Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp1148712pxv; Fri, 9 Jul 2021 19:34:09 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy6p2wxJ5hEdG/AfnmGMFGEFNoZD06cmlOLypa3sHcm4e0yla/Cl5tZS3kWbEws6fMP4H7d X-Received: by 2002:a05:6402:430d:: with SMTP id m13mr32150558edc.88.1625884449316; Fri, 09 Jul 2021 19:34:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1625884449; cv=none; d=google.com; s=arc-20160816; b=b49hIrOliSFCkvmfVAJnBEhMg1i8VjK7jAQSQq2iuFmVXBjn2BW4bX5L4ka8LAzVxc 3m4jo6EZxhaGTIoS6tN4yGocPleJ+Tmlnlo3fao05FGGFRQtWy21+oPFxO75mWs4zdil unh7o/03guyfnc1BYVdoJXrj1I0h3ykexOjRUKeczfEMK7GXddY0gM1/jRS8ncGY5BnU qGbF1tI3BGBRC8CAk0921xvb/CWbtCKtiA4Q4L4gUW8rb6M1WJunNrhVIisj06l7nimP YyQQFyNpSiBQnxIEmxg0SqsKck8K1Vu1GWocCWFZxuabd1Aba9sjywUQgX0Gi18lQleY MFMA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=66gMy5gWuZ96dKx0DN315J2Q4OVwPVeC6ngfJ/S5a2c=; b=XH1ao3pQkPN3LXEl0LACG8kGejQScdd67wxiSRheCrYI18YKbISNIDrXVQ+zNATPi9 tUgZIT2hK9QM1SOh9JYI5Ia4JB6+JX3LGxy5Qr2IS2EgjcLCHXj28r8gZ9Ur2C83YjpZ t7Dv80kxL7kNBzEWDnw6DSWEWzLB0Wsqw8DFi25B06F+EpZyxtkXrHda8mZZiwGalAlP g093RZoljlvglgUjMaBEEEIvlZ4IjpJoKw/3IlqpT5mE75EhA2wM8wF2lw9zFTlyD7+P U3Wnh9pIHe1JcoNmMMjyBORIol2mGl5BWnnfn30CMneOLAxIqnjYBVUC/3PlO64uhELo E8dg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=FLTOOvOf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id hg16si9323169ejc.410.2021.07.09.19.33.45; Fri, 09 Jul 2021 19:34:09 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=FLTOOvOf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235401AbhGJCer (ORCPT + 99 others); Fri, 9 Jul 2021 22:34:47 -0400 Received: from mail.kernel.org ([198.145.29.99]:42882 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234905AbhGJC3u (ORCPT ); Fri, 9 Jul 2021 22:29:50 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id A546B613D9; Sat, 10 Jul 2021 02:27:04 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1625884026; bh=45GuMCIsNAAFPuiEtXYLR8ryh0fkkKY+94o5SajtHBM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=FLTOOvOfzwtqxGOrHCeLVO90KsEz85LuFU5vq8f9C5SXoafnSew91SV8q6yAU2UWY pb20S05imMwxClvAZ3kd8Tid4q1Yj4JKP4PDFSTe5pnrWvVRIQ06uNdVZFPAmDq5hf 7/vYNfjncDw1O/eIRSVOOT7IZh43OoGpxLpjzevw/wUz1EUSDXtygik5Z9vwWZjCf9 ajEawcR+xnWqJzeIRJqm6n1YGkJR5G+exvo3VfUR0lqNCRBdNNgLGRFZAYao7kZ+70 Ig1g44JeF9ShoNi7IUzw/R6q3X3dSR7ImwlSc7jGvjSk9OJRbbB2K5T361kZTgfy9h 22Naol5/svXOw== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Marco Elver , Peter Zijlstra , Miguel Ojeda , Nathan Chancellor , Nick Desaulniers , Kees Cook , Will Deacon , Ard Biesheuvel , Luc Van Oostenryck , Arvind Sankar , Masahiro Yamada , Sami Tolvanen , Arnd Bergmann , Dmitry Vyukov , Mark Rutland , Andrew Morton , Linus Torvalds , Sasha Levin , clang-built-linux@googlegroups.com Subject: [PATCH AUTOSEL 5.10 93/93] kcov: add __no_sanitize_coverage to fix noinstr for all architectures Date: Fri, 9 Jul 2021 22:24:27 -0400 Message-Id: <20210710022428.3169839-93-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210710022428.3169839-1-sashal@kernel.org> References: <20210710022428.3169839-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Marco Elver [ Upstream commit 540540d06e9d9b3769b46d88def90f7e7c002322 ] Until now no compiler supported an attribute to disable coverage instrumentation as used by KCOV. To work around this limitation on x86, noinstr functions have their coverage instrumentation turned into nops by objtool. However, this solution doesn't scale automatically to other architectures, such as arm64, which are migrating to use the generic entry code. Clang [1] and GCC [2] have added support for the attribute recently. [1] https://github.com/llvm/llvm-project/commit/280333021e9550d80f5c1152a34e33e81df1e178 [2] https://gcc.gnu.org/git/?p=gcc.git;a=commit;h=cec4d4a6782c9bd8d071839c50a239c49caca689 The changes will appear in Clang 13 and GCC 12. Add __no_sanitize_coverage