Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp491420pxb; Wed, 3 Mar 2021 08:09:56 -0800 (PST) X-Google-Smtp-Source: ABdhPJwFB4dUSvAzgughFt0TIrPcihG0H3RptpfuQjiXe7/V3+luMqpRM+ksTHMv6RK0VgJWp/Xh X-Received: by 2002:a17:906:3496:: with SMTP id g22mr25996305ejb.143.1614787796530; Wed, 03 Mar 2021 08:09:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614787796; cv=none; d=google.com; s=arc-20160816; b=kIbGwwVR4CAdtcaJ8536EzCzxzyeqqWxjQheg+TdmhCqW0TbiEasbsRR2tjI7mOwzu n7rufMfD+ERWB8G5s/JF7DgW8vkJGee9eWdsK4t8a/getRSLlg9Z6rD1O9cO4P3Su/eX a1rc+ZAyTeHTUX///oILTTozTS1IMbHtjvea9L+LBhYuGdyKuK0oKWKJLFSFdeSRt06C floISMn2rq5nrdvsE1kRw/6cEyJMr7PSXymcDSTULBHuHTagcUiLNU0ssAlKHww3moLf wieL1zDnB8PFYUwtXTdeNh96UJfR1OKcsIvDAUfTTVRUAMxNWT/fh/PN9NVR6lNXaeAt 0XWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=qj/HLG3JhGusLRHAa3k3URgdCZvL704yPPs3EMXEfD0=; b=xvyIzz+oRrnqA2pGTCNHAnxfbHQpZytJxnYXnbYC6+QUfrkx5KM/E5Liqjbo8BsZzx 3W7CbtWrAWWdFGhhvlAWW+3x2vMtBTHrIiZ0naU1i0wdFTPkpjeBB0iG0cDKuffO26EJ rjriU2aveeva37H/FIJ6MM+7zukggqEOCpeYudk5GR36JzeLED+3fnBaLDGpi0QTMej2 L+VoYw7ldvXVzl2UkeXr41QkZg+Ecywvku0lgJjBU8LihC6EX05GhsAkj/T+x1wvplt5 4OOR6tg6/miy0/0eFo3BR6pYFyuNk75HDHWp1wO4B/rfizWnHLHAbrVwuvJ3V7WYr/qy hpAQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=sBC9OO6p; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z15si15945220ejr.160.2021.03.03.08.09.27; Wed, 03 Mar 2021 08:09:56 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=sBC9OO6p; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345916AbhCAXe2 (ORCPT + 99 others); Mon, 1 Mar 2021 18:34:28 -0500 Received: from mail.kernel.org ([198.145.29.99]:58728 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238629AbhCASGV (ORCPT ); Mon, 1 Mar 2021 13:06:21 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 52F9C65272; Mon, 1 Mar 2021 17:29:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1614619799; bh=mzZYf+yCeXFGZoOkq+fMZDwJmXoGWHFQOdM63Hokw8c=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=sBC9OO6puby3w5vrPd5Jx3DFNcK/gDnU69Cf9FstzGWDSmmqyCVhnUIMSBG0BQmrr vZFBGlRBs0mhk2PldwCct0PcTih0pTMd+KvzVpU9TFB8jHHp89o46KiNWQg8X3EQqN AgyPqVcit6QvYDq0oPM01HM7oYkhNGT8MmIzT7fI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tobias Klauser , Dmitry Vyukov , Palmer Dabbelt Subject: [PATCH 5.10 584/663] riscv: Disable KSAN_SANITIZE for vDSO Date: Mon, 1 Mar 2021 17:13:52 +0100 Message-Id: <20210301161210.757389079@linuxfoundation.org> X-Mailer: git-send-email 2.30.1 In-Reply-To: <20210301161141.760350206@linuxfoundation.org> References: <20210301161141.760350206@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tobias Klauser commit f3d60f2a25e4417e1676161fe42115de3e3f98a2 upstream. We use the generic C VDSO implementations of a handful of clock-related functions. When kasan is enabled this results in asan stub calls that are unlikely to be resolved by userspace, this just disables KASAN when building the VDSO. Verified the fix on a kernel with KASAN enabled using vDSO selftests. Link: https://lore.kernel.org/lkml/CACT4Y+ZNJBnkKHXUf=tm_yuowvZvHwN=0rmJ=7J+xFd+9r_6pQ@mail.gmail.com/ Tested-by: Tobias Klauser Signed-off-by: Tobias Klauser Tested-by: Dmitry Vyukov [Palmer: commit text] Fixes: ad5d1122b82f ("riscv: use vDSO common flow to reduce the latency of the time-related functions") Cc: stable@vger.kernel.org Signed-off-by: Palmer Dabbelt Signed-off-by: Greg Kroah-Hartman --- arch/riscv/kernel/vdso/Makefile | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) --- a/arch/riscv/kernel/vdso/Makefile +++ b/arch/riscv/kernel/vdso/Makefile @@ -32,9 +32,10 @@ CPPFLAGS_vdso.lds += -P -C -U$(ARCH) # Disable -pg to prevent insert call site CFLAGS_REMOVE_vgettimeofday.o = $(CC_FLAGS_FTRACE) -Os -# Disable gcov profiling for VDSO code +# Disable profiling and instrumentation for VDSO code GCOV_PROFILE := n KCOV_INSTRUMENT := n +KASAN_SANITIZE := n # Force dependency $(obj)/vdso.o: $(obj)/vdso.so