From nobody Thu Apr 2 14:08:57 2026 Received: from mail-oi1-f202.google.com (mail-oi1-f202.google.com [209.85.167.202]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A47A11A683B for ; Fri, 27 Mar 2026 21:59:23 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.167.202 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1774648764; cv=none; b=Ocl4I6qy5Rp6kWEDEJjAffoyuUqzEnXniDB0R9weIUiGnhR3j4RivKn7jCEWiRgse5FANfNEoW/5rtFKinAJAGqSmqZRYdVndS3B9+ox9j1eN50BI3qMAeTdDPiNsf1d+Yf+yLrhWEfti2Yvl+zyWPxhp7u6aqjxhk+X5j3BdDs= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1774648764; c=relaxed/simple; bh=pUs9THT6DHn2Yh3ii6ZcA4QCK2Rk+meZhFMzqf6DDdM=; h=Date:Mime-Version:Message-ID:Subject:From:To:Cc:Content-Type; b=mRODKsQcmXsg6+9a7C4j9NJBDNrsQ/JQWc715/85+NyPJWlfP4O2UrFci0A6PYWbKI7fdGsPKzCszXzF36rvNqdmYn+1nAlBRYa0X4q39r1oU9qr2ifonWOywXwhDattAHFXhU8JCBg+Q39i88kJVZEjOEyke7c/ZYQMnk9JC0k= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--justinstitt.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=VZIH5by/; arc=none smtp.client-ip=209.85.167.202 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--justinstitt.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="VZIH5by/" Received: by mail-oi1-f202.google.com with SMTP id 5614622812f47-467e8aaa943so3700147b6e.0 for ; Fri, 27 Mar 2026 14:59:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20251104; t=1774648762; x=1775253562; darn=vger.kernel.org; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=bXUVdAQ2VqEkZsnQST785FFjZDxfkqJqi9/U/lqUA6Q=; b=VZIH5by/m6oTllUU7nNVJJ95qe9bfSBbFQlFQIe64LEloQSfH11ZFjvff2hniaa5L4 j1U5u6f+tnrj2ECwVcQyGCXVyZxTwa/CsQiVOzXgdjeF0OlyqocOgn5pi7Vu2FcvAcGW WkHQxZZCAV2VNiTphXrut5E3IfrIU0E9ZvsH7v3MOlnWQA1/A3ZiS9GD94u08r5squpq 0fz91WBUrWr/46MkT7VkJsPN2Eci2uzQo3zkp829bbEmseMr67hkcm/v+fkplYxnY7Lx kmd2Nv7r3ZCNW2trTYGUFBq6M4qNZiinBwny3l2gkZPW9YctL7S0IU/DVwDHTYeno0PE 88ow== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1774648762; x=1775253562; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=bXUVdAQ2VqEkZsnQST785FFjZDxfkqJqi9/U/lqUA6Q=; b=dp72lLJDln4kkJZw0woqAUjpa6xuwYDOyeeJqobCQLAodjIA6k/YeKWeAhTUke2C46 cG1jBvZ+4d+B6eKQyHhlAg8qKnVC8awixfZj21L4ju+D2qP8T3+75DlcW335VP+V6dJT NYDkuEd38lsBxX4Loh6sLE/zZ0cVoPlNJjEEYwZiGsvmRQXVx5+KlmPfuSkWzEc9V/x7 Ou0d70aau2stG3wz2U4tl5R9EFh2Tcv9sxYy6Of+bW+Q4titJQ+7IN4ukB5wwoXoDgCZ E/QBzYMNy9510SDulw4AkDYXgqQgDRMzWnxtHe5srdGIEUcYo+b5TOjBfhVAZOaP5M+A mN8w== X-Forwarded-Encrypted: i=1; AJvYcCWfCeGlG2knLOANTRn9C5my8fxAXuEVKE4YdKZlH852T5NXVU/hnKuXZlNh3mzPFY9/WdRz+6U+g7LvPAw=@vger.kernel.org X-Gm-Message-State: AOJu0YzeFqt40rMetu+LTkCZZTH0nQllnJrB5l64J4cvRcRU+L3qaTfd uFdb8rEhev4wDI351yKxTekTMUaCmwre3WWkjuHK5BfdRjl1qMVARh7oJ062xcBTnEckUwEYgYx aAJx4y9d1pkcCMGhJVZFu/06R5Q== X-Received: from ilqp16.prod.google.com ([2002:a92:da50:0:b0:4f8:400c:308c]) (user=justinstitt job=prod-delivery.src-stubby-dispatcher) by 2002:a05:6820:2914:b0:67c:1fc7:daa6 with SMTP id 006d021491bc7-67e185f1e03mr2232968eaf.10.1774648762484; Fri, 27 Mar 2026 14:59:22 -0700 (PDT) Date: Fri, 27 Mar 2026 14:59:20 -0700 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 X-B4-Tracking: v=1; b=H4sIALf9xmkC/4WNQQ6CMBBFr0Jm7RimBFBX3sOwQDq0E7ElrVYN4 