From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 82089A3160 for ; Wed, 9 Oct 2019 16:26:00 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 66B171E545; Wed, 9 Oct 2019 16:25:59 +0200 (CEST) Received: from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com [67.231.148.174]) by dpdk.org (Postfix) with ESMTP id A23831E53A for ; Wed, 9 Oct 2019 16:25:57 +0200 (CEST) Received: from pps.filterd (m0045849.ppops.net [127.0.0.1]) by mx0a-0016f401.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id x99EPu1P015892; Wed, 9 Oct 2019 07:25:56 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-id : content-transfer-encoding : mime-version; s=pfpt0818; bh=082hP2XZZI5vidQYwq4oVMUxnnN278lJhGNo21fvbY8=; b=sO7pBREXM/kfe3FMSL2H+p7hADhib5h2aH0DlcyP76rCd7ZTEyuf8CUJe5ZR9wGI9fJU P9BmEC56f0/bPqVgxRJh64x8dXfkTJOiV5knB/11ugfnFC88aB4JZK+9PHQau32Etg5S YQxcU5DClY8Q/aP6ODiwW+948x/MZ3WsWiQymg5vPjuCPxmsEZhgFfdTe9ffrJDUHbPL Pt6l6XoafZh+1xu8UkMgxkksqiLNJiuXEIMARk38bAkzRkmd/5xQ8unLKIp3cVwjwh2v BNic8uKKQEpAKvriVPs8zzSqCrX/wgC8RjDFjJXNsVRgSQFiweFUksXV258s5jyiAeGN mQ== Received: from sc-exch02.marvell.com ([199.233.58.182]) by mx0a-0016f401.pphosted.com with ESMTP id 2vh5rqjdxs-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Wed, 09 Oct 2019 07:25:56 -0700 Received: from SC-EXCH02.marvell.com (10.93.176.82) by SC-EXCH02.marvell.com (10.93.176.82) with Microsoft SMTP Server (TLS) id 15.0.1367.3; Wed, 9 Oct 2019 07:25:55 -0700 Received: from NAM05-CO1-obe.outbound.protection.outlook.com (104.47.48.54) by SC-EXCH02.marvell.com (10.93.176.82) with Microsoft SMTP Server (TLS) id 15.0.1367.3 via Frontend Transport; Wed, 9 Oct 2019 07:25:55 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=KKpfSXAy71bASSFIhVeRdRfUP+nPHYXRhGOwhJCgcaXbqEtSosoqx0AEHXQ6d9V/8RH7g14JS058ixhR9WqLSBzDLgWwIi/cI6Pd6ue5QlYJ2SaaGPPi7fSRb3fwIOpi03w3nxzm++WK0xTNHlnlJWkSAtmLKKEe/yohy6TobQKLv0Plv8AxFpvLdpobyLpw+igVr6+1Pnlnaugzt0Lm6hSzHE894Rayg4KnEY7oK8bM38ryuvCLZJzS5UUUiEzrXoubinDeZjqbQiqs+z42AW7Ho92DDe3Yrmve0b3MVMYERpT0GWlp/I5qIiGXdCjcffuSI+vnztkTqF7XZKmrag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=082hP2XZZI5vidQYwq4oVMUxnnN278lJhGNo21fvbY8=; b=faGYpNV/BFr1iBoyBR/q03OvpQROphHc0d8H0F67yRP6BFN4TnuyTYuwnfwBjoJ4hrZdFWWsVp0kYRZe6cYYgdzj3dDbClvdZEWi2RH6QtunqIm8xIfOBe9XVZkwqiM00lDeJZNaKZFnB9N4JWfbb7vJ+eZqwGehjOM8xNABFWmPeveRl7yWQclnY92ncIcEEukrRL6sFnk5Upe2pnSavXlfqrPKyhEWRwIi7PEX4Y7Vev+7gXCou6HaN3Su4tGniT+KZcwrYehsUFQ/BCUB2Mn4DUu5c3IC0RFwCCj6njH114xJz3UGsfNuuhIQCxWzHcSK/DiAeSlSHf057S4Mcw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=marvell.com; dmarc=pass action=none header.from=marvell.com; dkim=pass header.d=marvell.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.onmicrosoft.com; s=selector2-marvell-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=082hP2XZZI5vidQYwq4oVMUxnnN278lJhGNo21fvbY8=; b=OzM25fN+QwL+tE2AYtHKNvGaY8jq9xW+s9Cl6bUm7JASldnDE2nN+Qd+o7n4L2n+/oJKpiHGnz5fmKivWGUMRjZQBiL3QTiW6+LVCzM3ZHo6pssVKyWoNI0qLZcCWry1ONiJtHxNWO7t2bmegF4fAwwaAAju4+FI+nrYG9OkHBk= Received: from MN2PR18MB2848.namprd18.prod.outlook.com (20.179.21.149) by MN2PR18MB2880.namprd18.prod.outlook.com (20.179.22.78) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2327.23; Wed, 9 Oct 2019 14:25:53 +0000 Received: from MN2PR18MB2848.namprd18.prod.outlook.com ([fe80::cc97:455d:adca:ef1e]) by MN2PR18MB2848.namprd18.prod.outlook.com ([fe80::cc97:455d:adca:ef1e%4]) with mapi id 15.20.2327.026; Wed, 9 Oct 2019 14:25:53 +0000 