Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp1067252ybg; Wed, 3 Jun 2020 23:28:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwqacQwl00ZeEvMs6fXaLRPbHZXcOEfXlBWUP3VgG4bmVFTBL8dryJje1ZjFyX4wgqBZ2jQ X-Received: by 2002:a17:906:7c58:: with SMTP id g24mr2674076ejp.205.1591252131430; Wed, 03 Jun 2020 23:28:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591252131; cv=none; d=google.com; s=arc-20160816; b=r9AMRqn6MVhANp2C8BhgDBT+bjo5b/XrW3wnJ20n9l1o6JaUhcVhI1agxa25Q7B4xu A4QyYD8roFE4M29DScVfrcnw7zvJ/0kKvoXxxzLyX58YRCSx3rURrGx27XZhXZ5ck952 XtX0yi6umxMa81kIqD9S70+Ca2QUvC4N4A3tTO9Kwa3g3PnuHJ9x/xB5+yCJ7KyhJNC1 YSSgykr1hktNPRkSwspOzApXI2X1pFi893XHXbjlbp8WIsXe6/AX63obdJjW44tNuFn2 toSu8axaNmBWN3BXg/tOjnc578TVMyjy/yW2CAf2o3d8lw0hvAJSJsY26e8aGfBWKsfs WSaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:from:subject:mime-version :message-id:date:dkim-signature; bh=Y2WghFK4jI/68L/mvE2beXccHpF2A1uuR6W3fE75YUg=; b=NlkGRq6BTegjGSnrPAqZkpeumn7/DByliVbeV5OMiGFWV05qab1t5V685B5MbFR5ah M2b9BHQfzFJRqzI+RFOCbdAmb7DFGLSvX+38WB8t1aFm9xT2hCOMy/Z8GwQUPU4Ug7ZP dfWz8UpynRW6lW8FIrz7o9Y7SKkIvmyTrHl5ZWCHoieN6jXhh/sfECxAQ5RZc8/umEiB Amg38AMtSY4H/HlOrBmUhwqVUghJeqvIaxCx3PYGTRJ4jTteathJm8tMcPeKdZDwu29X 31/4klQyI62yo5qKX8YbkAoRhPRaj4zAIhT5eOaG0pvl0PKzjR7ihJRQ9JfTbUZChZ8c YxUA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=I4BZ4MPd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id li7si1022018ejb.607.2020.06.03.23.28.28; Wed, 03 Jun 2020 23:28:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=I4BZ4MPd; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726663AbgFDF60 (ORCPT + 99 others); Thu, 4 Jun 2020 01:58:26 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58824 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726104AbgFDF6Z (ORCPT ); Thu, 4 Jun 2020 01:58:25 -0400 Received: from mail-qt1-x849.google.com (mail-qt1-x849.google.com [IPv6:2607:f8b0:4864:20::849]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5717FC05BD43 for ; Wed, 3 Jun 2020 22:58:24 -0700 (PDT) Received: by mail-qt1-x849.google.com with SMTP id h49so4023523qtk.10 for ; Wed, 03 Jun 2020 22:58:24 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=date:message-id:mime-version:subject:from:to:cc; bh=Y2WghFK4jI/68L/mvE2beXccHpF2A1uuR6W3fE75YUg=; b=I4BZ4MPdBo2uX0tbKFL94CWes+/vNUuGU1U4ZGPUlplte8++cmxNohRBeY1dkqVjsU XEdGTMQa2FE2DClh5hcYEXF7E4G5+z82QTgt8Nu81DvEU+u0oc4vrIVZj0XaaUz240To HLDVBomzbk2Kesk+FmhAx3/3arCT+kimjgC+sU7F1FMD4XLoPGI2PftvM0jQO9zehi26 Chn+o/lGDD1dQYQf4NqID53ua5Q6sqz8u7fP6OkwYryvEbGk9FpUtGeFB4VtSb3Hswzx ZxQUrx0HarJ6UhNocHEtZoZebF6q2ffpPSvc9xgf05POXb4NMh6EI9k+WPNnInjF7VSg qCrA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:message-id:mime-version:subject:from:to:cc; bh=Y2WghFK4jI/68L/mvE2beXccHpF2A1uuR6W3fE75YUg=; b=YiflNuHCq3fsSqqgD/4uNUsx/OqBxUJJYOdvwlFceCv8A86clAVMB4PF37sLXgpnYi foBIZ2nFcbvTqS1VAxCT7inX1GMjPWzUly4zk7GUVGritG4rKMjdPt1L4Z3gtLyOZhjG