security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6
authorNathan Chancellor <nathan@kernel.org>
Wed, 14 Dec 2022 23:26:03 +0000 (16:26 -0700)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Sat, 31 Dec 2022 12:14:46 +0000 (13:14 +0100)
commit8a4236456a3a402f6bb92aa7b75e7a3b4ef7a72c
tree492dd92c616353227300d6411ebd2c1671334978
parent1cabce56626a61f4f02452cba61ad4332a4b73f8
security: Restrict CONFIG_ZERO_CALL_USED_REGS to gcc or clang > 15.0.6

commit d6a9fb87e9d18f3394a9845546bbe868efdccfd2 upstream.

A bad bug in clang's implementation of -fzero-call-used-regs can result
in NULL pointer dereferences (see the links above the check for more
information). Restrict CONFIG_CC_HAS_ZERO_CALL_USED_REGS to either a
supported GCC version or a clang newer than 15.0.6, which will catch
both a theoretical 15.0.7 and the upcoming 16.0.0, which will both have
the bug fixed.

Cc: stable@vger.kernel.org # v5.15+
Signed-off-by: Nathan Chancellor <nathan@kernel.org>
Signed-off-by: Kees Cook <keescook@chromium.org>
Link: https://lore.kernel.org/r/20221214232602.4118147-1-nathan@kernel.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
security/Kconfig.hardening