ubsan: integer-overflow: depend on BROKEN to keep this out of CI
authorKees Cook <kees@kernel.org>
Wed, 28 May 2025 18:26:22 +0000 (11:26 -0700)
committerKees Cook <kees@kernel.org>
Wed, 28 May 2025 23:02:11 +0000 (16:02 -0700)
commitd6a0e0bfecccdcecb08defe75a137c7262352102
treec30db8d1deaf14b670954c65962baa7c76fbeb9f
parent368556dd234dc4a506a35a0c99c0eee2ab475c77
ubsan: integer-overflow: depend on BROKEN to keep this out of CI

Depending on !COMPILE_TEST isn't sufficient to keep this feature out of
CI because we can't stop it from being included in randconfig builds.
This feature is still highly experimental, and is developed in lock-step
with Clang's Overflow Behavior Types[1]. Depend on BROKEN to keep it
from being enabled by anyone not expecting it.

Link: https://discourse.llvm.org/t/rfc-v2-clang-introduce-overflowbehaviortypes-for-wrapping-and-non-wrapping-arithmetic/86507
Reported-by: kernel test robot <oliver.sang@intel.com>
Closes: https://lore.kernel.org/oe-lkp/202505281024.f42beaa7-lkp@intel.com
Fixes: 557f8c582a9b ("ubsan: Reintroduce signed overflow sanitizer")
Acked-by: Eric Biggers <ebiggers@kernel.org>
Link: https://lore.kernel.org/r/20250528182616.work.296-kees@kernel.org
Reviewed-by: Nathan Chancellor <nathan@kernel.org>
Acked-by: Marco Elver <elver@google.com>
Signed-off-by: Kees Cook <kees@kernel.org>
lib/Kconfig.ubsan