From: Harman Kalra To: Thomas Monjalon , John McNamara , Marko Kovacevic , "Bruce Richardson" CC: "dev@dpdk.org" Thread-Topic: [dpdk-dev] [PATCH] mk: add support for UBSAN Thread-Index: AQHVVpTDs7FnaDuo7UCImNLU+qa6/acp/xsAgCiuhAA= Date: Wed, 9 Oct 2019 14:25:52 +0000 Message-ID: <20191009142524.GA8087@outlook.office365.com> References: <1566222457-17342-1-git-send-email-hkalra@marvell.com> <20190913114026.GA172657@outlook.office365.com> In-Reply-To: <20190913114026.GA172657@outlook.office365.com> Accept-Language: en-GB, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: BM1PR0101CA0008.INDPRD01.PROD.OUTLOOK.COM (2603:1096:b00:18::18) To MN2PR18MB2848.namprd18.prod.outlook.com (2603:10b6:208:3e::21) x-ms-exchange-messagesentrepresentingtype: 1 x-originating-ip: [115.113.156.2] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: f99f62b4-c67e-4399-3b85-08d74cc496e3 x-ms-traffictypediagnostic: MN2PR18MB2880: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:7691; x-forefront-prvs: 018577E36E x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(376002)(136003)(346002)(366004)(39860400002)(396003)(189003)(199004)(446003)(55236004)(81166006)(6436002)(2906002)(6512007)(30864003)(1076003)(26005)(8936002)(6116002)(9686003)(229853002)(486006)(305945005)(6486002)(102836004)(6246003)(81156014)(7736002)(4326008)(476003)(11346002)(5660300002)(8676002)(6506007)(386003)(186003)(86362001)(3846002)(25786009)(33656002)(316002)(52116002)(99286004)(14454004)(66946007)(14444005)(256004)(110136005)(76176011)(478600001)(71200400001)(71190400001)(66066001)(66556008)(66446008)(64756008)(66476007); DIR:OUT; SFP:1101; SCL:1; SRVR:MN2PR18MB2880; H:MN2PR18MB2848.namprd18.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; received-spf: None (protection.outlook.com: marvell.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: iPSLFDBJ5csCuEV6lNjsNTNRRngHkRWJ7PVCSJKClC/FojneGawW002r5IBoJpQfQzK/h0TlY9QE9DX+FI9xC5DlPjcvzx5ULtPfaHRQ9TuCpcDvwWlxPIMa5NLS3F2rgDSN+MqXUuCmRkkhOp6gT5do/KKp1sRfdZ/8JE7y+SqcfIHtv6qQRWjsfFD1O8ZHp+AZYCPYt/lGEkpxZJ+n/LkQsr09/sMOuYwHMVp/SiLg5fIk+WgeO8aLAVn7AoCVAneEl4aRLKoXLr3oH6NUK1diO2rcv7PdkTZ/MPl7XfqX5LG5vfcEuLTIgY4rds/TyLZppx+hQZyM9suSYHZyuP3WirMcESZ4Kq5nAqHvuVFe11XW1XDABxUDyJtt1MqOrGCNo5ev+pAoU+8z6Sez5rP1tCk6sh8uKWbllzSIqXM= x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="us-ascii" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-CrossTenant-Network-Message-Id: f99f62b4-c67e-4399-3b85-08d74cc496e3 X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Oct 2019 14:25:52.9487 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 70e1fb47-1155-421d-87fc-2e58f638b6e0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: nqjioVevxOlYBc+bJ8GoFd5Y7+g/klSAWw+Q16SKatk/p1Ai96o9gX3DYflFlkTIYh3ShN535WLptDce4U0MYw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR18MB2880 X-OriginatorOrg: marvell.com X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.95,1.0.8 definitions=2019-10-09_06:2019-10-08,2019-10-09 signatures=0 Subject: Re: [dpdk-dev] [PATCH] mk: add support for UBSAN X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Ping.. On Fri, Sep 13, 2019 at 11:40:40AM +0000, Harman Kalra wrote: > Ping.. > Kindly review this patch. >=20 > On Mon, Aug 19, 2019 at 07:18:21PM +0530, Harman Kalra wrote: > > UndefinedBehaviorSanitizer (UBSan) is a fast undefined behavior > > detector. UBSan modifies the program at compile-time to catch > > various kinds of undefined behavior