From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756460AbcILWJ7 (ORCPT ); Mon, 12 Sep 2016 18:09:59 -0400 Received: from mail-db5eur01on0134.outbound.protection.outlook.com ([104.47.2.134]:8480 "EHLO EUR01-DB5-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751936AbcILWJ5 (ORCPT ); Mon, 12 Sep 2016 18:09:57 -0400 Authentication-Results: linux-foundation.org; dkim=none (message not signed) header.d=none;linux-foundation.org; dmarc=none action=none header.from=virtuozzo.com; Subject: Re: [PATCH 0/2] ubsan for s390 To: Christian Borntraeger , , , References: <1473683840-8700-1-git-send-email-borntraeger@de.ibm.com> CC: Heiko Carstens , Martin Schwidefsky , Michal Marek , Yang Shi , Andrew Morton From: Andrey Ryabinin Message-ID: Date: Mon, 12 Sep 2016 19:38:57 +0300 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.3.0 MIME-Version: 1.0 In-Reply-To: <1473683840-8700-1-git-send-email-borntraeger@de.ibm.com> Content-Type: text/plain; charset="windows-1252" Content-Transfer-Encoding: 7bit X-Originating-IP: [195.214.232.10] X-ClientProxiedBy: HE1PR01CA0047.eurprd01.prod.exchangelabs.com (10.165.170.143) To AM5PR0802MB2547.eurprd08.prod.outlook.com (10.175.45.23) X-MS-Office365-Filtering-Correlation-Id: a51c9e16-3486-4e25-58bd-08d3db2b157b X-Microsoft-Exchange-Diagnostics: 1;AM5PR0802MB2547;2:BYeIDx5QaMdZ94xAgFbbSJ/O3vi8kg0e4HI+nsncY8FBgbLrzX5aaLb2QsCmGY8nH/WcelqPnjROv1WiixSIkD35mvKRaQRzVLG8bzfS+AHEUCfniDf0st5/ASQTPAunGKk/B/kN7hUQm2JjzzbbgnUF1rwpFM74VMCOfjhpoxArCBjYqPuF2HvumdB4Vfl0;3:ZzShfFaRGvk52lVfLCvfGuWRw7xlzUL6WfbAGNge0El/nfMRoCHgjCzcypPkU4JYbsvpUazNEx3fet0njyn9H6LpCsOIQFDNPnVTLG793UH+9GhBeV/QBqUqZB8AJBQG;25:YSo70HV86nliM9HRD1/aNCiZbLR8DHDXej3Pnw2Y3FIqaE7q8m2rQ/9KWcQpoIsf/tBhtLfIhH5vrB7upeIHJtaIIfCcDtftpv04yA4lVgamP36O0NX6ie5cmCIWvC69+BkVv0DaNUy94ivgcvl0TSDIh1T1e20o4Q01/bAdmGKjb/LUZdm/fS90wMynLE7+uMRoAjexVcvDp2Dkd0nNIoYbmuK/3s0thnufmsgbGp9K9I32pPVcCv5iHCtNFmruT2BQ534dX3HIBGUUSiiJCEvIKZ3sx7KEjCfJRNt+FM4JYMjKsib9jZFQGU1bt3syAy9sCFR2o9OqlCDcwXLIfE1CT8wYXKiN5sHb0sGz5ofm5DJyB7qbk1aSOGJpwwehWHywFAGFPFLQ5/6kG58gAKG2hBuGC6A6bPbmN3PWlxw= X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:AM5PR0802MB2547; X-Microsoft-Exchange-Diagnostics: 