Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp1003028pxb; Wed, 29 Sep 2021 14:37:58 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxOxsKPXprLPSaTFGbh7CMLlXwdRuN5EmTR0zYAbKW5qM1m3LeNoQDx76GAP/NABCXSXgbP X-Received: by 2002:a05:6402:1778:: with SMTP id da24mr2737051edb.398.1632951478052; Wed, 29 Sep 2021 14:37:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632951478; cv=none; d=google.com; s=arc-20160816; b=tSGTS2y3F8yuL2uFptJRFvqB0W9sEJBiEH1nzK+rqYEJj10lU1ft0g4mMIX0JuvYyI ZBQqD4rJr00C8eFdBlLQhcHmg46YnFn8WhTorU5LLkaz2Taj5hwE0biCSPAIeP6lp1Pu 649G7xC7mxzVEUOLBiWTS9AxJUuL0bZ2ft3oaqRsAUxTyM45pr0/sHKe8eEP8vFsbqWI ydl9zN8NJMEq3Kcb4PX3TZyS49MThThZJkYLXmr0qz37l/01x2xADjgt5cNeHtcT7K8n oBnZQxxyJcnDJgM8qLWMaAbrTHydLf4kaJ989YMK/dYOIiDkketoF2aJS3GT0/j7eQ0w iL6A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:references:mime-version :message-id:in-reply-to:date:dkim-signature; bh=GBgRPmylRP0XaI5E/LihaXT2Ir7X1xpw3ZInKRc4R50=; b=GQgTvymRQC8fzfvu6n916/01tut9t6478UuyObTAEnkrvurmYHcIOE6ThPYT7SKJdO 0Mkg2EQJKKeX/419bo8nTkLYqAF/s9MmB2ynhb6pxsBzlsA36/AfteQGT1LXlKwFPY1t 3pqs847g6umND/gYt3awI6efEL5RsbwmnmnCPpngw6pSVfUHeD70ZzuROQ+gZIKgJGty MWxPdImJv/tN0lIDcvtiRLUIw19Bq+PZb1fz8g8L1spX3UgZ5qvRWhjFIbRqaLlYGpGj NYd0wmFOWEkHd1/J/1j8a6l0Ygy46C3Hl+GHkdzKuE/P652ioplqHnaeHmO5tT+jY6Z+ +mDw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=WHFQA+g2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 1si1145668ejb.76.2021.09.29.14.37.34; Wed, 29 Sep 2021 14:37:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=WHFQA+g2; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346942AbhI2V3F (ORCPT + 99 others); Wed, 29 Sep 2021 17:29:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55574 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1346531AbhI2V3D (ORCPT ); Wed, 29 Sep 2021 17:29:03 -0400 Received: from mail-qt1-x849.google.com (mail-qt1-x849.google.com [IPv6:2607:f8b0:4864:20::849]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 17A7EC06161C for ; Wed, 29 Sep 2021 14:27:22 -0700 (PDT) Received: by mail-qt1-x849.google.com with SMTP id a22-20020ac86116000000b002a1463f30ddso10065852qtm.17 for ; Wed, 29 Sep 2021 14:27:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=GBgRPmylRP0XaI5E/LihaXT2Ir7X1xpw3ZInKRc4R50=; b=WHFQA+g25qkYPYFpep7vNNJTNwmmqsk9uHkMIXOXNnU9O5BPIQRfnn5cf/mGs1NaL+ ogKT12Uh8k7K5urhYrNFdvA4MuqXpUSda3nB7WGcM7+TmYrb/KYXzXGlDr9DjrUV16I0 rHwXYiunO8+vv1D/AhHbPY96DW0Dfw4rFl3WW3/Ie+sLyrSpeG+6nYS6+7KwC3QaTDAy kvG8F8Pay8skbykgIct0kmcVyTHUENlCleH7rnpjrTRQd1yF+nB+oZnvHiXisnyqj5hF B7JP6NY+hXsfKoG5gBkQZLzz+ZbQt1dS3slr7Wa8EFv5hkH1pcrphEZcixGC7BD/sLiC 7jgQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=GBgRPmylRP0XaI5E/LihaXT2Ir7X1xpw3ZInKRc4R50=; b=3Rb0xDG+HKBHny3vHTyN9sxNNgnFmovdhwCoxo2VE9TpSkhoXu9I6/zzJLqsOlKLae