From patchwork Sat Jul 27 15:02:36 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Masahiro Yamada X-Patchwork-Id: 13743755 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 4FFAE18132A; Sat, 27 Jul 2024 15:03:13 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1722092593; cv=none; b=VzpBCbCBa3zXZyvH8FPbxN0/8ocW3LuiG+1tFjL5Dg3grVJc88bvurwSsoToN/L+srfdr8kG+OxJO01jfuHN1gotF9Km+6MT0pO5ttLatqDqvk+sde5lsaXOBY6ScU7MI2Ejr4VfMbNSccqa9TMFRQRuVkVhGI5DlLntzjsTiok= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1722092593; c=relaxed/simple; bh=cbx1YE48B0umWKjby4D8iyQs0I9pecobsv9rKwrf2TU=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=Mb7NACoQMcV+Kco8N1SuQmq9A7B2VK2yl8Js+faC3VEaFNDSuqS2RtYgjWGxP0m8z1YtyoeRon0noXrFwGPHhnjeGwnH+JQJiR7oYifxcx7ox2y7/N7GQePB79p/GRSKDhe0ZERfupp9B6A9QJpA4+JtiyVMnGAwkVBhUeASo1U= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=jWkuW7HA; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="jWkuW7HA" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 29486C4AF0A; Sat, 27 Jul 2024 15:03:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1722092593; bh=cbx1YE48B0umWKjby4D8iyQs0I9pecobsv9rKwrf2TU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=jWkuW7HAzR0gw+6wM8OI2NwsPCW2Fv1qaRUgiQLNHFHZj+zSpiwKk1L3vwv2LHe5U 4O1xNzfFTF9vP0iGtf5sq1VYJrox04hb5lnBJQz+M1WyWPtDXL6MsZg/TWUUjMtgXq YP+2l2QHIQEZgpayLAL2+/e57mQQG5gHVnLZgHt9S8X5e9YlODmgJ5LtZDPgndguk5 CCkDML8P2I6uDdNCCEsZGZ2V2aKf52wA7iGgLOTse3L4cBs5FYNhcMSN+5Qz70j6Tu 6HfD6VKILUIG/rLjIv7xNHrTPKWQCbgfpRHGx1+7EMLsj+blN858YAQUUo3w8dlkt8 dhbq51cjjBTcQ== From: Masahiro Yamada To: Kees Cook Cc: linux-kernel@vger.kernel.org, Masahiro Yamada , Andrew Morton , linux-hardening@vger.kernel.org Subject: [PATCH v2 1/3] fortify: refactor test_fortify Makefile to fix some build problems Date: Sun, 28 Jul 2024 00:02:36 +0900 Message-ID: <20240727150302.1823750-2-masahiroy@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240727150302.1823750-1-masahiroy@kernel.org> References: <20240727150302.1823750-1-masahiroy@kernel.org> Precedence: bulk X-Mailing-List: linux-hardening@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 There are some issues in the test_fortify Makefile code. Problem 1: cc-disable-warning invokes compiler dozens of times To see how many times the cc-disable-warning is evaluated, change this code: $(call cc-disable-warning,fortify-source) to: $(call cc-disable-warning,$(shell touch /tmp/fortify-$$$$)fortify-source) Then, build the kernel with CONFIG_FORTIFY_SOURCE=y. You will see a large number of '/tmp/fortify-' files created: $ ls -1 /tmp/fortify-* | wc 80 80 1600 This means the compiler was invoked 80 times just for checking the -Wno-fortify-source flag support. $(call cc-disable-warning,fortify-source) should be added to a simple variable instead of a recursive variable. Problem 2: do not recompile string.o when the test code is updated The test cases are independent of the kernel. However, when the test code is updated, $(obj)/string.o is rebuilt and vmlinux is relinked due