1;AM5PR0802MB2547;31:Ewl4Jq7Qd1T9EvLFRNBCNS38MrBa3nab7+VZotnc1iILrwUcJoytlZSTPaCQ684G/KfYwhUIN2SrNepfcCUJOTjvh2lxJg0QvmZwqBvlYt0Hpi9MwHvbB1zIGBNftckDcyIisWL3nr5OhKSKc8ZECPSNlto1n662gHct1YVk6CcpFfW0rHFxXb0fyPekm4RmijvwpeTj/yVWs6LbSL3HfkP6gLJkPdNAODvtJUwVn0M=;4:9OOEzxNJPae/bA3jSqia+P87wX3atJu8O+ZoQ8zcVsUnJ3RTvY883j4XGJyxQfE8uCwNI0lLWv6Qr5tHZeDS6q230jC3QMlw6sx+KK6ofuVNKxJm9PhfTxlcuPYWxG/1KFF2ZuGsa773h7FYCwsnSI1abxkmpB66XjdEEtSVzdyh+lhLFX4Jb/+tKtGCVN7AICtvmX11285dRT/xzzTjIButgdNlBDqpw4LyWVumIhGAiexPvhti26nUxZu8ihz+yqefNFaEIf4g+9HCJ+OI7FTquhSjIF/8PCpgBOa8BsYVOta+5y1mOuVQjK4zeoM7V2k29GoKwL4wKQOuJzCyC0iuoGCH+EZudtdkveVg0RrtxJQKxbVrk6O5jYxuVmNzIB511/7e6vUqA7Yvilld/Qkp4sHPWMWAqzsIadXvRr0= X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0;PCL:0;RULEID:(6040176)(601004)(2401047)(5005006)(8121501046)(3002001)(10201501046)(6043046)(6042046);SRVR:AM5PR0802MB2547;BCL:0;PCL:0;RULEID:;SRVR:AM5PR0802MB2547; X-Forefront-PRVS: 006339698F X-Forefront-Antispam-Report: SFV:NSPM;SFS:(10019020)(4630300001)(6009001)(6049001)(7916002)(24454002)(377454003)(19580405001)(5660300001)(2906002)(47776003)(83506001)(23746002)(19580395003)(87386001)(4326007)(65826007)(2950100001)(65956001)(4001350100001)(4001520100001)(586003)(36756003)(66066001)(33646002)(50986999)(81166006)(64126003)(54356999)(86362001)(8676002)(31686004)(305945005)(42186005)(76176999)(5001770100001)(7736002)(65806001)(50466002)(3846002)(92566002)(77096005)(31696002)(6116002)(189998001)(230700001)(2201001)(7846002)(5004840100003);DIR:OUT;SFP:1102;SCL:1;SRVR:AM5PR0802MB2547;H:[10.30.19.223];FPR:;SPF:None;LANG:en; X-Microsoft-Exchange-Diagnostics: =?Windows-1252?Q?1;AM5PR0802MB2547;23:WL8WponSTD8Wmmy2bfysrjlNWjX6oUfMNdr?= =?Windows-1252?Q?Z9B7Kpe5qa7BBOwpMAR8Z9IUmp2LUaMNH5NaSqRb8dKxXX168UwfCThQ?= =?Windows-1252?Q?r7Pr3D4ue+WKTPX7mbcUo84QRhTGOLKeLbhCIpwGCLM7QkAeDIz9xBrx?= =?Windows-1252?Q?/7Hzh9wxnnRLnAk/l7VgFn4F2QW/WraFSe5gB73rjHPc+ZecO5cel/0J?= =?Windows-1252?Q?GwgfJmRaXd244uWRP72jIMGnjFocZqSDXPr4rsDXCqDZS1xyXnFTDT+1?= =?Windows-1252?Q?yVivDyZj+srfVjq37Xxz0ifSY+4+7t4HTR8FKXmRg+0pfeSc3I03FcSW?= =?Windows-1252?Q?dr50NhAKEDbWR2A2Dg1p/FWJJ3rOzlJpldu3raW/Eu+eT0LpuMbKNUbO?= =?Windows-1252?Q?Q6RKR/Xgnz8zW4QR/P+qfnZ//JypWsy+/HLaQQbHVscjpn1GA8DdbbLR?= =?Windows-1252?Q?x2Ksgd0Iw9/An9UJIHeBf2JYY0kSSyL0cbgUyv+JOmpuwY8gpP0w8vTf?= =?Windows-1252?Q?bdmpUkDRVd3pAy6ha6SBetS3sR+BKPT6E0YMYdoxGVysa85cDhf2LDCs?= =?Windows-1252?Q?f5Oz3mBjB0hXZjvtVQIFnKLfKTSeGRknbczpgbAY153hk1APNJFFkw2s?= =?Windows-1252?Q?ki2irJIaginaPLF5FzkrJ25w8g0xSRDmO1mgiXekLuCkkLe9QW+55BTg?