Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp2459396pxb; Fri, 17 Sep 2021 10:11:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyhEwU5Q/c//7uxXJzOx4rSMLnSCdgOvSytCj27ERHEtPTsu9PlPFWSmfdw5BQy+LoIn7he X-Received: by 2002:a17:906:6691:: with SMTP id z17mr13187753ejo.207.1631898676093; Fri, 17 Sep 2021 10:11:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631898676; cv=none; d=google.com; s=arc-20160816; b=GnbVSINVslGzUDMiAg8aR2r6Rqhn93eamZ2i+wYIhaQV+sZIuUl14/x1a92qpcKMKu f41jQBDD/FGbyhbMh8c/mon5uFKGFQd2+hl2zMYpYT+Ad/m77TlJCefVAfT4/tbdYjHC ohLe40PnFXzPQo6JB0PgT4cpAt0F6dYnPOQZ6RmpieTUevPLmJcmscI38BOa5zEzAlwU j2m9Zd7n1oWGvLPRrT/h95Zx46lk01IaxsbL0qqeiIcHQ085CqjITkXy/dzSwrqR7H5P 0xC7hgZLor5SKMvUwia8pbVQGRB5GfXZzfPFkS+9cNcVvRNVIeaZXeCXpCW0kC9gwGhI GF+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:dkim-signature; bh=TXG48xSRlx8rIgQW++hQT3j5R9gwaLAhcS6CZziLHmQ=; b=FpbUAUJSOdHV9mMVT6whQDnI3DyZvdlUBSeHBSpeWydzwZaTVPF08MsX/hqnmUlvmy 8Cw04MnS+isrfwC2n0WbMiDRjuJU9cXcEZTRQwYCdsI20KtBOAn5RvTQYZnPFEBKqR2e SzSZ29D6CMUYJ2So1WktqoA01EaP2TL6izS9vsu4GGZw4R0X7wdyf4GZpHwv7TgI2jxo bMnNwX3d5jqTcbh4v8XYhF/hzm5shhp58ahSK/JdweK65b4fticiU2aqdqsSIlmejq5l PXA0qBspjyROqg1yky3ZHyjjW68B0je2O/NnsNJxQAmOxVPIXfGHMCp9/cU+UsS3wMBY UFAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=WmhloRtj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id a9si2615718edf.600.2021.09.17.10.10.43; Fri, 17 Sep 2021 10:11:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=WmhloRtj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241558AbhIQGMz (ORCPT + 99 others); Fri, 17 Sep 2021 02:12:55 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35026 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244996AbhIQGMu (ORCPT ); Fri, 17 Sep 2021 02:12:50 -0400 Received: from mail-qt1-x84a.google.com (mail-qt1-x84a.google.com [IPv6:2607:f8b0:4864:20::84a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A15C7C0613D9 for ; Thu, 16 Sep 2021 23:11:28 -0700 (PDT) Received: by mail-qt1-x84a.google.com with SMTP id 13-20020ac8560d000000b0029f69548889so86474014qtr.3 for ; Thu, 16 Sep 2021 23:11:28 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=TXG48xSRlx8rIgQW++hQT3j5R9gwaLAhcS6CZziLHmQ=; b=WmhloRtjGIK9ydAlJ6OHR1E2w5RjxR8VBTPhCI/O0xak8DgT2MO76zuYYPl24VmGPp yse5VSvtdAU2msUdkpYQOJUnKSnFyFST5EPn8fCafk6yZQ46FNdPLWKTSBR3+zxtOBW7 sNbBXeRo0RHv8ziNHdSoGEpUFFISJxxpYhiy+2MVKGbzGc7jYpxOV8tLAcwl+rv4VK8Q OMGMl9rnWCFAnIkBzs5nVhwMf8z+PicX1CD1YvIz5WrRHo6Ylwov8F5oYotxfS+1/LEt DKN9SHB8jZeMVVnMBsn1ODzNyalQkI/zxfzf3xRkXWq64KC757pRykt/gdw+TEESPIrZ Su1w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=TXG48xSRlx8rIgQW++hQT3j5R9gwaLAhcS6CZziLHmQ=; b=UFAq6BWGJpWoVusTcBW7bRj5glCi+qBmH2H1nxS4DWOToLm9gzJSF/YfYo06FbTZW5 