From patchwork Tue Feb 19 21:49:06 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arnd Bergmann X-Patchwork-Id: 158738 Delivered-To: patch@linaro.org Received: by 2002:a02:48:0:0:0:0:0 with SMTP id 69csp4172765jaa; Tue, 19 Feb 2019 13:50:00 -0800 (PST) X-Google-Smtp-Source: AHgI3IZ3TXEPATO1HkhgUWeMiNZWyPFAnslwi1RTmZ3x1sRW2zQtPy8kD21sD5h9irirmPuj3E8f X-Received: by 2002:a63:d104:: with SMTP id k4mr25334751pgg.227.1550613000838; Tue, 19 Feb 2019 13:50:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550613000; cv=none; d=google.com; s=arc-20160816; b=d6HjoQVsRKDC66AHPLKGqL7VfeB1YQyoMtTP3sITYqPWyx3eUY654OM8Gs11aoNh3B OYbtOGULdorIRvUTDpYp5COV0/553aCLguSC3AC005X9OBKJBgiDA6Byx1Yyp4B2VVw8 gEAzp7rGwNevSRTGrprehQcBzBPEjpLtfz/1rmxpzZiLClT0/AP7OPVPvfQSR3yM6LTB vp9idK/NhqXFRemohvQxT2kPS7j5PuLFxBQeZA2DfNVx0RUuRjKiz6DirqX/GOIGeF2g fDZgTDghk+RW2Mq0UG6eU2vJn6tySwKeDYDXqyDEPX/5QM5zq4mrLDsUMJesNiz5Q5Hd BctQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=EfOv8NpIE2mJ6DRLwpocZiK8uXQQpugpkLQ07VTlKMU=; b=WGPvEu/Efv29N68fC0k1GR4X4sduxbHmjQ5konNz4WQt4Ii9RSDaqkV5j7PiAOcQSf a8s09ISJ+MgVKdY48L67CooRUVWE2wloKVH/Gap7X3yCykrD//8MW/xeMWafT13t1gfl fcR4lpQCftisdUzsHY4wK+e/Y5UZCI/pO8M34zfdOt98LnUZbS0S86UXMIi9Exj6DWPS rxET+FaeBL/U3RGlIEVtZUldNZcmqhRpMljGkL6ibnTZDTSibefPTpbnFAbQ7dTS8/+o nTr+GAiwZboXVNQIdMEGcfyfOSu7RbyZyOz/1QYWUBVDec8uTkYO5dENGOntjH527POO bjYA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c3si14174623plr.178.2019.02.19.13.50.00; Tue, 19 Feb 2019 13:50:00 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729588AbfBSVt6 (ORCPT + 32 others); Tue, 19 Feb 2019 16:49:58 -0500 Received: from mout.kundenserver.de ([217.72.192.75]:50197 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726877AbfBSVt6 (ORCPT ); Tue, 19 Feb 2019 16:49:58 -0500 Received: from wuerfel.lan ([109.192.41.194]) by mrelayeu.kundenserver.de (mreue107 [212.227.15.145]) with ESMTPA (Nemesis) id 1M7KKA-1gxI8A0kgu-007mo4; Tue, 19 Feb 2019 22:49:42 +0100 From: Arnd Bergmann To: Andrey Ryabinin , Masahiro Yamada , Michal Marek , Andrew Morton Cc: Arnd Bergmann , Dmitry Vyukov , Nick Desaulniers , Mark Brown , Qian Cai , Alexander Potapenko , Martin Schwidefsky , Christoph Lameter , Andrey Konovalov , linux-kernel@vger.kernel.org, linux-kbuild@vger.kernel.org, kasan-dev@googlegroups.com Subject: [PATCH] kasan: turn off asan-stack for clang-8 and earlier Date: Tue, 19 Feb 2019 22:49:06 +0100 Message-Id: <20190219214940.391081-1-arnd@arndb.de> X-Mailer: git-send-email 2.20.0 MIME-Version: 1.0 X-Provags-ID: V03:K1:f/vy0JI+ZBaJTq6VorjxfZ+Z5wOykJeG99zj8JlrGsVU3qMEfOd bQ+6pv6D6Jw8ngrIrUXVVKww3K/C4f9onMQI3AXmTeiBfkLNhn9tUkEI9309roY1VJQD4l+ POCSLpy/4elQKj8Q1dBr727CZWoQG/yf3L3hPTq9bRY1hS40VEv+Tx+sINobUFlK2u0fGOp xPMSbqqNkE00rzLyLJsHg== X-Spam-Flag: NO X-UI-Out-Filterresults: notjunk:1; V03:K0:sp9Y7cWE308=:KoAkoM0T8AYyR3hrEqo349 AuKYP93+lEdQJ9V19lvqT+F4WaMD9SPI2/ZLibTatcCjV2Dlr5igZn2gNsfj7Y4Zdd5mPElZd wbhaFNRyN6WrrPWmp7HCz8Jb6v7FrrxRZx5B8OynoD+4Hasxvdk97uXu55DNCP/NwJEQea2gd 7FVJE94gnFjaTGeuSkzAxMkFOR+QQ9JA3Zx/nG19dyclL7oWvT1H1XLcz1QWaGevL1dyUYyFj FOCllSZzmDkDnindfWq+T/vcUyvNTeDhTju/zZpGETT8ge9+m5NJ8s+P0ZZvMxio0pl45t1G2 3YK1oJZXb+mpls6rHrIa4UKzGhlJrF+uBTe/n2pYQAWV1RF9s7zwKTjEEBfUE2BZCoNsvYvEt 7ErSTzK9e7NKFJ5wUennshlSndxkekluR2Xigc8r4Ss4WinZrMxm0dPo3H6J4/t8dHmFqjbQV