfig b/init/Kconfig > index 0f72eb4ffc87..3e8565bc8376 100644 > --- a/init/Kconfig > +++ b/init/Kconfig > @@ -39,6 +39,9 @@ config TOOLS_SUPPORT_RELR > config CC_HAS_ASM_INLINE > def_bool $(success,echo 'void foo(void) { asm inline (""); }' | $(CC) -x c - -c -o /dev/null) > > +config CC_HAS_WORKING_NOSANITIZE > + def_bool !CC_IS_GCC || GCC_VERSION >= 80000 > + > config CONSTRUCTORS > bool > depends on !UML > diff --git a/lib/Kconfig.kasan b/lib/Kconfig.kasan > index 81f5464ea9e1..15e6c4b26a40 100644 > --- a/lib/Kconfig.kasan > +++ b/lib/Kconfig.kasan > @@ -20,6 +20,7 @@ config KASAN > depends on (HAVE_ARCH_KASAN && CC_HAS_KASAN_GENERIC) || \ > (HAVE_ARCH_KASAN_SW_TAGS && CC_HAS_KASAN_SW_TAGS) > depends on (SLUB && SYSFS) || (SLAB && !DEBUG_SLAB) > + depends on CC_HAS_WORKING_NOSANITIZE > help > Enables KASAN (KernelAddressSANitizer) - runtime memory debugger, > designed to find out-of-bounds accesses and use-after-free bugs. > diff --git a/lib/Kconfig.kcsan b/lib/Kconfig.kcsan > index 5ee88e5119c2..2ab4a7f511c9 100644 > --- a/lib/Kconfig.kcsan > +++ b/lib/Kconfig.kcsan > @@ -5,6 +5,7 @@ config HAVE_ARCH_KCSAN > > config HAVE_KCSAN_COMPILER > def_bool CC_IS_CLANG && $(cc-option,-fsanitize=thread -mllvm -tsan-distinguish-volatile=1) > + depends on CC_HAS_WORKING_NOSANITIZE > help > For the list of compilers that support KCSAN, please see > . > diff --git a/lib/Kconfig.ubsan b/lib/Kconfig.ubsan > index a5ba2fd51823..f725d126af7d 100644 > --- a/lib/Kconfig.ubsan > +++ b/lib/Kconfig.ubsan > @@ -4,6 +4,7 @@ config ARCH_HAS_UBSAN_SANITIZE_ALL > > menuconfig UBSAN > bool "Undefined behaviour sanity checker" > + depends on CC_HAS_WORKING_NOSANITIZE > help > This option enables the Undefined Behaviour sanity checker. > Compile-time instrumentation is used to detect various undefined > -- > 2.27.0.rc2.251.g90737beb825-goog >