to this dependency: $(obj)/string.o: $(obj)/$(TEST_FORTIFY_LOG) always-y is suitable for building the log files. Problem 3: redundant code clean-files += $(addsuffix .o, $(TEST_FORTIFY_LOGS)) ... is unneeded because the top Makefile globally cleans *.o files. This commit fixes these issues and makes the code readable. Signed-off-by: Masahiro Yamada --- (no changes since v1) lib/.gitignore | 2 -- lib/Makefile | 38 +------------------------------------ lib/test_fortify/.gitignore | 2 ++ lib/test_fortify/Makefile | 28 +++++++++++++++++++++++++++ 4 files changed, 31 insertions(+), 39 deletions(-) create mode 100644 lib/test_fortify/.gitignore create mode 100644 lib/test_fortify/Makefile diff --git a/lib/.gitignore b/lib/.gitignore index 54596b634ecb..101a4aa92fb5 100644 --- a/lib/.gitignore +++ b/lib/.gitignore @@ -5,5 +5,3 @@ /gen_crc32table /gen_crc64table /oid_registry_data.c -/test_fortify.log -/test_fortify/*.log diff --git a/lib/Makefile b/lib/Makefile index 322bb127b4dc..4df3c28b23b4 100644 --- a/lib/Makefile +++ b/lib/Makefile @@ -393,40 +393,4 @@ obj-$(CONFIG_GENERIC_LIB_DEVMEM_IS_ALLOWED) += devmem_is_allowed.o obj-$(CONFIG_FIRMWARE_TABLE) += fw_table.o -# FORTIFY_SOURCE compile-time behavior tests -TEST_FORTIFY_SRCS = $(wildcard $(src)/test_fortify/*-*.c) -TEST_FORTIFY_LOGS = $(patsubst $(src)/%.c, %.log, $(TEST_FORTIFY_SRCS)) -TEST_FORTIFY_LOG = test_fortify.log - -quiet_cmd_test_fortify = TEST $@ - cmd_test_fortify = $(CONFIG_SHELL) $(srctree)/scripts/test_fortify.sh \ - $< $@ "$(NM)" $(CC) $(c_flags) \ - $(call cc-disable-warning,fortify-source) \ - -DKBUILD_EXTRA_WARN1 - -targets += $(TEST_FORTIFY_LOGS) -clean-files += $(TEST_FORTIFY_LOGS) -clean-files += $(addsuffix .o, $(TEST_FORTIFY_LOGS)) -$(obj)/test_fortify/%.log: $(src)/test_fortify/%.c \ - $(src)/test_fortify/test_fortify.h \ - $(srctree)/include/linux/fortify-string.h \ - $(srctree)/scripts/test_fortify.sh \ - FORCE - $(call if_changed,test_fortify) - -quiet_cmd_gen_fortify_log = GEN $@ - cmd_gen_fortify_log = cat /dev/null > $@ || true - -targets += $(TEST_FORTIFY_LOG) -clean-files += $(TEST_FORTIFY_LOG) -$(obj)/$(TEST_FORTIFY_LOG): $(addprefix $(obj)/, $(TEST_FORTIFY_LOGS)) FORCE - $(call if_changed,gen_fortify_log) - -# Fake dependency to trigger the fortify tests. -ifeq ($(CONFIG_FORTIFY_SOURCE),y) -$(obj)/string.o: $(obj)/$(TEST_FORTIFY_LOG) -endif - -# Some architectures define __NO_FORTIFY if __SANITIZE_ADDRESS__ is undefined. -# Pass CFLAGS_KASAN to avoid warnings. -$(foreach x, $(patsubst %.log,%.o,$(TEST_FORTIFY_LOGS)), $(eval KASAN_SANITIZE_$(x) := y)) +subdir-$(CONFIG_FORTIFY_SOURCE) += test_fortify diff --git a/lib/test_fortify/.gitignore b/lib/test_fortify/.gitignore new file mode 100644 index 000000000000..c1ba37d14b50 --- /dev/null +++ b/lib/test_fortify/.gitignore @@ -0,0 +1,2 @@ +# SPDX-License-Identifier: GPL-2.0-only +/*.log diff --git a/lib/test_fortify/Makefile b/lib/test_fortify/Makefile new file mode 100644 index 000000000000..3907a2242ef9 --- /dev/null +++ b/lib/test_fortify/Makefile @@ -0,0 +1,28 @@ +# SPDX-License-Identifier: GPL-2.0 + +ccflags-y := $(call cc-disable-warning,fortify-source) + +quiet_cmd_test_fortify = TEST $@ + cmd_test_fortify = $(CONFIG_SHELL) $(srctree)/scripts/test_fortify.sh \ + $< $@ "$(NM)" $(CC) $(c_flags) -DKBUILD_EXTRA_WARN1 + +$(obj)/%.log: $(src)/%.c $(srctree)/scripts/test_fortify.sh \ + $(src)/test_fortify.h \ + $(srctree)/include/linux/fortify-string.h \ + FORCE + $(call if_changed,test_fortify) + +logs = $(patsubst $(src)/%.c, %.log, $(wildcard $(src)/*-*.c)) +targets += $(logs) + +quiet_cmd_gen_fortify_log = CAT $@ + cmd_gen_fortify_log = cat $(or $(real-prereqs),/dev/null) > $@ + +$(obj)/test_fortify.log: $(addprefix $(obj)/, $(logs)) FORCE + $(call if_changed,gen_fortify_log) + +always-y += test_fortify.log + +# Some architectures define __NO_FORTIFY if __SANITIZE_ADDRESS__ is undefined. +# Pass CFLAGS_KASAN to avoid warnings. +KASAN_SANITIZE := y From patchwork Sat Jul 27 15:02:37 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Masahiro Yamada X-Patchwork-Id: 13743756 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 266C1181B99; Sat, 27 Jul 2024 15:03:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1722092595; cv=none; b=Y+Qh6Zff7ycjlGt4h6j7pTi3QJSru8e7uBV3RbwRpJmcH57A8hXGtO8a/AiQkMq5BU//PLbUObkRrDyxnG8+T+nEo3s02r6hH9iRJFoYZ7TwgsQSDUR/QvbXXbA5KBAviCScb77cM2G9FPGYTa9xMI5lHvKyrhFN+HW0RR/wygs= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1722092595; c=relaxed/simple; bh=Tu01D0s1mcrNeWCedJqo217lE1eCAdLxxFPJZWU9A0E=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=R6mKr8+PRL7Eu44lficbREScLDLenIJz4f1ZROBblfTsVrVTFgVgTOvQ5sYpExrRNOz/ZzlXQQ2vSrWKzBYgpLukkiFuOn0f9Qrj+8wRRSffi0Pr/i0HHn1joVqj9WQ+HFppxwvx23wm/LDHaBT6J8oCN7LhOGX2XOBqdl3X9Bg= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=anr3Y+XU; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="anr3Y+XU" Received: by smtp.kernel.org (Postfix) with ESMTPSA id A4DAFC32781; Sat, 27 Jul 2024 15:03:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1722092594; bh=Tu01D0s1mcrNeWCedJqo217lE1eCAdLxxFPJZWU9A0E=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=anr3Y+XU0Bl8OFoUhQLo/BsmAI1bYRjFVYKHgNBdrKdNe6hMzNbnedFSoGrVV0m7Z K8Q/igpC8AX6Jdzc4iGoPT6PMSQAL4Ynv4b/0xAvDFWH5iU++gi4wM4TDpRAnoq55b CEuV3SAm2b2nsyfhJ2yRCcWdkIfEf0tpL6CKLLpYzsVo6YAg5aHAmi8X1dVuYAtY8L 4lfna5WxptIav1gpJ9aYwPY84ReovbDuLd2+Kfriz9ngyL4HthV0Cj3Fr8nP6+nbLR ghmzrHQq6+CF26KSBXylHnMGTXCbWy247R+prGbRFdWkCNk829QopP8SyVLHmCcGqm /1S72WmItYB1Q== From: Masahiro Yamada To: Kees Cook Cc: linux-kernel@vger.kernel.org, Masahiro Yamada , linux-hardening@vger.kernel.org Subject: [PATCH v2 2/3] fortify: move test_fortify.sh to lib/test_fortify/ Date: Sun, 28 Jul 2024 00:02:37 +0900 Message-ID: <20240727150302.1823750-3-masahiroy@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240727150302.1823750-1-masahiroy@kernel.org> References: <20240727150302.1823750-1-masahiroy@kernel.org> Precedence: bulk X-Mailing-List: linux-hardening@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 