From patchwork Thu Jul 18 14:14:48 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arnd Bergmann X-Patchwork-Id: 169211 Delivered-To: patch@linaro.org Received: by 2002:a92:4782:0:0:0:0:0 with SMTP id e2csp2465858ilk; Thu, 18 Jul 2019 07:15:30 -0700 (PDT) X-Google-Smtp-Source: APXvYqxH3sClpJsn5wf1xjDg6o0kgN92EUxsYKYxXyn5lCYxN96rsfxBH/xv73LATwECYyj8DTtU X-Received: by 2002:a65:6815:: with SMTP id l21mr1506344pgt.146.1563459330371; Thu, 18 Jul 2019 07:15:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563459330; cv=none; d=google.com; s=arc-20160816; b=b9lUVAb/Gd0u9YvvNWHFfmzOspT1dyDDMvlOdIvTjZl2FpXegJAZtdXRo/CAaMOSJu 5zv9lvCcQHI1zmZiVbT/nb90vmnOgjkUDC7oBB7rg+H83AAkG4rcNf4osxDhuaGJnc0M alxx1HbVT9+emC4TPE1AdSLjXm0UJL9lJ7FoomT79+FzlF94Hr90eOO2JUYHdiHoHlCY v2ieTVYc9er2nNhIl3QTzLjFijClQxk7gIc25jOVO68+pXvjhEmM/lY5P9JUAMLAnfcK wa4BPEqeiNtZuB/nXNGJQWq17ZizTCR5puG9HrCZc0r/ywM7NCBvhRafslD2rXiGWSjI gQxg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=taAIq4OnrcIiZ3IXb4MmEzxZWMqmuGqGs2K35XuumAA=; b=MtFtSH6VXyxFAYHefN0h7DwiCYT5/bPPqAomc/4HoozkwKa3lRN4gycg/lSR+ec/JE brbXwspzhWtdD2cKILAruhmKgUZcdMw2VM2p6jNTb7kebEDjRE7qe5EXQ6DoCiOyroMT 9T/0ddOOEv6szjrUyaf2mZSd6IxJxvikU+zZxP5NRHnaC1QtFHfZBQQjuuSfF9RTQU+J w5cv25P80VWShD5N5zEhxAmBSWlgFQG1zpB2KcUGtNwT7882KXH0eeLUiYIeZJF7RwdL 5pF5gHAMEnQ42setYKpsZanEQIHsoGg+Z16UgrPl7FORiN7XY9YXyNc3POGZw3z5T+Vr 2RfQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y34si2269740plb.423.2019.07.18.07.15.29; Thu, 18 Jul 2019 07:15:30 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2390559AbfGROP2 (ORCPT + 29 others); Thu, 18 Jul 2019 10:15:28 -0400 Received: from mout.kundenserver.de ([217.72.192.75]:54615 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727708AbfGROP2 (ORCPT ); Thu, 18 Jul 2019 10:15:28 -0400 Received: from threadripper.lan ([149.172.19.189]) by mrelayeu.kundenserver.de (mreue107 [212.227.15.145]) with ESMTPA (Nemesis) id 1Mgw7n-1iMazi13u9-00hP63; Thu, 18 Jul 2019 16:15:11 +0200 From: Arnd Bergmann To: Andrew Morton Cc: Qian Cai , Mark Brown , Arnd Bergmann , Andrey Ryabinin , Vasily Gorbik , Andrey Konovalov , linux-kernel@vger.kernel.org, clang-built-linux@googlegroups.com Subject: [PATCH] kasan: push back KASAN_STACK detection to clang-10 Date: Thu, 18 Jul 2019 16:14:48 +0200 Message-Id: <20190718141503.3258299-1-arnd@arndb.de> X-Mailer: git-send-email 2.20.0 MIME-Version: 1.0 X-Provags-ID: V03:K1:7d7aH5pzgsLc0NYtyZMhGVmPmogcfXriE2+VCWn+jhEselAYSLW z2O23ERO6FuNvsUNlGpP3CEjlXH+EQbVEzkmSZwSLgp12ZXVBBvzus7hMQ77cAd0y7y5JTT SgfeGviIgrgv8tP58tKUYTziY06HOkMEhfAP8ySM9VlrSTzQYOCwyuXW6Swcz42Wb+cS12A PN2bNXEknc0CMqdZa/lsA== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1; V03:K0:78tSFT/0HXw=:PkZ5nkOT4Y7P17Q0AWm6AJ VzXKRJ+MNUAhZhrBRWhrg1TwyPvK51VDmYsMtf/UeTg61+KyJu1FRJN7DkPFPWk31Ucbt0/Po DUE1ePuCLUGNIWpCy7m3PnDGzsv/t4UGvGckbwSOCEEWxRPAc/TLCSedC9rCGtIe2+DbCKjJ2 5RSx1hCfLtbu3jJvFDNZwqC2sKqXACTyWvk2VyegaOPypD+3L3Kv4UdtUM7iD5zFrJVEbmsyE IbDT5AACjHmlDPrftCYZ10yE0ZwuGJJaAryoNBVmav6/+VAgP+OasifKpoWkDi2/m8/HDzOZE Ydv8zf6oRT8ZHZWCnmZtBK7nb1GoHteJz5E9O9zlwLW7hcLZX1+ZXn33kWKU9RV7jwhtBtt34 stlQRD2YCn1iUdXwfW6GfLXQtJTShPnsRZJg++lZGcDRnQdugFsxCkZggDL5rTqQ6IWWa9XtG JJEIgJV86pJt11/2EdrQ43A3ddPrgo2YnhFOWwowWzo2wIkZycPAztQS5ks2UMkM/xTMnpJt9 bg5ArQaa6vUgeATrAaa+Nq3GHSdSI5ZzznvMUk2ygolEVmbasHbhlTcW8aY7n8oeJsnbZT23m JafGDoiWefGU7ryH4TxgiEP0WR2CTeMzgrsQrEwz0YXUOn3cKAE59ni1sZI5oGQRqRk8MlglE fv2pDVpHvjJKK3WucUFX8mbpwntAEpg2MqhrUAhReDONDwPJ2Ze310492rDUUMAVj9vk8JBct M2B46iPZV9SEI8SCNu/OD4u9KGMgU543H/I5qg== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org asan-stack mode still uses dangerously large kernel stacks of tens of kilobytes in some drivers, and it does not seem that anyone is working on the clang bug. Let's push this back to clang-10 for now so users don't run into this by accident, and we can test-build allmodconfig kernels using clang-9 without drowning in warnings. Link: https://bugs.llvm.org/show_bug.cgi?id=38809 Fixes: 6baec880d7a5 ("kasan: turn off asan-stack for clang-8 and earlier") Signed-off-by: Arnd Bergmann --- lib/Kconfig.kasan | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) -- 2.20.0 diff --git a/lib/Kconfig.kasan b/lib/Kconfig.kasan index 4fafba1a923b..2f260bb63d77 100644 --- a/lib/Kconfig.kasan +++ b/lib/Kconfig.kasan @@ -106,7 +106,7 @@ endchoice config KASAN_STACK_ENABLE bool "Enable stack instrumentation (unsafe)" if CC_IS_CLANG && !COMPILE_TEST - default !(CLANG_VERSION < 90000) + default !(CLANG_VERSION < 100000) depends on KASAN help The LLVM stack address sanitizer has a know problem that