On 04/03/2026 01:38, Thomas Huth wrote:
On 04/03/2026 02.08, Yodel Eldar wrote:
+Daniel (thanks for your comments)

On 02/03/2026 19:20, Yodel Eldar wrote:
From: Yodel Eldar <[email protected]>

Builds with --enable-{asan,tsan,safe-stack} fail under GCC, so use
clang if available, otherwise disable the treatment of warnings as
errors.

Resolves: https://gitlab.com/qemu-project/qemu/-/issues/3006
Suggested-by: Peter Maydell <[email protected]>
Signed-off-by: Yodel Eldar <[email protected]>
---
Hi,

The previous version only disabled Werror whenever `--skip-meson` wasn't
used and the build occurred in a git repo, but this change should
probably apply to all types of builds. So, let's use meson_option_add
to globally disable Werror instead; IIUC (and according to my testing),
this will override the value in config-meson.cross.new.

I'm still not sure if we should be disabling Werror for ubsan, even
though it's not currently breaking builds with GCC; please let me know
what you think.

Special thanks to Peter for looking into the cause of the reports around
this, for sharing the findings, and suggesting approaches to resolve it.
I couldn't pick one over the other, so I went with using clang when
available with Werror disable as a fallback; please let me know if you
think this is an XOR kind of policy decision.

Link to RFCv1:
https://lore.kernel.org/qemu-devel/20260302210039.261325-1- [email protected]/

Link to mentioned discussion:
https://lore.kernel.org/qemu-devel/ cafeaca88hc4usgpupxbwpben0tw26159kpn7jx2j9erba5d...@mail.gmail.com/

v2:
- Fix misnomer in commit message
- Simplify condition by using the same variable for all sanitizers
- Use meson_option_add to disable Werror

Thanks,
Yodel
---
  configure | 18 ++++++++++++++++++
  1 file changed, 18 insertions(+)

diff --git a/configure b/configure
index 5e114acea2..e457e8a17d 100755
--- a/configure
+++ b/configure
@@ -762,6 +762,12 @@ for opt do
    ;;
    --wasm64-32bit-address-limit)
    ;;
+  --enable-asan) use_sanitizer="yes"
+  ;;
+  --enable-tsan) use_sanitizer="yes"
+  ;;
+  --enable-safe-stack) use_sanitizer="yes"
+  ;;
    # everything else has the same name in configure and meson
    --*) meson_option_parse "$opt" "$optarg"
    ;;
@@ -771,6 +777,18 @@ for opt do
    esac
  done
+if test "$use_sanitizer" = "yes"; then
+    if has clang; then
+        echo "Sanitizer requested: setting compiler suite to clang"
+        cc=clang
+        cxx=clang++
+        host_cc=clang
+    else
+        echo "Sanitizer requested: disabling Werror for non-clang compilers"
+        meson_option_add -Dwerror=false
+    fi
+fi
+
  if ! test -e "$source_path/.git"
  then
      git_submodules_action="validate"

We could treat the rtl8139 as a one-off by carving out the
offending code with a GCC pragma or finagling GCC into cooperation
by substituting eth_payload_data with the expression assigned to it
(thank you, Thomas and Daniel, respectively); indeed, AFAICT the
rtl8139 is currently the only code that triggers the GCC bug
(and is overdue for a refactor/cleanup), so it's tempting to go with
either of these helpful suggestions; *however*, until the GCC team
fixes their buggy pairing between sanitizer and -Werror
(a pairing that they themselves disavow [1]), IMHO there's a
significant risk of recurrence if we went with either option, and
it's not clear to me whether reviewers will be able easily spot the
next one before it's too late (post-acceptance).

That said, I fully share Daniel's concerns about "overriding the
user's choice of compiler"; so, what if we instead moved the
sanitizer check into the existing "Preferred compiler" section
in configure, such that we only set cc=clang when the user hasn't
explicitly specified CC/CXX (diff below)? Note: there's already
precedent for this with the Obj-C compiler [2].

I'm definitely onboard with Daniel's warning message in meson whenever
the user: 1) explicitly opts for gcc/g++, 2) enables sanitizers, and 3)
-Werror is enabled. At the risk of overengineering, though, what if we
made it an error message instead, and gave users an escape hatch like
`--force-werror-sanitizers` (name TBD)? I can see that being too much,
but it may prevent some grief if they missed the warning, and the build
breaks several minutes later. WDYT? It's not included in the diff below,
but I'll gladly add it to v3 if there's interest; if not, I'll go with
the warning message as suggested.

I think I would rather avoid another switch like --force-werror- sanitizers and making it a hard error instead of a warning. Think of the point in time when GCC fixed their bug - if someone then wants to compile QEMU with that new GCC, this becomes rather obstructive.


A good point I had not considered, though it may favor the hard error:
if GCC resolves the bug on their end while we've got a gate (with a
switch) around it, we may hear the good news sooner, because of the
increased visibility (or obstructiveness); thus, we may be better
situated to promptly tear the gate down if/when that time comes as
compared to a missable warning that may get ignored well after GCC
releases an immune version.

Furthermore, I think the timeliness concern will apply to most
solutions, because the issue stems from an external dependency, and
any workaround will become redundant upon upstream resolution.

Alternative idea: What about adding -Wno-stringop-overflow to the CFLAGS when we detect the problematic situation (GCC + sanitizers + -Werror)? Then the build could also continue with GCC without running into the problem.


This seems like a major improvement over local pragmas insofar as it
will prevent future occurrences of -Wstringop-overflow false positives,
but over time this may end up growing into a denylist of all of the
warning flags that confuse GCC + sanitizers, and it could be painful
iteratively expanding that list, because we might catch the triggers
ex post facto.

Moreover, if my reading of Peter's description of the GCC bug is
correct [1], then my guess is that a fix may require a nontrivial
redesign that won't be easily backportable for them, so we may end up
in a situation where we also have to account for the user's GCC version
to judiciously apply the piecemeal exclusion of warning flags to only
the versions that are unable to handle them correctly, and that has the
potential of getting messy pretty quickly (unless we decide to treat
all versions the same, or have a cutoff for supported versions).

In that regard, Daniel's substitution method would fare better, but it
doesn't prevent build breakage before they occur, it may only apply to
stringop-overflow false positives (TBD), and it may come at the cost
of code clarity or expressiveness.

That said, selecting a compiler on behalf of users, as I've proposed,
might subvert environmental expectations and cause problems for them.
Furthermore, my concerns remain largely speculative; so, I'd like to
further monitor the bug to see how it develops upstream GCC.
Thus, I'm formally withdrawing the patch for now.

Thank you to Peter, Thomas, and Daniel for the lively discussion!

Regards,
Yodel

[1] https://lore.kernel.org/qemu-devel/CAFEAcA_nCSah+orZrMvsit=iwwp8o9j_y8fg7smjp7xev0_...@mail.gmail.com/

  Thomas




Reply via email to