Rn8jmbHRgUPmW2SNUXuPUSE3mR3oJzP+DCgGhvcHO9Ne6NWbBcOzuKuE92bODdZQcDNS T9m9mdC0SRoKIy1PDk7SsiRK+iY8KMisGPDMoMspPQ1xb2APxTh4U55YOqD+RVw/tT5v tzaHt+9RwAHgYq660HPzC6mR4IIEWYQCsd9+aWx4yK9tBJNmK2ejsy/c0xBjHLS+lQGz 6HHKCnklyq88bxheMTI5jIQGo0nW+mD6+gAhu8ZhcgHlJb5Vp66udVsXYXUjOJNG/8hR YPoQ== X-Gm-Message-State: AOAM533bfyT/GtAEXhiVQRmccQc+0cTkJv5x045ckZUQrYJPfSi185Kl WJFq3uSCZ9QNJbiyWCgZh8YhaXAHdlN32RSSC+T7eQ== X-Received: from mactruck.svl.corp.google.com ([2620:15c:2cb:201:83f4:ff43:90d6:efd3]) (user=brendanhiggins job=sendgmr) by 2002:a05:6214:362:: with SMTP id t2mr642333qvu.64.1632950841307; Wed, 29 Sep 2021 14:27:21 -0700 (PDT) Date: Wed, 29 Sep 2021 14:27:09 -0700 In-Reply-To: <20210929212713.1213476-1-brendanhiggins@google.com> Message-Id: <20210929212713.1213476-2-brendanhiggins@google.com> Mime-Version: 1.0 References: <20210929212713.1213476-1-brendanhiggins@google.com> X-Mailer: git-send-email 2.33.0.685.g46640cef36-goog Subject: [PATCH v2 1/5] gcc-plugins/structleak: add makefile var for disabling structleak From: Brendan Higgins To: shuah@kernel.org, davidgow@google.com, arnd@arndb.de, keescook@chromium.org, rafael@kernel.org, jic23@kernel.org, lars@metafoo.de, ulf.hansson@linaro.org, andreas.noever@gmail.com, michael.jamet@intel.com, mika.westerberg@linux.intel.com, YehezkelShB@gmail.com, masahiroy@kernel.org, michal.lkml@markovi.net, ndesaulniers@google.com Cc: linux-kselftest@vger.kernel.org, kunit-dev@googlegroups.com, linux-kernel@vger.kernel.org, torvalds@linux-foundation.org, gregkh@linuxfoundation.org, linux-iio@vger.kernel.org, linux-mmc@vger.kernel.org, linux-usb@vger.kernel.org, linux-hardening@vger.kernel.org, linux-kbuild@vger.kernel.org, Brendan Higgins Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org KUnit and structleak don't play nice, so add a makefile variable for enabling structleak when it complains. Co-developed-by: Kees Cook Signed-off-by: Kees Cook Signed-off-by: Brendan Higgins --- Changes since last revision: - None --- scripts/Makefile.gcc-plugins | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/scripts/Makefile.gcc-plugins b/scripts/Makefile.gcc-plugins index 952e46876329a..4aad284800355 100644 --- a/scripts/Makefile.gcc-plugins +++ b/scripts/Makefile.gcc-plugins @@ -19,6 +19,10 @@ gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_STRUCTLEAK_BYREF) \ += -fplugin-arg-structleak_plugin-byref gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_STRUCTLEAK_BYREF_ALL) \ += -fplugin-arg-structleak_plugin-byref-all +ifdef CONFIG_GCC_PLUGIN_STRUCTLEAK + DISABLE_STRUCTLEAK_PLUGIN += -fplugin-arg-structleak_plugin-disable +endif +export DISABLE_STRUCTLEAK_PLUGIN gcc-plugin-cflags-$(CONFIG_GCC_PLUGIN_STRUCTLEAK) \ += -DSTRUCTLEAK_PLUGIN -- 2.33.0.685.g46640cef36-goog