agfOq/hE9N4VQdsWt91zRFeeFiAODREOvFja8m/5L1jQw8MZIxT58dmH2WG/9G0cDKWp ToKJf5bY0QD/7Cz+azhgjYQIiUB3SwwQupr6xnk32hS7Hp2iRRRx3WdKXOP9gbbScBMW Ce8QRbzH/lsYhgBEBBEqy0b9faICKVHLGZiGv4zFJtnTzP3DzpSDjvCxeiILhFrP4VS2 t3yc1y4bra13t0Sddjwcz1DOzXy/pGwxKGzZlcrOUzTF7Anm4Qd+ZbnNqSCHGFAGfDmj obLQ== X-Gm-Message-State: AOAM533rtWC5sW+BosYUBhsWVquN0OJftBVmZM43ckTiI+BdPe83i6eP GcvVFvNN6wEz8zQ9zeXSLVdf87irRr+18/7gYMqlEw== X-Received: from mactruck.svl.corp.google.com ([2620:15c:2cb:201:4845:43ba:3ff5:2de1]) (user=brendanhiggins job=sendgmr) by 2002:a25:ca08:: with SMTP id a8mr11249514ybg.231.1631859087755; Thu, 16 Sep 2021 23:11:27 -0700 (PDT) Date: Thu, 16 Sep 2021 23:10:59 -0700 In-Reply-To: <20210917061104.2680133-1-brendanhiggins@google.com> Message-Id: <20210917061104.2680133-2-brendanhiggins@google.com> Mime-Version: 1.0 References: <20210917061104.2680133-1-brendanhiggins@google.com> X-Mailer: git-send-email 2.33.0.464.g1972c5931b-goog Subject: [PATCH v1 1/6] gcc-plugins/structleak: add makefile var for disabling structleak From: Brendan Higgins To: shuah@kernel.org, davidgow@google.com, arnd@arndb.de, keescook@chromium.org, rafael@kernel.org, jic23@kernel.org, lars@metafoo.de, ulf.hansson@linaro.org, andreas.noever@gmail.com, michael.jamet@intel.com, mika.westerberg@linux.intel.com, YehezkelShB@gmail.com, masahiroy@kernel.org, michal.lkml@markovi.net, ndesaulniers@google.com Cc: linux-kselftest@vger.kernel.org, kunit-dev@googlegroups.com, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, gregkh@linuxfoundation.org, linux-iio@vger.kernel.org, linux-mmc@vger.kernel.org, linux-usb@vger.kernel.org, linux-hardening@vger.kernel.org, linux-kbuild@vger.kernel.org, Brendan Higgins Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org KUnit and structleak don't play nice, so add a makefile variable for enabling structleak when it complains. Co-developed-by: Kees Cook Signed-off-by: Brendan Higgins --- scripts/Makefile.gcc-plugins | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/scripts/Makefile.gcc-plugins b/scripts/Makefile.gcc-plugins index 952e46876329a..4aad284800355 100644 --- a/scripts/Makefile.gcc-plugins +++ b/scripts/Makefile.gcc-plugins @@ -19,6 +19,10 @@ gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_STRUCTLEAK_BYREF) \ += -fplugin-arg-structleak_plugin-byref gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_STRUCTLEAK_BYREF_ALL) \ += -fplugin-arg-structleak_plugin-byref-all +ifdef CONFIG_GCC_PLUGIN_STRUCTLEAK + DISABLE_STRUCTLEAK_PLUGIN += -fplugin-arg-structleak_plugin-disable +endif +export DISABLE_STRUCTLEAK_PLUGIN gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_STRUCTLEAK) \ += -DSTRUCTLEAK_PLUGIN -- 2.33.0.464.g1972c5931b-goog