Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp1511541ybg; Tue, 2 Jun 2020 12:00:15 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyQXatvvfgeqIkcaOlOkrQt09Ca6dCOa+o9FzND3rbpKkh3ujInJioNh1QY9QFEZ4Rfjm9G X-Received: by 2002:a17:906:6a92:: with SMTP id p18mr24352657ejr.233.1591124415456; Tue, 02 Jun 2020 12:00:15 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591124415; cv=none; d=google.com; s=arc-20160816; b=ZQb/G3sY3RaRz6HohwfLbaySe7FKn7nfPD3Nlr6Z+klOJsf3gcDQrv2UV0ZDoaDFpU 9QfDq6joKQko1oNu6EWfBsnRsqWkRg8XjHZGm4nZy31fQe11DpbZZKrz2VTib2HSWo/H i6sAgeHhHw0rbStvNLXlqHFwrWvNZMNPLZAqmzyYY1lwxPCfzVN69C1g7WEMdVMzUojI w/o156IIHJ0u2cY+gL3ZQD+hGkrvZBPcFKfNZSzewHDU0zcjAjLUgbbDsbFU+npMF5Au BLJ7+HVh9GfJ3G3jqC8+HmrPfilNvuCTyc4VFOIj2/Re55UZ6BnkidBZyjZWNz4gbydn e8FA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=NBeXDiXpaNYSmdLg+CEOi/2SkM043Ho1hEbW/kRa2lU=; b=ZQ0ON3LrLPumvBT3QEE0Df/sLUVf252jUJk3JzodIvF7S6ptko9trc6j3Gi7zENP+G F8TbQWnK5IdlUdYs91ddsVfV6jO3xYqBcYvmu1MJ5fCiPCbv7HeeXibFhtCLV+1V1nA2 PI5ja4JZutTcqDGXkSp73jqOuTyfwWLM+eGiOMUOQH8iwyYqSm58986pRQfW5QdaPySV BxyZCXHhTlU9KBKi+AVsI4f/hrCVMXytbFs5BGNFtgWX/PY9J4P0xjcAPAr6YREpLEjq PUizCaUyAzR3nz4G4sWKX/SN96vP0NHkgSbb9NEodZJagP80yurCMzi+1lLBTZhdzRtd yuMQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=IZTwU0Bw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o9si2225903edz.261.2020.06.02.11.59.52; Tue, 02 Jun 2020 12:00:15 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=IZTwU0Bw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727795AbgFBS51 (ORCPT + 99 others); Tue, 2 Jun 2020 14:57:27 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44302 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726223AbgFBS51 (ORCPT ); Tue, 2 Jun 2020 14:57:27 -0400 Received: from mail-pg1-x544.google.com (mail-pg1-x544.google.com [IPv6:2607:f8b0:4864:20::544]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 55A92C08C5C0 for ; Tue, 2 Jun 2020 11:57:27 -0700 (PDT) Received: by mail-pg1-x544.google.com with SMTP id r10so5509812pgv.8 for ; Tue, 02 Jun 2020 11:57:27 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=NBeXDiXpaNYSmdLg+CEOi/2SkM043Ho1hEbW/kRa2lU=; b=IZTwU0Bw0+6fSqRCv9Rb1hqZukeW0A2CInQU+QYtnhyF1FAVac4O0yQM/pIpj/D/QY Xb0giNjIoUl84sIu2MIZGSYm9j/hXtkTet9KUmat8ZzBCX9UWJCBccVSEQ5qsYyTcrEb VZIrDp0CpLW/RfWYmgTHbQLaUn4Nm2ItOpsejrGP1ApXi1a03KODEgCxoD4PwIPtU2Rt oSYdWzl5vLYs8TqE/SvPHJBZuNHfJv9KtMrToXzBs1HbGBH1bWSdEpieEeWAYl+dkWdD 1izyx4zjkDbMKf0J/+mNVTL9AgnrrvwGKVl4dx2pmGF2VK4RGOr02U9jCcUhwaNzV/oV T+qw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=NBeXDiXpaNYSmdLg+CEOi/2SkM043Ho1hEbW/kRa2lU=; b=Y4cHpd2USg78+6joE3QGfr9z7M6eAflssLJBlfwLvfQcnjg27VDUiRCy5FQ3IcWfV4 kh3XIhni0Coz125LW7/zM4S/Y+o5YsJ3hKHf5T///En9INFz0MrZb812xBGhStPYp5Et o17atP6hCQwKM9LcY1ToYZry3ooRw90g6K/tVIuhfrPydGSaiepjawxIsIiqJ+kN1Ze7 mzmRn1dFJOZ+7EHu1JegTuiy7m21qOzTdS+uHF7KKTbqQFjUhjFFXslLu73CEwvYLCH1 rNR8V9f0ny98XmR/+jE4si8jzUXrsfECAvyLv2vTMsULCWtdySeNrqLE8PRccI3H2ZwA TvXw== X-Gm-Message-State: AOAM533HhoC3y6eFp2yk2+fY3GZ6QJ96bxG+uLpqoBi0urjIkWx2ZtQt /7oTYlxVFVs6Vow6jtKmnH9eM02T7A1tW+Jx2ISNHg== X-Received: by 2002:a63:5644:: with SMTP id g4mr24385954pgm.381.1591124246486; Tue, 02 Jun 2020 11:57:26 -0700 (PDT) MIME-Version: 1.0 References: <20200602184409.22142-1-elver@google.com> In-Reply-To: <20200602184409.22142-1-elver@google.com> From: Nick Desaulniers Date: Tue, 2 Jun 2020 11:57:15 -0700 Message-ID: Subject: Re: [PATCH -tip 1/2] Kconfig: Bump required compiler version