On Wed, Jan 06, 2021 at 04:34:26PM -0800, akpm@xxxxxxxxxxxxxxxxxxxx wrote: > > The patch titled > Subject: ubsan-disable-unsigned-integer-overflow-sanitizer-with-clang-fix > has been removed from the -mm tree. Its filename was > ubsan-disable-unsigned-integer-overflow-sanitizer-with-clang-fix.patch > > This patch was dropped because it was folded into ubsan-disable-unsigned-integer-overflow-sanitizer-with-clang.patch > > ------------------------------------------------------ > From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> > Subject: ubsan-disable-unsigned-integer-overflow-sanitizer-with-clang-fix > > fix comment typo, per Nathan > > Cc: Arnd Bergmann <arnd@xxxxxxxx> > Cc: George Popescu <georgepope@xxxxxxxxxxx> > Cc: Kees Cook <keescook@xxxxxxxxxxxx> > Cc: Marco Elver <elver@xxxxxxxxxx> > Cc: Nathan Chancellor <natechancellor@xxxxxxxxx> > Cc: Nick Desaulniers <ndesaulniers@xxxxxxxxxx> > Cc: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx> > Signed-off-by: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx> > --- > > lib/Kconfig.ubsan | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > --- a/lib/Kconfig.ubsan~ubsan-disable-unsigned-integer-overflow-sanitizer-with-clang-fix > +++ a/lib/Kconfig.ubsan > @@ -122,7 +122,7 @@ config UBSAN_SIGNED_OVERFLOW > > config UBSAN_UNSIGNED_OVERFLOW > bool "Perform checking for unsigned arithmetic overflow" > - # clang hugely expands stack usage with -fsanitize=object-size > + # clang hugely expands stack usage with -fsanitize=unsigned-integer-overflow > depends on !CC_IS_CLANG The above "!CC_IS_CLANG" needs to be dropped. I makes it impossible to use at all (unsigned UBSAN overflow is only implemented for Clang). -Kees > depends on $(cc-option,-fsanitize=unsigned-integer-overflow) > help > _ > > Patches currently in -mm which might be from akpm@xxxxxxxxxxxxxxxxxxxx are > > mm-page_alloc-add-a-missing-mm_page_alloc_zone_locked-tracepoint-fix.patch > ubsan-disable-unsigned-integer-overflow-sanitizer-with-clang.patch > mm.patch > mm-memcg-slab-pre-allocate-obj_cgroups-for-slab-caches-with-slab_account-fix.patch > mm-memcontrol-optimize-per-lruvec-stats-counter-memory-usage-checkpatch-fixes.patch > kasan-fix-bug-detection-via-ksize-for-hw_tags-mode-fix.patch > mm-cma-allocate-cma-areas-bottom-up-fix-3-fix.patch > mm-vmstat-fix-proc-sys-vm-stat_refresh-generating-false-warnings-fix-2.patch > kfence-kasan-make-kfence-compatible-with-kasan-fix.patch > set_memory-allow-set_direct_map__noflush-for-multiple-pages-fix.patch > arch-mm-wire-up-memfd_secret-system-call-were-relevant-fix.patch > kernel-forkc-export-kernel_thread-to-modules.patch > -- Kees Cook