during program execution. > >=20 > > This patch implements support for UBSan to the DPDK. > >=20 > > See: doc/guides/prog_guide/ubsan.rst for more information. > >=20 > > Signed-off-by: Harman Kalra > > --- > > config/common_base | 6 ++ > > config/meson.build | 15 ++++ > > doc/guides/prog_guide/index.rst | 1 + > > doc/guides/prog_guide/ubsan.rst | 112 +++++++++++++++++++++++++ > > doc/guides/rel_notes/release_19_11.rst | 7 ++ > > meson_options.txt | 2 + > > mk/rte.app.mk | 10 +++ > > mk/rte.lib.mk | 12 +++ > > mk/toolchain/clang/rte.vars.mk | 4 + > > mk/toolchain/gcc/rte.vars.mk | 8 ++ > > 10 files changed, 177 insertions(+) > > create mode 100644 doc/guides/prog_guide/ubsan.rst > >=20 > > diff --git a/config/common_base b/config/common_base > > index 8ef75c203..b47a6f28e 100644 > > --- a/config/common_base > > +++ b/config/common_base > > @@ -1067,3 +1067,9 @@ CONFIG_RTE_APP_CRYPTO_PERF=3Dy > > # Compile the eventdev application > > # > > CONFIG_RTE_APP_EVENTDEV=3Dy > > + > > +# > > +# Enable undefined behavior sanitizer > > +# > > +CONFIG_RTE_UBSAN=3Dn > > +CONFIG_RTE_UBSAN_SANITIZE_ALL=3Dn > > diff --git a/config/meson.build b/config/meson.build > > index 2bafea530..6a2fa117d 100644 > > --- a/config/meson.build > > +++ b/config/meson.build > > @@ -196,3 +196,18 @@ add_project_arguments('-D_GNU_SOURCE', language: '= c') > > if is_freebsd > > add_project_arguments('-D__BSD_VISIBLE', language: 'c') > > endif > > + > > +# enable ubsan > > +if get_option('enable_ubsan') > > + if cc.has_argument('-fsanitize=3Dundefined') > > + ubsan_dep =3D cc.find_library('libubsan', required: false) > > + if ubsan_dep.found() > > + add_project_arguments('-fsanitize=3Dundefined', language: 'c') > > + add_project_link_arguments('-fsanitize=3Dundefined', language: 'c') > > + else > > + message('libubsan not found, UBSAN cannot be enabled') > > + endif > > + else > > + message('gcc version does not support UBSAN') > > + endif > > +endif > > diff --git a/doc/guides/prog_guide/index.rst b/doc/guides/prog_guide/in= dex.rst > > index 692409af8..970901e9a 100644 > > --- a/doc/guides/prog_guide/index.rst > > +++ b/doc/guides/prog_guide/index.rst > > @@ -66,4 +66,5 @@ Programmer's Guide > > perf_opt_guidelines > > writing_efficient_code > > profile_app > > + ubsan > > glossary > > diff --git a/doc/guides/prog_guide/ubsan.rst b/doc/guides/prog_guide/ub= san.rst > > new file mode 100644 > > index 000000000..cb19f3bd9 > > --- /dev/null > > +++ b/doc/guides/prog_guide/ubsan.rst > > @@ -0,0 +1,112 @@ > > +.. SPDX-License-Identifier: BSD-3-Clause > > + Copyright(c) 2019 Marvell International Ltd. > > + > > +The Undefined Behavior Sanitizer - UBSan > > +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > > + > > +UndefinedBehaviorSanitizer (UBSan) is a runtime undefined behavior det= ector. > > +UBSan uses compile-time instrumentation and modifies the program by ad= ding > > +some stubs which perform certain checks before operations that might c= ause > > +undefined behaviour. If some UB detected, respective _UBSan_handle_* h= andlers > > +(which are defined in libUBSan library) are called to prints the error= message. > > + > > +Some examples of undefined behaviour checks: > > + > > +* Misaligned memory access > > +* Signed integer overflow > > +* Load from/store to an object with insufficient space. > > +* Integer divide by zero as well as INT_MIN / -1 division > > +* Out-of-bounds memory accesses. > > +* Null