trRllyDSS0ENXJ9lNcuFhgkKUMqDsAsTiHCUeX9on1I5V7B+5kv1XEjb1s00owYOplB8 j+5rM3P0/IqIfv7qZGXpJIyeFif67eo7hIIJlZAQie5NXiSXy2eoASm/w3jd16NWLkWg igZ/03S+eClFE/wi7Qdy2QtjS5DCYYAFmbximlnOySJkCtBsd2Lb+COKzuctjfAWM17V sNqg== X-Gm-Message-State: AOAM533C1hbGfkLZaMph7e9WRZkNPBMm765i+rvFP/n8FMvXK9DepmEg homioLlmMY8/b7cqiq+v2uCI37JKpA== X-Received: by 2002:a05:6214:1842:: with SMTP id d2mr3212300qvy.197.1591250303486; Wed, 03 Jun 2020 22:58:23 -0700 (PDT) Date: Thu, 4 Jun 2020 07:58:10 +0200 Message-Id: <20200604055811.247298-1-elver@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.27.0.rc2.251.g90737beb825-goog Subject: [PATCH -tip v2 1/2] kasan: Bump required compiler version From: Marco Elver To: elver@google.com Cc: will@kernel.org, peterz@infradead.org, bp@alien8.de, tglx@linutronix.de, mingo@kernel.org, clang-built-linux@googlegroups.com, paulmck@kernel.org, dvyukov@google.com, glider@google.com, andreyknvl@google.com, kasan-dev@googlegroups.com, linux-kernel@vger.kernel.org, Nick Desaulniers Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Adds config variable CC_HAS_WORKING_NOSANITIZE_ADDRESS, which will be true if we have a compiler that does not fail builds due to no_sanitize_address functions. This does not yet mean they work as intended, but for automated build-tests, this is the minimum requirement. For example, we require that __always_inline functions used from no_sanitize_address functions do not generate instrumentation. On GCC <= 7 this fails to build entirely, therefore we make the minimum version GCC 8. Link: https://lkml.kernel.org/r/20200602175859.GC2604@hirez.programming.kicks-ass.net Suggested-by: Peter Zijlstra Acked-by: Andrey Konovalov Reviewed-by: Nick Desaulniers Signed-off-by: Marco Elver --- Apply after: https://lkml.kernel.org/r/20200602173103.931412766@infradead.org v2: * No longer restrict UBSAN (and KCSAN), since the attributes behave differently for different sanitizers. For UBSAN the above case with GCC <= 7 actually works fine (no compiler error). So it seems that only KASAN is affected by this -- let's limit our restriction to KASAN. --- lib/Kconfig.kasan | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/lib/Kconfig.kasan b/lib/Kconfig.kasan index 81f5464ea9e1..af0dd09f91e9 100644 --- a/lib/Kconfig.kasan +++ b/lib/Kconfig.kasan @@ -15,11 +15,15 @@ config CC_HAS_KASAN_GENERIC config CC_HAS_KASAN_SW_TAGS def_bool $(cc-option, -fsanitize=kernel-hwaddress) +config CC_HAS_WORKING_NOSANITIZE_ADDRESS + def_bool !CC_IS_GCC || GCC_VERSION >= 80000 + config KASAN bool "KASAN: runtime memory debugger" depends on (HAVE_ARCH_KASAN && CC_HAS_KASAN_GENERIC) || \ (HAVE_ARCH_KASAN_SW_TAGS && CC_HAS_KASAN_SW_TAGS) depends on (SLUB && SYSFS) || (SLAB && !DEBUG_SLAB) + depends on CC_HAS_WORKING_NOSANITIZE_ADDRESS help Enables KASAN (KernelAddressSANitizer) - runtime memory debugger, designed to find out-of-bounds accesses and use-after-free bugs. -- 2.27.0.rc2.251.g90737beb825-goog