e5WLuDyveS/v0DkIBzhVCwQOEkU7zLQroDB9s4wis4MqlRNWakWb9enTBqj9S8UN4kTZ7CuW12 RVupY9ZCnc+BR3lv20mW2Eh8+fLaXRD/7J5gICUs6MI3UsK75bLw3E+8Hf4duXdcvKFk4JbkAA AA= X-Change-Id: 20260327-kbuild-show-inlining-557d31d2293a X-Developer-Key: i=justinstitt@google.com; a=openpgp; fpr=6E3AADB90F44DA9EB9CDCB6799D922A9379F2964 X-Developer-Signature: v=1; a=openpgp-sha256; l=1492; i=justinstitt@google.com; h=from:subject:message-id; bh=pUs9THT6DHn2Yh3ii6ZcA4QCK2Rk+meZhFMzqf6DDdM=; b=owEBbQKS/ZANAwAKAZnZIqk3nylkAcsmYgBpxv25vibCsY1AcfNIAiZK8Vc/x2WLaiNGyz8wL lmTfG9BTk+JAjMEAAEKAB0WIQRuOq25D0TanrnNy2eZ2SKpN58pZAUCacb9uQAKCRCZ2SKpN58p ZLU1EACPMFCyHnqyHs0hybIGSIyVIGgZ/EC39mnSfbpMvEbeiRMmQCDGF3Om16lIpbta6E4UfhV lRPmgkNnhH0H+eaVbn7EOZJZjYS0Gw87mvWkf/JpIctlcLdIunaLhAo4swGR0JqNvOYmcjZeWTo Me3aZ4OIKy4o/VsXhpVxP+zZJJs6zw5oRyN9BMtJgF4k0RMwvIYyOiqlmtvM+fNv61qtMao5edX opyhtyLTmH3oR8f5GqmzkPy/9b2tp9sUMTz6u7V0X0Mq6rHfPGuq1HBDk/3EF+KBScS4W4nrF33 KznPxAiCKmI6sE94Ms1Uvgnz8PEHuPVdKeR3QxvoToA2iGZGsmzjaKzeMJXzkKCgDhXR2MdB7YZ bTlwLCR0VMZ0k/hi596pixgUOLd9QXV7LHk43gXFZw+fogrn3OFRiv6gZvr+EeIYIlK41vzaztO mm8SlKR0rgkKVfYUMahdozruDXiCvHm2DhtjEJ0kIOSk7PWyXJQsxzbGUYXjUr7n/+6xLrDjvif szb84/+QmluBK+Yu6rpfOeSHiJPnTEVHK5WN/4kAZTcfgE5gJEobyBItW+RyvL77WA4GthXdQtW 92oxCWnREqxnbAKdQBTCV3YC05/mhXafL2uRjpY3GRNvu6pDyFSieuQoz1ur/D/2rTH2Lmoa2PL VOKxRXMf7K5KwRg== X-Mailer: b4 0.14.3 Message-ID: <20260327-kbuild-show-inlining-v1-1-730ac2cae571@google.com> Subject: [PATCH] kbuild: add -fdiagnostics-show-inlining-chain for FORTIFY_SOURCE From: Justin Stitt To: Nathan Chancellor , Nicolas Schier , Nick Desaulniers , Bill Wendling Cc: Kees Cook , linux-kbuild@vger.kernel.org, linux-kernel@vger.kernel.org, llvm@lists.linux.dev, Justin Stitt Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Clang recently added -fdiagnostics-show-inlining-chain [1] to improve the visibility of inlining chains in diagnostics. This is particularly useful for CONFIG_FORTIFY_SOURCE where detections can happen deep in inlined functions. Add this flag to KBUILD_CFLAGS when CONFIG_FORTIFY_SOURCE is enabled and the compiler supports it. Link: https://github.com/llvm/llvm-project/pull/174892 [1] Link: https://github.com/ClangBuiltLinux/linux/issues/1571 Signed-off-by: Justin Stitt --- Makefile | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/Makefile b/Makefile index e1279c4d5b24..978726aeb1ef 100644 --- a/Makefile +++ b/Makefile @@ -973,6 +973,12 @@ KBUILD_CFLAGS +=3D $(call cc-option, -fno-stack-clash-= protection) # Get details on warnings generated due to GCC value tracking. KBUILD_CFLAGS +=3D $(call cc-option, -fdiagnostics-show-context=3D2) =20 +# Show inlining chain notes for FORTIFY_SOURCE-related diagnostics. +# GCC does this by default while Clang 23+ supports a flag. +ifdef CONFIG_FORTIFY_SOURCE +KBUILD_CFLAGS +=3D $(call cc-option, -fdiagnostics-show-inlining-chain) +endif + # Clear used registers at func exit (to reduce data lifetime and ROP gadge= ts). ifdef CONFIG_ZERO_CALL_USED_REGS KBUILD_CFLAGS +=3D -fzero-call-used-regs=3Dused-gpr --- base-commit: 7df48e36313029e4c0907b2023905dd7213fd678 change-id: 20260327-kbuild-show-inlining-557d31d2293a Best regards, --=20 Justin Stitt