for both compilers, and add it to noinstr. Note: In the Clang case, __has_feature(coverage_sanitizer) is only true if the feature is enabled, and therefore we do not require an additional defined(CONFIG_KCOV) (like in the GCC case where __has_attribute(..) is always true) to avoid adding redundant attributes to functions if KCOV is off. That being said, compilers that support the attribute will not generate errors/warnings if the attribute is redundantly used; however, where possible let's avoid it as it reduces preprocessed code size and associated compile-time overheads. [elver@google.com: Implement __has_feature(coverage_sanitizer) in Clang] Link: https://lkml.kernel.org/r/20210527162655.3246381-1-elver@google.com [elver@google.com: add comment explaining __has_feature() in Clang] Link: https://lkml.kernel.org/r/20210527194448.3470080-1-elver@google.com Link: https://lkml.kernel.org/r/20210525175819.699786-1-elver@google.com Signed-off-by: Marco Elver Acked-by: Peter Zijlstra (Intel) Reviewed-by: Miguel Ojeda Reviewed-by: Nathan Chancellor Cc: Nick Desaulniers Cc: Kees Cook Cc: Will Deacon Cc: Ard Biesheuvel Cc: Luc Van Oostenryck Cc: Arvind Sankar Cc: Masahiro Yamada Cc: Sami Tolvanen Cc: Arnd Bergmann Cc: Dmitry Vyukov Cc: Mark Rutland Signed-off-by: Andrew Morton Signed-off-by: Linus Torvalds Signed-off-by: Sasha Levin --- include/linux/compiler-clang.h | 17 +++++++++++++++++ include/linux/compiler-gcc.h | 6 ++++++ include/linux/compiler_types.h | 2 +- 3 files changed, 24 insertions(+), 1 deletion(-) diff --git a/include/linux/compiler-clang.h b/include/linux/compiler-clang.h index 189149de77a9..9ba951e3a6c2 100644 --- a/include/linux/compiler-clang.h +++ b/include/linux/compiler-clang.h @@ -23,6 +23,12 @@ /* all clang versions usable with the kernel support KASAN ABI version 5 */ #define KASAN_ABI_VERSION 5 +/* + * Note: Checking __has_feature(*_sanitizer) is only true if the feature is + * enabled. Therefore it is not required to additionally check defined(CONFIG_*) + * to avoid adding redundant attributes in other configurations. + */ + #if __has_feature(address_sanitizer) || __has_feature(hwaddress_sanitizer) /* Emulate GCC's __SANITIZE_ADDRESS__ flag */ #define __SANITIZE_ADDRESS__ @@ -55,6 +61,17 @@ #define __no_sanitize_undefined #endif +/* + * Support for __has_feature(coverage_sanitizer) was added in Clang 13 together + * with no_sanitize("coverage"). Prior versions of Clang support coverage + * instrumentation, but cannot be queried for support by the preprocessor. + */ +#if __has_feature(coverage_sanitizer) +#define __no_sanitize_coverage __attribute__((no_sanitize("coverage"))) +#else +#define __no_sanitize_coverage +#endif + /* * Not all versions of clang implement the type-generic versions * of the builtin overflow checkers. Fortunately, clang implements diff --git a/include/linux/compiler-gcc.h b/include/linux/compiler-gcc.h index 555ab0fddbef..4cf524ccab43 100644 --- a/include/linux/compiler-gcc.h +++ b/include/linux/compiler-gcc.h @@ -137,6 +137,12 @@ #define __no_sanitize_undefined #endif +#if defined(CONFIG_KCOV) && __has_attribute(__no_sanitize_coverage__) +#define __no_sanitize_coverage __attribute__((no_sanitize_coverage)) +#else +#define __no_sanitize_coverage +#endif + #if GCC_VERSION >= 50100 #define COMPILER_HAS_GENERIC_BUILTIN_OVERFLOW 1 #endif diff --git a/include/linux/compiler_types.h b/include/linux/compiler_types.h index ac3fa37a84f9..2a1c202baa1f 100644 --- a/include/linux/compiler_types.h +++ b/include/linux/compiler_types.h @@ -205,7 +205,7 @@ struct ftrace_likely_data { /* Section for code which can't be instrumented at all */ #define noinstr \ noinline notrace __attribute((__section__(".noinstr.text"))) \ - __no_kcsan __no_sanitize_address + __no_kcsan __no_sanitize_address __no_sanitize_coverage #endif /* __KERNEL__ */ -- 2.30.2