pqfj4enxUM9+af3WLDcsgtgECTWIytrzIOBJEhP1vtbdlQD1paD26OJkf9tCWDhmY6G9y76lf E4zRUh0xU6UX3+SyMAn9duhRFLZb/6Zcd2+36JMU6X6Cab8YK2+HYuDewSW/gENRS59sQ6D1+ 2g/mSCxCZ9w8rsmIjRSKN68RHyYXLnPUlhPajeDaBxeY0nBjvhCvC1ncn1ekBzt8IsOn2hp5A owhx+BWDQ3o+9m8NsRiUtWVyE+6naRukufBUVdID9w14udfefLfja4ACb3VU6dE3u1Zo5kE2I pJh73o8sVGWUykkmjSs5yRtGP2wlNa824DvygA== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Building an arm64 allmodconfig kernel with clang results in over 140 warnings about overly large stack frames, the worst ones being: drivers/gpu/drm/panel/panel-sitronix-st7789v.c:196:12: error: stack frame size of 20224 bytes in function 'st7789v_prepare' drivers/video/fbdev/omap2/omapfb/displays/panel-tpo-td028ttec1.c:196:12: error: stack frame size of 13120 bytes in function 'td028ttec1_panel_enable' drivers/usb/host/max3421-hcd.c:1395:1: error: stack frame size of 10048 bytes in function 'max3421_spi_thread' drivers/net/wan/slic_ds26522.c:209:12: error: stack frame size of 9664 bytes in function 'slic_ds26522_probe' drivers/crypto/ccp/ccp-ops.c:2434:5: error: stack frame size of 8832 bytes in function 'ccp_run_cmd' drivers/media/dvb-frontends/stv0367.c:1005:12: error: stack frame size of 7840 bytes in function 'stv0367ter_algo' None of these happen with gcc today, and almost all of these are the result of a single known bug in llvm. Hopefully it will eventually get fixed with the clang-9 release. In the meantime, the best idea I have is to turn off asan-stack for clang-8 and earlier, so we can produce a kernel that is safe to run. I have posted three patches that address the frame overflow warnings that are not addressed by turning off asan-stack, so in combination with this change, we get much closer to a clean allmodconfig build, which in turn is necessary to do meaningful build regression testing. Cc: Andrey Ryabinin Cc: Dmitry Vyukov Cc: Nick Desaulniers Cc: Mark Brown Cc: Qian Cai Link: https://bugs.llvm.org/show_bug.cgi?id=38809 Signed-off-by: Arnd Bergmann --- lib/Kconfig.kasan | 13 +++++++++++++ scripts/Makefile.kasan | 2 +- 2 files changed, 14 insertions(+), 1 deletion(-) -- 2.20.0 diff --git a/lib/Kconfig.kasan b/lib/Kconfig.kasan index 67d7d1309c52..219cddc913ac 100644 --- a/lib/Kconfig.kasan +++ b/lib/Kconfig.kasan @@ -103,6 +103,19 @@ config KASAN_INLINE endchoice +config KASAN_STACK + int + default 0 if CC_IS_CLANG && (CLANG_VERSION < 90000) + default 1 + help + The LLVM stack address sanitizer has a know bug that + causes excessive stack usage in a lot of functions, see + https://bugs.llvm.org/show_bug.cgi?id=38809 + Disabling asan-stack makes it safe to run kernels build + with clang-8 with KASAN enabled, though it loses some of + the functionality. We assume that clang-9 will have a fix, + so the feature can be used. + config KASAN_S390_4_LEVEL_PAGING bool "KASan: use 4-level paging" depends on KASAN && S390 diff --git a/scripts/Makefile.kasan b/scripts/Makefile.kasan index f1fb8e502657..6410bd22fe38 100644 --- a/scripts/Makefile.kasan +++ b/scripts/Makefile.kasan @@ -26,7 +26,7 @@ else CFLAGS_KASAN := $(CFLAGS_KASAN_SHADOW) \ $(call cc-param,asan-globals=1) \ $(call cc-param,asan-instrumentation-with-call-threshold=$(call_threshold)) \ - $(call cc-param,asan-stack=1) \ + $(call cc-param,asan-stack=$(CONFIG_KASAN_STACK)) \ $(call cc-param,asan-instrument-allocas=1) endif