Received: by 2002:a25:683:0:0:0:0:0 with SMTP id 125csp2280194ybg; Fri, 5 Jun 2020 09:53:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw45rAMo//soWXw8Eueb70G2O+fyPotw2sERwriwSN7YhgYvjvHqGAHGgnJ0VxQUerkuCLl X-Received: by 2002:a05:6402:3c2:: with SMTP id t2mr10112338edw.361.1591375986756; Fri, 05 Jun 2020 09:53:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1591375986; cv=none; d=google.com; s=arc-20160816; b=i4yoYghFENDIuL7sQ8h0hlMu4El/bMQ6p71g1FgrNtyxX3/gMaNCoTba0R25twJWmI SYEp0NpYfpLEt+5tYz1SmdZybOyGrSkve/xVFVdJ7bY205DlGET7gqWyotg6zoCXjY24 vrmiYeKcDMDNTQJE0J9VmPr6HiGiSIIjkyOVe9pAdSGECVneHWTH56D8jcrJEa4lwSLZ 05JbAZcvc8Q6P9WerCx/vy+kuF2XIunjm+hxe3SN3sBO1nALFFcMs+jiMyKlx3QxIH+o ujJkU1sNW/LZcgAbakJBvigARSvm8zf/nAdk+xRkqWK+Se4R3qyK/vHC/4A6OiWtFFaq evTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=ndEcXCs8HGuPHBOdpnF2uLFbc3ITmk/itvLe9IIcUiU=; b=RnBJ1z/fgbyHcq2Gl/uU0QESTVxBpkuXEIcowJb7mkznRldudRum2CNp7B//kW86E3 xtUnUpfM6A3y+bHxvmCu9pXSjGKcPJA2c+a5J6ZPC/1N1PnOUPt6NVjNHTI+3gDl0f4V Ud92IPjxiZZH3+KIegn0vvXQxuQRAiMLUtknL4RBOJPO7OWHfl4UI+C7B/qZHAauvjQX 3m9Ij5NtYsAtEXu1uwLaz5ZqqgVCoh01h3rhnj3N46rUlPs7jpy1Q3FqZCer6phSTX4b wWJ0cAM5K7BIntuzdpL1kD5kC4JYIemrd7AOzQhsZaTp/RaenB/Rp95E120ZHVGnY4tN KheA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Xlk62jXK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r15si3735312ejs.733.2020.06.05.09.52.41; Fri, 05 Jun 2020 09:53:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=Xlk62jXK; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726879AbgFEQuc (ORCPT + 99 others); Fri, 5 Jun 2020 12:50:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44734 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725961AbgFEQuc (ORCPT ); Fri, 5 Jun 2020 12:50:32 -0400 Received: from mail-pl1-x641.google.com (mail-pl1-x641.google.com [IPv6:2607:f8b0:4864:20::641]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 08035C08C5C2 for ; Fri, 5 Jun 2020 09:50:32 -0700 (PDT) Received: by mail-pl1-x641.google.com with SMTP id x11so3870596plv.9 for ; Fri, 05 Jun 2020 09:50:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ndEcXCs8HGuPHBOdpnF2uLFbc3ITmk/itvLe9IIcUiU=; b=Xlk62jXKawdC+etFgmEFosi/YT8NT6D9l2F73XSAZNGxkX2UY9WcpdjfyDofKtxBQf jTUPkPxzIcaRaoCR/D8Zny8DRqfbh3kN7xcy02PoPBTh+0q7fmDoJuEPmtuVoOZAB/9L SGT3S/HklpUYKV5N155golYzamAdRU2nD8gT0eCtE+I/5pfXVZ4pDnDS04QOd2R3sUqr lGKPBwMlmSiJEQIUcI8ud7mbvG7vcpDu4k119MEl3k9qfS533ms9FZF9x5O0F54gzMcc UyDVnAk9Mp+Bly4ytTs3qOZgNITrwYnqlV2BVCu1tlfH96IEAztSBvVZTXN5IlF4QqyC U+GQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ndEcXCs8HGuPHBOdpnF2uLFbc3ITmk/itvLe9IIcUiU=; b=hujlE36HqxiSJP5e/JxiHW3Yf29nveJn07oRmjl7hpnc+VTKcEuBrDGGWuCvkGK5iY