mirror of
https://github.com/torvalds/linux.git
synced 2024-11-10 06:01:57 +00:00
ubsan: Avoid i386 UBSAN handler crashes with Clang
When generating Runtime Calls, Clang doesn't respect the -mregparm=3 option used on i386. Hopefully this will be fixed correctly in Clang 19: https://github.com/llvm/llvm-project/pull/89707 but we need to fix this for earlier Clang versions today. Force the calling convention to use non-register arguments. Reported-by: Erhard Furtner <erhard_f@mailbox.org> Closes: https://github.com/KSPP/linux/issues/350 Link: https://lore.kernel.org/r/20240424224026.it.216-kees@kernel.org Acked-by: Nathan Chancellor <nathan@kernel.org> Acked-by: Justin Stitt <justinstitt@google.com> Signed-off-by: Kees Cook <keescook@chromium.org>
This commit is contained in:
parent
c209826737
commit
2e431b23a1
41
lib/ubsan.h
41
lib/ubsan.h
@ -124,19 +124,32 @@ typedef s64 s_max;
|
|||||||
typedef u64 u_max;
|
typedef u64 u_max;
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
void __ubsan_handle_add_overflow(void *data, void *lhs, void *rhs);
|
/*
|
||||||
void __ubsan_handle_sub_overflow(void *data, void *lhs, void *rhs);
|
* When generating Runtime Calls, Clang doesn't respect the -mregparm=3
|
||||||
void __ubsan_handle_mul_overflow(void *data, void *lhs, void *rhs);
|
* option used on i386: https://github.com/llvm/llvm-project/issues/89670
|
||||||
void __ubsan_handle_negate_overflow(void *_data, void *old_val);
|
* Fix this for earlier Clang versions by forcing the calling convention
|
||||||
void __ubsan_handle_divrem_overflow(void *_data, void *lhs, void *rhs);
|
* to use non-register arguments.
|
||||||
void __ubsan_handle_type_mismatch(struct type_mismatch_data *data, void *ptr);
|
*/
|
||||||
void __ubsan_handle_type_mismatch_v1(void *_data, void *ptr);
|
#if defined(CONFIG_X86_32) && \
|
||||||
void __ubsan_handle_out_of_bounds(void *_data, void *index);
|
defined(CONFIG_CC_IS_CLANG) && CONFIG_CLANG_VERSION < 190000
|
||||||
void __ubsan_handle_shift_out_of_bounds(void *_data, void *lhs, void *rhs);
|
# define ubsan_linkage asmlinkage
|
||||||
void __ubsan_handle_builtin_unreachable(void *_data);
|
#else
|
||||||
void __ubsan_handle_load_invalid_value(void *_data, void *val);
|
# define ubsan_linkage
|
||||||
void __ubsan_handle_alignment_assumption(void *_data, unsigned long ptr,
|
#endif
|
||||||
unsigned long align,
|
|
||||||
unsigned long offset);
|
void ubsan_linkage __ubsan_handle_add_overflow(void *data, void *lhs, void *rhs);
|
||||||
|
void ubsan_linkage __ubsan_handle_sub_overflow(void *data, void *lhs, void *rhs);
|
||||||
|
void ubsan_linkage __ubsan_handle_mul_overflow(void *data, void *lhs, void *rhs);
|
||||||
|
void ubsan_linkage __ubsan_handle_negate_overflow(void *_data, void *old_val);
|
||||||
|
void ubsan_linkage __ubsan_handle_divrem_overflow(void *_data, void *lhs, void *rhs);
|
||||||
|
void ubsan_linkage __ubsan_handle_type_mismatch(struct type_mismatch_data *data, void *ptr);
|
||||||
|
void ubsan_linkage __ubsan_handle_type_mismatch_v1(void *_data, void *ptr);
|
||||||
|
void ubsan_linkage __ubsan_handle_out_of_bounds(void *_data, void *index);
|
||||||
|
void ubsan_linkage __ubsan_handle_shift_out_of_bounds(void *_data, void *lhs, void *rhs);
|
||||||
|
void ubsan_linkage __ubsan_handle_builtin_unreachable(void *_data);
|
||||||
|
void ubsan_linkage __ubsan_handle_load_invalid_value(void *_data, void *val);
|
||||||
|
void ubsan_linkage __ubsan_handle_alignment_assumption(void *_data, unsigned long ptr,
|
||||||
|
unsigned long align,
|
||||||
|
unsigned long offset);
|
||||||
|
|
||||||
#endif
|
#endif
|
||||||
|
Loading…
Reference in New Issue
Block a user