From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 551DC221719; Tue, 29 Apr 2025 16:55:34 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1745945735; cv=none; b=sncr9IuwsDGRYdO9l/tsVcx3mSqY71+Lzyh33JwBegCltYQKLcYjIf0jwH+dNFDAmpyEfp0HSiR4FGk+nsxw30d3/ouWOLrgX2UmaFcz+bwJbAp0AFM0NnzisNas3c100N8YRQn9F2bjPBLFLKGh8eCIrtCLBe9nbC3zC1IOF8g= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1745945735; c=relaxed/simple; bh=ltS+0GrRiwRR2OAbMJIwUiwrVGIG4Duo2NBpoCSjm10=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=XeVpxoFhykyYKJWWHGoPWaWVnGoGGlmBNWU2tyAaGW7wIDhEP5BVUFwEE491iNWyVBTO+3yN3lf/ethBkR1rfudc16eSKGATKi2BCm1g8xRtJWEgzaa+Kvom2vmdh5lylstHh3fT4UkEJCGkPBtbsANITqipelUpopgTBROs9jk= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b=QPIOZIxC; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=linuxfoundation.org header.i=@linuxfoundation.org header.b="QPIOZIxC" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 70DB9C4CEE3; Tue, 29 Apr 2025 16:55:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1745945734; bh=ltS+0GrRiwRR2OAbMJIwUiwrVGIG4Duo2NBpoCSjm10=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=QPIOZIxCFn5SPjXV+5A1sza++B2f+E95Fx3W/VxgKO1KLymoEWbl2ULsu9Z2+6L6/ HdE01RAKCoSWXirEMy+qr1TIzKhyC7nms1kcyrgpdm5BeGvWSiUHYTZ0bKzaw6wg2h UTvNp4s1/DwhGielf/LvNH06GeQWj10mS/AxBtRc= From: Greg Kroah-Hartman To: stable@vger.kernel.org Cc: Greg Kroah-Hartman , patches@lists.linux.dev, Nathan Chancellor , Kees Cook , Sasha Levin Subject: [PATCH 6.14 032/311] lib/Kconfig.ubsan: Remove default UBSAN from UBSAN_INTEGER_WRAP Date: Tue, 29 Apr 2025 18:37:49 +0200 Message-ID: <20250429161122.350186728@linuxfoundation.org> X-Mailer: git-send-email 2.49.0 In-Reply-To: <20250429161121.011111832@linuxfoundation.org> References: <20250429161121.011111832@linuxfoundation.org> User-Agent: quilt/0.68 X-stable: review X-Patchwork-Hint: ignore Precedence: bulk X-Mailing-List: stable@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit 6.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Nathan Chancellor commit cdc2e1d9d929d7f7009b3a5edca52388a2b0891f upstream. CONFIG_UBSAN_INTEGER_WRAP is 'default UBSAN', which is problematic for a couple of reasons. The first is that this sanitizer is under active development on the compiler side to come up with a solution that is maintainable on the compiler side and usable on the kernel side. As a result of this, there are many warnings when the sanitizer is enabled that have no clear path to resolution yet but users may see them and report them in the meantime. The second is that this option was renamed from CONFIG_UBSAN_SIGNED_WRAP, meaning that if a configuration has CONFIG_UBSAN=y but CONFIG_UBSAN_SIGNED_WRAP=n and it is upgraded via olddefconfig (common in non-interactive scenarios such as CI), CONFIG_UBSAN_INTEGER_WRAP will be silently enabled again. Remove 'default UBSAN' from CONFIG_UBSAN_INTEGER_WRAP until it is ready for regular usage and testing from a broader community than the folks actively working on the feature. Cc: stable@vger.kernel.org Fixes: 557f8c582a9b ("ubsan: Reintroduce signed overflow sanitizer") Signed-off-by: Nathan Chancellor Link: https://lore.kernel.org/r/20250414-drop-default-ubsan-integer-wrap-v1-1-392522551d6b@kernel.org Signed-off-by: Kees Cook [nathan: Fix conflict due to lack of rename from ed2b548f1017 in stable] Signed-off-by: Nathan Chancellor Signed-off-by: Sasha Levin --- lib/Kconfig.ubsan | 1 - 1 file changed, 1 deletion(-) diff --git a/lib/Kconfig.ubsan b/lib/Kconfig.ubsan index 1d4aa7a83b3a5..37655f58b8554 100644 --- a/lib/Kconfig.ubsan +++ b/lib/Kconfig.ubsan @@ -118,7 +118,6 @@ config UBSAN_UNREACHABLE config UBSAN_SIGNED_WRAP bool "Perform checking for signed arithmetic wrap-around" - default UBSAN depends on !COMPILE_TEST # The no_sanitize attribute was introduced in GCC with version 8. depends on !CC_IS_GCC || GCC_VERSION >= 80000 -- 2.39.5