Y2QpSi94vcAe9pk13Dtl+KM/9g97H38gnlbnEyLsbZFt2B+oKXncxf7J7a4HZ5c1v2jh vJE2FvWAf22FySItYcalG9Oot4a/LL669U4NCbOnUVlz6XnGH8qh1wiYk6sOTk7/xxgG 3XIVnYVUnaeRszJZmUFl8mAisp1YfbBNC3/2IUoGJvpsIsraZr1Mjnj7ibpI2rjuCDIP 4aeKpshi33+VIL0O8NrvnjFHr1JnFN4NnAO6D4xpfIYEaKkxk+VkyK/JTVthC+XvX/+1 AqxQ== X-Gm-Message-State: AOAM533jOHU/dTNwdN/ygfIxamYfEbUk/v310cXLCpVs2KANRHVhIjk/ YnwmLPnl30w4Y+FeRESolLGFTb9ztApfm3hNASZsow== X-Received: by 2002:a17:90a:4802:: with SMTP id a2mr3849393pjh.25.1591375831319; Fri, 05 Jun 2020 09:50:31 -0700 (PDT) MIME-Version: 1.0 References: <20200605082839.226418-1-elver@google.com> <20200605082839.226418-2-elver@google.com> In-Reply-To: <20200605082839.226418-2-elver@google.com> From: Nick Desaulniers Date: Fri, 5 Jun 2020 09:50:20 -0700 Message-ID: Subject: Re: [PATCH -tip v3 2/2] kcov: Unconditionally add -fno-stack-protector to compiler options To: Marco Elver Cc: Peter Zijlstra , Borislav Petkov , Thomas Gleixner , Ingo Molnar , clang-built-linux , "Paul E. McKenney" , Dmitry Vyukov , Alexander Potapenko , Andrey Konovalov , kasan-dev , LKML , "maintainer:X86 ARCHITECTURE (32-BIT AND 64-BIT)" , Andrew Morton Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jun 5, 2020 at 1:28 AM Marco Elver wrote: > > Unconditionally add -fno-stack-protector to KCOV's compiler options, as > all supported compilers support the option. This saves a compiler > invocation to determine if the option is supported. > > Because Clang does not support -fno-conserve-stack, and > -fno-stack-protector was wrapped in the same cc-option, we were missing > -fno-stack-protector with Clang. Unconditionally adding this option > fixes this for Clang. > > Suggested-by: Nick Desaulniers > Signed-off-by: Marco Elver Thanks for considering the suggestion. Reviewed-by: Nick Desaulniers > --- > v3: > * Do not wrap -fno-stack-protector in cc-option, since all KCOV-supported > compilers support the option as pointed out by Nick. > --- > kernel/Makefile | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/kernel/Makefile b/kernel/Makefile > index ce8716a04d0e..71971eb39ee7 100644 > --- a/kernel/Makefile > +++ b/kernel/Makefile > @@ -35,7 +35,7 @@ KCOV_INSTRUMENT_stacktrace.o := n > KCOV_INSTRUMENT_kcov.o := n > KASAN_SANITIZE_kcov.o := n > KCSAN_SANITIZE_kcov.o := n > -CFLAGS_kcov.o := $(call cc-option, -fno-conserve-stack -fno-stack-protector) > +CFLAGS_kcov.o := $(call cc-option, -fno-conserve-stack) -fno-stack-protector > > # cond_syscall is currently not LTO compatible > CFLAGS_sys_ni.o = $(DISABLE_LTO) > -- > 2.27.0.278.ge193c7cf3a9-goog > -- Thanks, ~Nick Desaulniers