argument declared with nonnull attribute, returned null from fu= nction > > + which never returns null, null ptr dereference > > +* Variable size array with non-positive length > > + > > +GCC supports this feature since 4.9, however GCC 5.0 onwards has many = more > > +checkers implemented. > > + > > +Example UBSan error > > +-------------------- > > + > > +Following error was reported when UBSan was enabled: > > + > > +.. code-block:: console > > + > > + drivers/net/octeontx2/otx2_stats.c:82:26: runtime error: left shif= t of > > + 1 by 31 places cannot be represented in type 'int' > > + > > +Code responsible for this error: > > + > > +.. code-block:: c > > + > > + if (dev->txmap[i] & (1 << 31)) { > > + > > +To fix this error: > > + > > +.. code-block:: c > > + > > + if (dev->txmap[i] & (1U << 31)) { > > + > > +Usage > > +----- > > + > > +make build > > +^^^^^^^^^^ > > + > > +To enable UBSan, enable following configuration: > > + > > +.. code-block:: console > > + > > + CONFIG_RTE_UBSAN=3Dy > > + > > +UBSan framework supports three modes: > > + > > +1. Enable UBSan on the entire DPDK source code - set following configu= ration: > > + > > +.. code-block:: console > > + > > + CONFIG_RTE_UBSAN_SANITIZE_ALL=3Dy > > + > > +2. Enable UBSan on a particular library or PMD - add the following lin= e to the > > + respective Makefile of the library or PMD > > + (make sure ``CONFIG_RTE_UBSAN_SANITIZE_ALL=3Dn``). This will instru= ment only > > + the library or PMD and not the entire repository. > > + > > +.. code-block:: console > > + > > + UBSAN_SANITIZE :=3D y > > + > > +3. Disable UBSan for a particular library or PMD - add the following l= ine to > > + the respective Makefile of the library or PMD. Make sure > > + ``CONFIG_RTE_UBSAN_SANITIZE_ALL=3Dy`` config is set. This will inst= rument > > + entire DPDK repository but not this specific library or PMD. > > + > > +.. code-block:: console > > + > > + UBSAN_SANITIZE :=3D n > > + > > +.. Note:: > > + > > + Standard DPDK applications like test, testpmd, etc. cannot be > > + chosen explicitly for UBSan check, like libraries or PMD. The reason= is, > > + say UBSan is enabled for library X, and ``UBSAN_SANITIZE=3Dy`` is no= t added > > + in Makefile of app Y which uses X APIs. This will lead to undefined > > + reference to _UBSan_handle_* handlers as Y is not compiled with UBSa= n flags. > > + Hence UBSan check is enabled for all standard DPDK applications as s= oon as > > + ``CONFIG_RTE_UBSAN=3Dy`` is set. > > + > > +meson build > > +^^^^^^^^^^^ > > + > > +To enable UBSan in meson build system, use following meson build comma= nd: > > + > > +**Example usage:** > > + > > +.. code-block:: console > > + > > + meson build -Denable_ubsan=3Dtrue > > + ninja -C build > > + > > +.. Note:: > > + > > + Meson build works only in one mode i.e. UBSan can be enabled for > > + the entire DPDK sources and not individual libraries or PMD, like ma= ke build. > > diff --git a/doc/guides/rel_notes/release_19_11.rst b/doc/guides/rel_no= tes/release_19_11.rst > > index 8490d897c..cfefdbeec 100644 > > --- a/doc/guides/rel_notes/release_19_11.rst > > +++ b/doc/guides/rel_notes/release_19_11.rst > > @@ -56,6 +56,13 @@ New Features > > Also, make sure to start the actual text at the margin. > > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > > =20 > > +* **Added Undefined Behavior Sanitizer framework.