= =?Windows-1252?Q?ci8TAEw5/f894JFhAkLW1kEajJNnJ9dSpW1TeokeAmZwzobknhvEa1Np?= =?Windows-1252?Q?E/yizGIbygaseHXY+COjE4HfY1wjRP1dgEhbLjGC/HqrXTHjOkJhfxP+?= =?Windows-1252?Q?OAdYhg5k7K9x/CW8x3jtWqeHw1A8RFDOAUDX84iHeYt+hlRlA0kX/JYb?= =?Windows-1252?Q?huE1k6bBXnprD5Rq/W1gB+qwtchnMHpxU73RvyXnRbMKHoI+pHmcCNDE?= =?Windows-1252?Q?ylel7xh9G8oNFr3nRfW0ZX9ZwcZEKOSO0DHSps/1P+LGHVbrHBjDS0id?= =?Windows-1252?Q?NicY4UQ5pHJKVP6VNwOUqv3L+EVRh17ROWH2DrAtWft/wpDMt18AscaF?= =?Windows-1252?Q?huUnwRF957V3msqWYIkQP+CsvIFTeL8TFMGgc62ArlP+xxjS4sTArtNS?= =?Windows-1252?Q?q3KjIYtJrn1riiYFgXigKR3YCfuNJ87Yw5EYyKYolctqTGQubu7Mch71?= =?Windows-1252?Q?UYSlYLHQEcRhKlHkHuMzyaqC+d3n7AiHDXYgvweL0w0NmPD83gMqWwKP?= =?Windows-1252?Q?H6bNT3Y9y4VZ2bPhUJQGZxdo8jfG6PhIxy7auJuwaoIvVRRkWm0mylyF?= =?Windows-1252?Q?mzY6eFVE+jabCVpDdPCocVWL/i10yYk+8Sg3vxF4Nkv3jWm4=3D?= X-Microsoft-Exchange-Diagnostics: 1;AM5PR0802MB2547;6:yK3omZLyvxyw0AUxmGP1VzLh/nPSLHQjiXQ657gfYAn4HQ/8oL88AX12WFtqqrELxvXrb71Rr0+8MjLm9dIxuyhRysey28mpcNLBruBtqxl+NFzL0AIxPgTiFfYy+0MNGvB80jbBIGrSz+/xvJbK5pRlgY/RBravt/5I+HvmZIK/9fvFjEeCDLnl1cHxstJgjXPyzS9/vYfsG79tKTlWQcOT/pvHM3OMzYWez2Ig20fMMcpUv67Ur9lRGDWV4H05wWK/2L4nL+j9kaSCX3oPz7W+S3zC56oxlUa4lZChjTtOALDBsV3QrBQ3o7LF33yP;5:a1cZJsCWPAkI6eUg2+iHWgtO6DXEeh/m8aECHo1WrM9HcVz/4cAJyDFeXUDAbohEgF/Vqfcr7PlwOFGl1lAVh/ECnymFcWg65eVMGHNnGXv6duxnmyleP3481PTNgVIsIbxHaI2JIysfFR4J6iU/gg==;24:vzmUZVPdcaWN+kIIrYV2Ly8IbwZYBn804DnH0EBmUF+7syor5H0puat55WH8zQSTDaoyOP5VEBTl/d5vcoECMXm/fpSCejryjd7ua/jafAk=;7:bLag29bn8sBCo/If2jdhkZ8tw4XXOxexV0TfzT+oKGSy+qsBgcTZQ7DUfOJOLPpjYsUm8HmYCjGuRYMHpGrlM3yCjMY0EwLOIBx48wlS0oZpBFOBurIQkutfQ2+aRiayv6gZBrXc1AQCtjovRq5KZXECC0ZYrrZa4ulg4t2eYVtVqm1jKHnLngLY5NcxwGla4TXRgItWW+ISBojfXzlPRqPWRzTtd/Q8zi3SNlqJZeFGfNPv7y36hYDGo+drNBhL SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-Microsoft-Exchange-Diagnostics: 1;AM5PR0802MB2547;20:26zqp49ExXqKALu3QKitCf2Md8f9RrfhxgqfZOpfUYHuVimryX9g3AvVFJPoKynrIn14iR/ghYHUs8ieKpLScIa5NHQobS71zhan+s6xH1HSdDYkZxiPiOD0NrWgaJtIRRRj/XBm+BPKRzwLCLmNMoTNIDi9n65N7vYSuqD71Ts= X-OriginatorOrg: virtuozzo.