This script is only used in lib/test_fortify/. There is no reason to keep it in scripts/. Signed-off-by: Masahiro Yamada --- (no changes since v1) MAINTAINERS | 1 - lib/test_fortify/Makefile | 4 ++-- {scripts => lib/test_fortify}/test_fortify.sh | 0 3 files changed, 2 insertions(+), 3 deletions(-) rename {scripts => lib/test_fortify}/test_fortify.sh (100%) diff --git a/MAINTAINERS b/MAINTAINERS index 85fbbc25112f..6e14bd77e3c8 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -8758,7 +8758,6 @@ F: include/linux/fortify-string.h F: lib/fortify_kunit.c F: lib/memcpy_kunit.c F: lib/test_fortify/* -F: scripts/test_fortify.sh K: \b__NO_FORTIFY\b FPGA DFL DRIVERS diff --git a/lib/test_fortify/Makefile b/lib/test_fortify/Makefile index 3907a2242ef9..1826172c32d4 100644 --- a/lib/test_fortify/Makefile +++ b/lib/test_fortify/Makefile @@ -3,10 +3,10 @@ ccflags-y := $(call cc-disable-warning,fortify-source) quiet_cmd_test_fortify = TEST $@ - cmd_test_fortify = $(CONFIG_SHELL) $(srctree)/scripts/test_fortify.sh \ + cmd_test_fortify = $(CONFIG_SHELL) $(src)/test_fortify.sh \ $< $@ "$(NM)" $(CC) $(c_flags) -DKBUILD_EXTRA_WARN1 -$(obj)/%.log: $(src)/%.c $(srctree)/scripts/test_fortify.sh \ +$(obj)/%.log: $(src)/%.c $(src)/test_fortify.sh \ $(src)/test_fortify.h \ $(srctree)/include/linux/fortify-string.h \ FORCE diff --git a/scripts/test_fortify.sh b/lib/test_fortify/test_fortify.sh similarity index 100% rename from scripts/test_fortify.sh rename to lib/test_fortify/test_fortify.sh From patchwork Sat Jul 27 15:02:38 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Masahiro Yamada X-Patchwork-Id: 13743757 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id B19DB181BB6; Sat, 27 Jul 2024 15:03:16 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1722092596; cv=none; b=r18MEhCVu12CNuGmaxYfQWKsngAthaxs66jpbjpXlg8Te6Bnj5kTAu0niF78hyFAycFkaxzxnwb2Um930b3Qr2SRq0V+3Tzs2O9ibhzPKnGaB/aMk4W6aFaINXM/vECum6XWUFY6nXT18+un5inTJs4f3ZrR8rdBFdor5EUAw54= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1722092596; c=relaxed/simple; bh=2yN/VlmMFTF0afGkVkVR3CjBLMIjxBvcVSugI531oxo=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=Ne8XPWoKw0JvhZH2bsRtyPU/0cknAsHoGr9AVtZJj4SDGN9viZJ3wY7nOPh3xmoZy3BVRUqdPFqSJMZfzWooVJYQHxLFmutvHpyAPoIQ1fX/RT2Q92RinK0iqGZQC9czkUohSXpyY1IYYDvC5JGdbIVF7ks7LUjBvWaBL2au1W8= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=DZtkBBrq; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="DZtkBBrq" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 0C65FC4AF0E; Sat, 27 Jul 2024 15:03:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1722092596; bh=2yN/VlmMFTF0afGkVkVR3CjBLMIjxBvcVSugI531oxo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DZtkBBrqPGXadpPWuVSHyE5SQVu6SX8uQr5Az7bnSlKgCcb75L1TuNW6kYSuRNm3+ 75iJm3+jT8lfta+KUZgf/vT1UePanwawebFNNT6JBxoXyFjDVa/DnzvoqCHiHseVEF 1+VJTzm6DzfFLkLxVzbfXIY0TfeQE6Ru3R2NopknaRVg4iJaUk7OqIKR90JR37HYVZ N9dtvA6wfxugMvEEBaN9OoRFmUcuShcMJfoW9QR3fe2177xc5Z6sZ8JxziaqmRJzGI WB0sJiRIKbA8swl6f41CUBICnJXz6Y1YW84CsjWhwvLTVqMPVQtrhOA61q373JD/TL