From patchwork Tue Mar 29 12:39:41 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Alexander Potapenko X-Patchwork-Id: 12794762 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 57246C433F5 for ; Tue, 29 Mar 2022 12:41:05 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id B3A488D0008; Tue, 29 Mar 2022 08:41:04 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id A6FFA8D0007; Tue, 29 Mar 2022 08:41:04 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 93A3F8D0008; Tue, 29 Mar 2022 08:41:04 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from forelay.hostedemail.com (smtprelay0112.hostedemail.com [216.40.44.112]) by kanga.kvack.org (Postfix) with ESMTP id 7CB9F8D0007 for ; Tue, 29 Mar 2022 08:41:04 -0400 (EDT) Received: from smtpin20.hostedemail.com (10.5.19.251.rfc1918.com [10.5.19.251]) by forelay04.hostedemail.com (Postfix) with ESMTP id 36B0BA3241 for ; Tue, 29 Mar 2022 12:41:04 +0000 (UTC) X-FDA: 79297383648.20.5BBEE09 Received: from mail-ed1-f74.google.com (mail-ed1-f74.google.com [209.85.208.74]) by imf24.hostedemail.com (Postfix) with ESMTP id 9C08918000C for ; Tue, 29 Mar 2022 12:41:03 +0000 (UTC) Received: by mail-ed1-f74.google.com with SMTP id o20-20020aa7dd54000000b00413bc19ad08so10968337edw.7 for ; Tue, 29 Mar 2022 05:41:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=date:in-reply-to:message-id:mime-version:references:subject:from:to :cc; bh=cXkdgZbGJwU6k8snEczoh0k/WkFNvdUgCw+ayF9WLuQ=; b=kJ3CEmpah2i9qEH7T+C5Ga2iXnj2Y+3RwMf8YqsmELN6LOISLHU5lU3es8dFXLXr4G RwvPPr+lXFQJJVB8eC5SfjBqsSq8LtpCHYf3AswzsXu/1NhBVq2D9gsP4OH2L4CTMT4M htWXUw29Be33vwaebXorL3fSnDwOI8IYefJyHWs3/4YxoYcA+PWRfpq7JHQ6XEzLzzbD FlQgRQzQ9K3/oO1RgYlOuEtyVvqXUpOZFhIl55G6hZ3TouP4qi7NusxxsF5cTKn2krfS X+VguAz0cQlQcgvkoFLT3U0fU9ShmiXto/lOzeXy+6A0JzZKD80LdngdHu/dWikUglw0 6J5w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:date:in-reply-to:message-id:mime-version :references:subject:from:to:cc; bh=cXkdgZbGJwU6k8snEczoh0k/WkFNvdUgCw+ayF9WLuQ=; b=jflW9+Wmnyh7reEOsozZMChKoXP8agA3jPVOgYrRyhgPYJtRMrfWdYZo1AB1YV9iYY VdQX/QTinsH6jr3wbjK6uVC5ydn6FlF31xrR6xjXE1JcklpiB84/NRghQn+cY1YYCAf2 U71nG1pz8sMYzbV2ovN1b5GbXgJtjCLoyBiLBTHBtC9goPgeC29GGZko49R3lYUFX5I+ hYR32EluG42IbDLnk8GJI7MoObGHddCQs3GPnFHTb3GWeP3YrMexjObq/YbrZ2LtgRjT EMcNTOVnkFGvyd7usubiwWWcw5ZSz/crNFz48walkvA+UGIkOifbe4u+KSecszBPK6hR 6a7g== X-Gm-Message-State: AOAM532LO6l1EWuO5D/8mgfeIntEhBVPtV/PASPKOp/kUdwNx0ItCOMk dpjCGcT4TWd5+dBhAsIRBEQxsTKAhoA= X-Google-Smtp-Source: ABdhPJywI+kpf/WbEulTkI+WWQEh96+s7tqreK3VONJIUmDgWPb5bSFILSkC6rnkhNtKnHdOQAMR0bfb/+4= X-Received: from glider.muc.corp.google.com ([2a00:79e0:15:13:36eb:759:798f:98c3]) (user=glider job=sendgmr) by 2002:a17:906:9743:b0:6d8:632a:a42d with SMTP id o3-20020a170906974300b006d8632aa42dmr34840939ejy.157.1648557662237; Tue, 29 Mar 2022 05:41:02 -0700 (PDT) Date: Tue, 29 Mar 2022 14:39:41 +0200 In-Reply-To: <20220329124017.737571-1-glider@google.com> Message-Id: <20220329124017.737571-13-glider@google.com> Mime-Version: 1.0 References: <20220329124017.737571-1-glider@google.com> X-Mailer: git-send-email 2.35.1.1021.g381101b075-goog Subject: [PATCH v2 12/48] kcsan: clang: retire CONFIG_KCSAN_KCOV_BROKEN From: Alexander Potapenko To: glider@google.com Cc: Alexander Viro , Andrew Morton , Andrey Konovalov , Andy Lutomirski , Arnd Bergmann , Borislav Petkov , Christoph Hellwig , Christoph Lameter , David Rientjes , Dmitry Vyukov , Eric Dumazet , Greg Kroah-Hartman , Herbert Xu , Ilya Leoshkevich , Ingo Molnar , Jens Axboe , Joonsoo Kim , Kees Cook , Marco Elver , Mark Rutland , Matthew Wilcox , "Michael S. Tsirkin" , Pekka Enberg , Peter Zijlstra , Petr Mladek , Steven Rostedt , Thomas Gleixner , Vasily Gorbik , Vegard Nossum , Vlastimil Babka , linux-mm@kvack.org, linux-arch@vger.kernel.org, linux-kernel@vger.kernel.org Authentication-Results: imf24.hostedemail.com; dkim=pass header.d=google.com header.s=20210112 header.b=kJ3CEmpa; spf=pass (imf24.hostedemail.com: domain of 3Xv5CYgYKCH8jolghujrrjoh.frpolqx0-ppnydfn.ruj@flex--glider.bounces.google.com designates 209.85.208.74 as permitted sender) smtp.mailfrom=3Xv5CYgYKCH8jolghujrrjoh.frpolqx0-ppnydfn.ruj@flex--glider.bounces.google.com; dmarc=pass (policy=reject) header.from=google.com X-Rspam-User: X-Rspamd-Server: rspam10 X-Rspamd-Queue-Id: 9C08918000C X-Stat-Signature: dztx79anpc3m7nwrjt17dy61bnnsyuqi X-HE-Tag: 1648557663-212924 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: kcov used to be broken prior to Clang 11, but right now that version is already the minimum required to build with KCSAN, because no prior compiler has "-tsan-distinguish-volatile=1". Therefore KCSAN_KCOV_BROKEN is not needed anymore. Suggested-by: Marco Elver Signed-off-by: Alexander Potapenko --- Link: https://linux-review.googlesource.com/id/Ida287421577f37de337139b5b5b9e977e4a6fee2 --- lib/Kconfig.kcsan | 11 ----------- 1 file changed, 11 deletions(-) diff --git a/lib/Kconfig.kcsan b/lib/Kconfig.kcsan index 63b70b8c55519..de022445fbba5 100644 --- a/lib/Kconfig.kcsan +++ b/lib/Kconfig.kcsan @@ -10,21 +10,10 @@ config HAVE_KCSAN_COMPILER For the list of compilers that support KCSAN, please see . -config KCSAN_KCOV_BROKEN - def_bool KCOV && CC_HAS_SANCOV_TRACE_PC - depends on CC_IS_CLANG - depends on !$(cc-option,-Werror=unused-command-line-argument -fsanitize=thread -fsanitize-coverage=trace-pc) - help - Some versions of clang support either KCSAN and KCOV but not the - combination of the two. - See https://bugs.llvm.org/show_bug.cgi?id=45831 for the status - in newer releases. - menuconfig KCSAN bool "KCSAN: dynamic data race detector" depends on HAVE_ARCH_KCSAN && HAVE_KCSAN_COMPILER depends on DEBUG_KERNEL && !KASAN - depends on !KCSAN_KCOV_BROKEN select STACKTRACE help The Kernel Concurrency Sanitizer (KCSAN) is a dynamic