From nobody Sun Oct 5 16:18:50 2025 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 90AC9225793 for ; Fri, 1 Aug 2025 09:28:10 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.140.110.172 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1754040493; cv=none; b=ZpMT50sVOQMWob5LZ8g+ZcnX3QRq5eeAnsQjni5SVgx8PXa6enaVgTzFTRBw9NAKceZ7LtwfzBP7oQlBKXFNJ/J2oNusogAGUkLCt5UOQ8lbhybLJmIIHcdCoxhSjnInMEdd97Sl6qOaGtGsWbGYFsnDINujuiyZ/Mc1+5nOWoY= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1754040493; c=relaxed/simple; bh=X3OyRbnd9tzDjFgTDuxacn2jSWdNOiudDnCqVY7X/Ro=; h=From:To:Cc:Subject:Date:Message-Id:MIME-Version; b=o3HlZlaD/86faHiz57ISslpjzY595TsPHL6WLVXq7Qur2UIme/4t9B2uh6hUN/nuk8xIeARSW6AL3XBSlCdEMa7OGXzdrnLHJfYAKbaKSBtD2Eeqro/V5Zx4sZkOgZfTfLWadbdjnlGnWjmSvmE496kn5fwKU7/R17pdB2QH3YM= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com; spf=pass smtp.mailfrom=arm.com; arc=none smtp.client-ip=217.140.110.172 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=arm.com Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 6CA46169C; Fri, 1 Aug 2025 02:28:01 -0700 (PDT) Received: from e129823.cambridge.arm.com (e129823.arm.com [10.1.197.6]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id BEE833F66E; Fri, 1 Aug 2025 02:28:07 -0700 (PDT) From: Yeoreum Yun To: thomas.weissschuh@linutronix.de, ryabinin.a.a@gmail.com, glider@google.com, andreyknvl@gmail.com, dvyukov@google.com, vincenzo.frascino@arm.com, akpm@linux-foundation.org Cc: kasan-dev@googlegroups.com, linux-mm@kvack.org, linux-kernel@vger.kernel.org, Yeoreum Yun Subject: [PATCH v2] kasan: disable kasan_strings() kunit test when CONFIG_FORTIFY_SOURCE enabled Date: Fri, 1 Aug 2025 10:28:05 +0100 Message-Id: <20250801092805.2602490-1-yeoreum.yun@arm.com> X-Mailer: git-send-email 2.34.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" When CONFIG_FORTIFY_SOURCE is enabled, invalid access from source triggers __fortify_panic() which kills running task. This makes failured of kasan_strings() kunit testcase since the kunit-try-cacth kthread running kasan_string() dies before checking the fault. To address this, add define for __NO_FORTIFY for kasan kunit test. Signed-off-by: Yeoreum Yun --- mm/kasan/Makefile | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/mm/kasan/Makefile b/mm/kasan/Makefile index dd93ae8a6beb..b70d76c167ca 100644 --- a/mm/kasan/Makefile +++ b/mm/kasan/Makefile @@ -44,6 +44,10 @@ ifndef CONFIG_CC_HAS_KASAN_MEMINTRINSIC_PREFIX CFLAGS_KASAN_TEST +=3D -fno-builtin endif +ifdef CONFIG_FORTIFY_SOURCE +CFLAGS_KASAN_TEST +=3D -D__NO_FORTIFY +endif + CFLAGS_REMOVE_kasan_test_c.o +=3D $(call cc-option, -Wvla-larger-than=3D1) CFLAGS_kasan_test_c.o :=3D $(CFLAGS_KASAN_TEST) RUSTFLAGS_kasan_test_rust.o :=3D $(RUSTFLAGS_KASAN) -- LEVI:{C3F47F37-75D8-414A-A8BA-3980EC8A46D7}