of KASAN and UBSAN To: Marco Elver Cc: Will Deacon , Peter Zijlstra , Borislav Petkov , Thomas Gleixner , Ingo Molnar , clang-built-linux , "Paul E. McKenney" , Dmitry Vyukov , Alexander Potapenko , Andrey Konovalov , kasan-dev , LKML Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jun 2, 2020 at 11:44 AM 'Marco Elver' via Clang Built Linux wrote: > > Adds config variable CC_HAS_WORKING_NOSANITIZE, which will be true if we > have a compiler that does not fail builds due to no_sanitize functions. > This does not yet mean they work as intended, but for automated > build-tests, this is the minimum requirement. > > For example, we require that __always_inline functions used from > no_sanitize functions do not generate instrumentation. On GCC <= 7 this > fails to build entirely, therefore we make the minimum version GCC 8. > > For KCSAN this is a non-functional change, however, we should add it in > case this variable changes in future. > > Link: https://lkml.kernel.org/r/20200602175859.GC2604@hirez.programming.kicks-ass.net > Suggested-by: Peter Zijlstra > Signed-off-by: Marco Elver Is this a problem only for x86? If so, that's quite a jump in minimal compiler versions for a feature that I don't think is currently problematic for other architectures? (Based on https://lore.kernel.org/lkml/20200529171104.GD706518@hirez.programming.kicks-ass.net/ ) > --- > Apply after: > https://lkml.kernel.org/r/20200602173103.931412766@infradead.org > --- > init/Kconfig | 3 +++ > lib/Kconfig.kasan | 1 + > lib/Kconfig.kcsan | 1 + > lib/Kconfig.ubsan | 1 + > 4 files changed, 6 insertions(+) > > diff --git a/init/Kconfig b/init/Kconfig > index 0f72eb4ffc87..3e8565bc8376 100644 > --- a/init/Kconfig > +++ b/init/Kconfig > @@ -39,6 +39,9 @@ config TOOLS_SUPPORT_RELR > config CC_HAS_ASM_INLINE > def_bool $(success,echo 'void foo(void) { asm inline (""); }' | $(CC) -x c - -c -o /dev/null) > > +config CC_HAS_WORKING_NOSANITIZE > + def_bool !CC_IS_GCC || GCC_VERSION >= 80000 > + > config CONSTRUCTORS > bool > depends on !UML > diff --git a/lib/Kconfig.kasan b/lib/Kconfig.kasan > index 81f5464ea9e1..15e6c4b26a40 100644 > --- a/lib/Kconfig.kasan > +++ b/lib/Kconfig.kasan > @@ -20,6 +20,7 @@ config KASAN > depends on (HAVE_ARCH_KASAN && CC_HAS_KASAN_GENERIC) || \ > (HAVE_ARCH_KASAN_SW_TAGS && CC_HAS_KASAN_SW_TAGS) > depends on (SLUB && SYSFS) || (SLAB && !DEBUG_SLAB) > + depends on CC_HAS_WORKING_NOSANITIZE > help > Enables KASAN (KernelAddressSANitizer) - runtime memory debugger, > designed to find out-of-bounds accesses and use-after-free bugs. > diff --git a/lib/Kconfig.kcsan b/lib/Kconfig.kcsan > index 5ee88e5119c2..2ab4a7f511c9 100644 > --- a/lib/Kconfig.kcsan > +++ b/lib/Kconfig.kcsan > @@ -5,6 +5,7 @@ config HAVE_ARCH_KCSAN > > config HAVE_KCSAN_COMPILER > def_bool CC_IS_CLANG && $(cc-option,-fsanitize=thread -mllvm -tsan-distinguish-volatile=1) > + depends on CC_HAS_WORKING_NOSANITIZE > help > For the list of compilers that support KCSAN, please see > . > diff --git a/lib/Kconfig.ubsan b/lib/Kconfig.ubsan > index a5ba2fd51823..f725d126af7d 100644 > --- a/lib/Kconfig.ubsan > +++ b/lib/Kconfig.ubsan > @@ -4,6 +4,7 @@ config ARCH_HAS_UBSAN_SANITIZE_ALL > > menuconfig UBSAN > bool "Undefined behaviour sanity checker" > + depends on CC_HAS_WORKING_NOSANITIZE > help > This option enables the Undefined Behaviour sanity checker. > Compile-time instrumentation is used to detect various undefined > -- -- Thanks, ~Nick Desaulniers