From 8a9208612eec8ddae4c418485d848ecfa0613699 Mon Sep 17 00:00:00 2001
From: Anton Kling <anton@kling.gg>
Date: Mon, 30 Oct 2023 22:12:14 +0100
Subject: Meta: Move kernel and userland to their own folders.

This is to allow both the kernel and the userland to share certain
header files and to make the folder structure a bit more clear.
---
 kernel/kubsan.c | 58 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 58 insertions(+)
 create mode 100644 kernel/kubsan.c

(limited to 'kernel/kubsan.c')

diff --git a/kernel/kubsan.c b/kernel/kubsan.c
new file mode 100644
index 0000000..c81b3fc
--- /dev/null
+++ b/kernel/kubsan.c
@@ -0,0 +1,58 @@
+#include <kubsan.h>
+#include <log.h>
+#include <stdio.h>
+
+void ubsan_log(const char *cause, struct source_location source) {
+  kprintf("%s: %s : %d\n", cause, source.file_name, source.line);
+  dump_backtrace(5);
+  asm("cli");
+  asm volatile("1: jmp 1b");
+  asm("hlt");
+  for (;;)
+    ;
+}
+
+void __ubsan_handle_shift_out_of_bounds(struct ShiftOutOfBoundsData *data,
+                                        unsigned long lhs, unsigned long rhs) {
+  (void)lhs;
+  (void)rhs;
+  ubsan_log("handle_shift_out_of_bounds", data->location);
+}
+
+void __ubsan_handle_add_overflow(struct OverflowData *data, unsigned long lhs,
+                                 unsigned long rhs) {
+  (void)lhs;
+  (void)rhs;
+  ubsan_log("handle_add_overflow", data->location);
+}
+
+void __ubsan_handle_sub_overflow(struct OverflowData *data, unsigned long lhs,
+                                 unsigned long rhs) {
+  (void)lhs;
+  (void)rhs;
+  ubsan_log("handle_sub_overflow", data->location);
+}
+
+void __ubsan_handle_mul_overflow(struct OverflowData *data, unsigned long lhs,
+                                 unsigned long rhs) {
+  (void)lhs;
+  (void)rhs;
+  ubsan_log("handle_mul_overflow", data->location);
+}
+
+void __ubsan_handle_out_of_bounds(struct OutOfBoundsData *data, void *index) {
+  (void)index;
+  ubsan_log("handle_out_of_bounds", data->location);
+}
+
+void __ubsan_handle_pointer_overflow(struct OutOfBoundsData *data,
+                                     void *index) {
+  (void)index;
+  ubsan_log("handle_pointer_overflow", data->location);
+}
+
+void __ubsan_handle_vla_bound_not_positive(struct OutOfBoundsData *data,
+                                     void *index) {
+  (void)index;
+  ubsan_log("handle_vla_bound_not_positive", data->location);
+}
-- 
cgit v1.2.3