nMPd1pIUchLYg== From: Masahiro Yamada To: Kees Cook Cc: linux-kernel@vger.kernel.org, Masahiro Yamada , Bill Wendling , Justin Stitt , Nathan Chancellor , Nick Desaulniers , linux-hardening@vger.kernel.org, llvm@lists.linux.dev Subject: [PATCH v2 3/3] fortify: use if_changed_dep to record header dependency in *.cmd files Date: Sun, 28 Jul 2024 00:02:38 +0900 Message-ID: <20240727150302.1823750-4-masahiroy@kernel.org> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20240727150302.1823750-1-masahiroy@kernel.org> References: <20240727150302.1823750-1-masahiroy@kernel.org> Precedence: bulk X-Mailing-List: linux-hardening@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 After building with CONFIG_FORTIFY_SOURCE=y, many .*.d files are left in lib/test_fortify/ because the compiler outputs header dependencies into *.d without fixdep being invoked. When compiling C files, if_changed_dep should be used so that the auto-generated header dependencies are recorded in .*.cmd files. Currently, if_changed is incorrectly used, and only two headers are hard-coded in lib/Makefile. In the previous patch version, the kbuild test robot detected new errors on GCC 7. GCC 7 or older does not produce test.d with the following test code: $ echo 'void b(void) __attribute__((__error__(""))); void a(void) { b(); }' | gcc -Wp,-MMD,test.d -c -o /dev/null -x c - Perhaps, this was a bug that existed in older GCC versions. Skip the tests for GCC<=7 for now, as this will be eventually solved when we bump the minimal supported GCC version. Link: https://lore.kernel.org/oe-kbuild-all/CAK7LNARmJcyyzL-jVJfBPi3W684LTDmuhMf1koF0TXoCpKTmcw@mail.gmail.com/T/#m13771bf78ae21adff22efc4d310c973fb4bcaf67 Signed-off-by: Masahiro Yamada --- Changes in v2: - Skip the tests for GCC <= 7 lib/test_fortify/Makefile | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/lib/test_fortify/Makefile b/lib/test_fortify/Makefile index 1826172c32d4..1c3f82ad8bb2 100644 --- a/lib/test_fortify/Makefile +++ b/lib/test_fortify/Makefile @@ -6,11 +6,8 @@ quiet_cmd_test_fortify = TEST $@ cmd_test_fortify = $(CONFIG_SHELL) $(src)/test_fortify.sh \ $< $@ "$(NM)" $(CC) $(c_flags) -DKBUILD_EXTRA_WARN1 -$(obj)/%.log: $(src)/%.c $(src)/test_fortify.sh \ - $(src)/test_fortify.h \ - $(srctree)/include/linux/fortify-string.h \ - FORCE - $(call if_changed,test_fortify) +$(obj)/%.log: $(src)/%.c $(src)/test_fortify.sh FORCE + $(call if_changed_dep,test_fortify) logs = $(patsubst $(src)/%.c, %.log, $(wildcard $(src)/*-*.c)) targets += $(logs) @@ -21,7 +18,10 @@ quiet_cmd_gen_fortify_log = CAT $@ $(obj)/test_fortify.log: $(addprefix $(obj)/, $(logs)) FORCE $(call if_changed,gen_fortify_log) -always-y += test_fortify.log +# GCC<=7 does not always produce *.d files. +# Run the tests only for GCC>=8 or Clang. +always-$(call gcc-min-version, 80000) += test_fortify.log +always-$(CONFIG_CC_IS_CLANG) += test_fortify.log # Some architectures define __NO_FORTIFY if __SANITIZE_ADDRESS__ is undefined. # Pass CFLAGS_KASAN to avoid warnings.