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Sep 2016 16:37:26.7873 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0802MB2547 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 09/12/2016 03:37 PM, Christian Borntraeger wrote: > This patch set enables ubsan for s390. > > We have to fence some files and can then enable > ARCH_HAS_UBSAN_SANITIZE_ALL. (patch 2) > > We have to disable the null pointer sanitizer as > we use the S390_lowcore macro to access several > memory location after address 0 (patch 1) > > If patch 1 is ok, is the s390 tree the right place > also for patch1? > Fine by me Acked-by: Andrey Ryabinin > Christian Borntraeger (2): > ubsan: allow to disable the null sanitizer > s390/ubsan: enable UBSAN for s390 > > arch/s390/Kconfig | 2 ++ > arch/s390/boot/compressed/Makefile | 1 + > arch/s390/kernel/Makefile | 3 +++ > arch/s390/kernel/vdso32/Makefile | 3 ++- > arch/s390/kernel/vdso64/Makefile | 3 ++- > lib/Kconfig.ubsan | 11 +++++++++++ > scripts/Makefile.ubsan | 5 ++++- > 7 files changed, 25 insertions(+), 3 deletions(-) > From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Subject: Re: [PATCH 0/2] ubsan for s390 References: <1473683840-8700-1-git-send-email-borntraeger@de.ibm.com> From: Andrey Ryabinin Message-ID: Date: Mon, 12 Sep 2016 19:38:57 +0300 MIME-Version: 1.0 In-Reply-To: <1473683840-8700-1-git-send-email-borntraeger@de.ibm.com> Content-Type: text/plain; charset="windows-1252" Content-Transfer-Encoding: 7bit Sender: linux-kbuild-owner@vger.kernel.org List-Archive: List-Post: To: Christian Borntraeger , linux-s390@vger.kernel.org, linux-kernel@vger.kernel.org, linux-kbuild@vger.kernel.org Cc: Heiko Carstens , Martin Schwidefsky , Michal Marek , Yang Shi , Andrew Morton List-ID: On 09/12/2016 03:37 PM, Christian Borntraeger wrote: > This patch set enables ubsan for s390. > > We have to fence some files and can then enable > ARCH_HAS_UBSAN_SANITIZE_ALL. (patch 2) > > We have to disable the null pointer sanitizer as > we use the S390_lowcore macro to access several > memory location after address 0 (patch 1) > > If patch 1 is ok, is the s390 tree the right place > also for patch1? > Fine by me Acked-by: Andrey Ryabinin > Christian Borntraeger (2): > ubsan: allow to disable the null sanitizer > s390/ubsan: enable UBSAN for s390 > > arch/s390/Kconfig | 2 ++ > arch/s390/boot/compressed/Makefile | 1 + > arch/s390/kernel/Makefile | 3 +++ > arch/s390/kernel/vdso32/Makefile | 3 ++- > arch/s390/kernel/vdso64/Makefile | 3 ++- > lib/Kconfig.ubsan | 11 +++++++++++ > scripts/Makefile.ubsan | 5 ++++- > 7 files changed, 25 insertions(+), 3 deletions(-) >