** > > + > > + UBSan is a fast runtime undefined behavior detector which uses compi= le-time > > + instrumentation and modifies the program by adding some stubs that p= erform > > + certain checks before operations that might cause undefined behavior= . > > + > > + See :doc:`../prog_guide/ubsan` for more information: > > =20 > > Removed Items > > ------------- > > diff --git a/meson_options.txt b/meson_options.txt > > index 448f3e63d..fb0aead00 100644 > > --- a/meson_options.txt > > +++ b/meson_options.txt > > @@ -8,6 +8,8 @@ option('enable_docs', type: 'boolean', value: false, > > description: 'build documentation') > > option('enable_kmods', type: 'boolean', value: true, > > description: 'build kernel modules') > > +option('enable_ubsan', type: 'boolean', value: false, > > + description: 'Enables undefined behavior sanitizer') > > option('examples', type: 'string', value: '', > > description: 'Comma-separated list of examples to build by default') > > option('flexran_sdk', type: 'string', value: '', > > diff --git a/mk/rte.app.mk b/mk/rte.app.mk > > index ba5c39e01..9ea421a83 100644 > > --- a/mk/rte.app.mk > > +++ b/mk/rte.app.mk > > @@ -374,6 +374,16 @@ endif > > =20 > > MAPFLAGS =3D -Map=3D$@.map --cref > > =20 > > +# > > +# If UBSAN is enabled, all application will be compiled with > > +# '-fsanitize=3Dundefined' flag > > +# > > +ifeq ($(CONFIG_RTE_UBSAN),y) > > +ifeq ($(UBSAN_ENABLE),y) > > +CFLAGS +=3D -fsanitize=3Dundefined > > +endif > > +endif > > + > > .PHONY: all > > all: install > > =20 > > diff --git a/mk/rte.lib.mk b/mk/rte.lib.mk > > index 4df8849a0..33f5746c8 100644 > > --- a/mk/rte.lib.mk > > +++ b/mk/rte.lib.mk > > @@ -29,6 +29,18 @@ CPU_LDFLAGS +=3D --version-script=3D$(SRCDIR)/$(EXPO= RT_MAP) > > endif > > endif > > =20 > > +# > > +# If UBSAN is enabled, lib to undergo check can be chosen > > +# by setting UBSAN_SANITIZE=3Dy in respective lib Makefile > > +# else set CONFIG_RTE_UBSAN_SANITIZE_ALL=3Dy to enforce check > > +# on entire repo. > > +# > > +ifeq ($(CONFIG_RTE_UBSAN),y) > > +ifeq ($(UBSAN_ENABLE),y) > > +CFLAGS +=3D $(if $(patsubst %n,,$(CONFIG_RTE_UBSAN_SANITIZE_ALL)$(UBSA= N_SANITIZE)) \ > > + , -fsanitize=3Dundefined) > > +endif > > +endif > > =20 > > _BUILD =3D $(LIB) > > PREINSTALL =3D $(SYMLINK-FILES-y) > > diff --git a/mk/toolchain/clang/rte.vars.mk b/mk/toolchain/clang/rte.va= rs.mk > > index 3c49dc568..623780106 100644 > > --- a/mk/toolchain/clang/rte.vars.mk > > +++ b/mk/toolchain/clang/rte.vars.mk > > @@ -56,5 +56,9 @@ ifeq ($(shell test $(CLANG_MAJOR_VERSION) -ge 4 && ec= ho 1), 1) > > WERROR_FLAGS +=3D -Wno-address-of-packed-member > > endif > > =20 > > +ifeq ($(CONFIG_RTE_UBSAN),y) > > +UBSAN_ENABLE :=3D y > > +endif > > + > > export CC AS AR LD OBJCOPY OBJDUMP STRIP READELF > > export TOOLCHAIN_CFLAGS TOOLCHAIN_LDFLAGS TOOLCHAIN_ASFLAGS > > diff --git a/mk/toolchain/gcc/rte.vars.mk b/mk/toolchain/gcc/rte.vars.m= k > > index b852fcfd7..d40e14d61 100644 > > --- a/mk/toolchain/gcc/rte.vars.mk > > +++ b/mk/toolchain/gcc/rte.vars.mk > > @@ -90,5 +90,13 @@ endif > > # disable packed member unalign warnings > > WERROR_FLAGS +=3D -Wno-address-of-packed-member > > =20 > > +ifeq ($(CONFIG_RTE_UBSAN),y) > > +ifeq ($(shell test $(GCC_VERSION) -lt 49 && echo 1), 1) > > +$(warning UBSAN not supported gcc < 4.9) > > +else > > +UBSAN_ENABLE =3D y > > +endif > > +endif > > + > > export CC AS AR LD OBJCOPY OBJDUMP STRIP READELF > > export TOOLCHAIN_CFLAGS TOOLCHAIN_LDFLAGS TOOLCHAIN_ASFLAGS > > --=20 > > 2.18.0 > >=20