Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp14187131pxu; Mon, 4 Jan 2021 15:35:53 -0800 (PST) X-Google-Smtp-Source: ABdhPJxAVymUC7e/tlK3/2U7jQjg1xcaZRGXLzoNBferDBEF43At8rk+xBSaVqGbpxMFFASXD6jN X-Received: by 2002:a05:6402:1714:: with SMTP id y20mr71562930edu.360.1609803353256; Mon, 04 Jan 2021 15:35:53 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1609803353; cv=none; d=google.com; s=arc-20160816; b=M6Av0DxpToXiVNg64LzkxupwfjUJ4fzUUUnwR0j9dieDbDXIzzrYgquAxQ2MV0aAoj L2XL7hPH54MKxsarV+Sr1ZLf6MdwbKCF4XbeYcctFnMn0Ll66VtTGGa8qneuPIMdALVc kbIxVV92q9VxUtl8C5uFudcL4XZpNbnGdEacvb4/yMuQ47uHbYw00hq8GoncKsZixtKO IkpKXT01soTYRFqSQ5lTlMN2FiRGmX6IfzutSkXNK3G+ZW93ZN2kwSDM91M5Wm/kM+i5 aZaMpeYnQ6/WNkNXoW70hHGrZe2pkxrIRvclkLL+l4inVOvYURtRmKifEMQoqwu+TbHs PoAQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=1KVe2J+YannpkkWUZqt2Uq/KJcVTjct/OgswGlunXN4=; b=Yo0OT/IhmlLj0/b4d1Hz7lIX7L23F503DeQrYgcoUgrj9VhnhazHkkAq7iDAQGf8lX AzlT/jYq2YTxIeCWdbFSa0hcJMTGI464BSiMCc2eFQ5J08YxAfCRKR8LK552k+Z4ochL nkwECUn6O+bP8bagyVkzsrxWpuRsiu8Ly1lyKQ4fhh6yX6wexNDrgDfNtCXAp+Wa6Ve/ CFKbic+k8hPO6UNWz0t1zOpdKp/0SMHUe52TzELtZy243/cDI0/i5m4vpFSgTvQ6afSx jO9vo7L7+BoIEbIGgdQhyOXBKcGJLbSiYvMX9Jg/eOxQeDC8b4v5VOZ9BoxLxHtHwXAa 8kqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=AmtRy2OB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id c22si33563498edj.34.2021.01.04.15.35.29; Mon, 04 Jan 2021 15:35:53 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linux-foundation.org header.s=korg header.b=AmtRy2OB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727485AbhADXeP (ORCPT + 99 others); Mon, 4 Jan 2021 18:34:15 -0500 Received: from mail.kernel.org ([198.145.29.99]:56860 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727268AbhADXeP (ORCPT ); Mon, 4 Jan 2021 18:34:15 -0500 Received: by mail.kernel.org (Postfix) with ESMTPSA id 79EB022286; Mon, 4 Jan 2021 23:33:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linux-foundation.org; s=korg; t=1609803214; bh=QAOQZTl/XC6cCUB+ppcK623n++34N2sso+HmUuS+NKM=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=AmtRy2OBEKXkVl/pql/O8Rw/uvhd7Ryld1OE4VDPPWSvED+rd7Sz8XRwH4fXz6Vu8 FieE3Rwzx00/Xbo57v78SLJ0FpLtq/4WoLimkTllvL6CMYMkaXpcOhAGAZ5FYRehPI yGdwLDlHOXt1pCRAYwH9Pi+J1HR2c8THbTNyMXHU= Date: Mon, 4 Jan 2021 15:33:33 -0800 From: Andrew Morton To: Nathan Chancellor Cc: Marco Elver , Arnd Bergmann , Kees Cook , Arnd Bergmann , Nick Desaulniers , George Popescu , Stephen Rothwell , LKML , clang-built-linux Subject: Re: [PATCH] ubsan: disable unsigned-integer-overflow sanitizer with clang Message-Id: <20210104153333.4b6c7ae49edc4182d53bd17f@linux-foundation.org> In-Reply-To: <20210104223336.GA2562866@ubuntu-m3-large-x86> References: <20201230154749.746641-1-arnd@kernel.org> <20210104223336.GA2562866@ubuntu-m3-large-x86> X-Mailer: Sylpheed 3.5.1 (GTK+ 2.24.31; x86_64-pc-linux-gnu) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 4 Jan 2021 15:33:36 -0700 Nathan Chancellor wrote: > > > +++ b/lib/Kconfig.ubsan > > > @@ -122,6 +122,8 @@ config UBSAN_SIGNED_OVERFLOW > > > > > > config UBSAN_UNSIGNED_OVERFLOW > > > bool "Perform checking for unsigned arithmetic overflow" > > > + # clang hugely expands stack usage with -fsanitize=object-size > > > > This is the first time -fsanitize=object-size is mentioned. Typo? > > Copy and paste issue from CONFIG_UBSAN_OBJECT_SIZE This? --- a/lib/Kconfig.ubsan~ubsan-disable-unsigned-integer-overflow-sanitizer-with-clang-fix +++ a/lib/Kconfig.ubsan @@ -122,7 +122,7 @@ config UBSAN_SIGNED_OVERFLOW config UBSAN_UNSIGNED_OVERFLOW bool "Perform checking for unsigned arithmetic overflow" - # clang hugely expands stack usage with -fsanitize=object-size + # clang hugely expands stack usage with -fsanitize=unsigned-integer-overflow depends on !CC_IS_CLANG depends on $(cc-option,-fsanitize=unsigned-integer-overflow) help _