diff options
Diffstat (limited to 'include/linux/fortify-string.h')
| -rw-r--r-- | include/linux/fortify-string.h | 77 | 
1 files changed, 57 insertions, 20 deletions
| diff --git a/include/linux/fortify-string.h b/include/linux/fortify-string.h index c1be37437e77..a6cd6815f249 100644 --- a/include/linux/fortify-string.h +++ b/include/linux/fortify-string.h @@ -2,6 +2,27 @@  #ifndef _LINUX_FORTIFY_STRING_H_  #define _LINUX_FORTIFY_STRING_H_ +#define __FORTIFY_INLINE extern __always_inline __attribute__((gnu_inline)) +#define __RENAME(x) __asm__(#x) + +void fortify_panic(const char *name) __noreturn __cold; +void __read_overflow(void) __compiletime_error("detected read beyond size of object (1st parameter)"); +void __read_overflow2(void) __compiletime_error("detected read beyond size of object (2nd parameter)"); +void __write_overflow(void) __compiletime_error("detected write beyond size of object (1st parameter)"); + +#define __compiletime_strlen(p)					\ +({								\ +	unsigned char *__p = (unsigned char *)(p);		\ +	size_t __ret = (size_t)-1;				\ +	size_t __p_size = __builtin_object_size(p, 1);		\ +	if (__p_size != (size_t)-1) {				\ +		size_t __p_len = __p_size - 1;			\ +		if (__builtin_constant_p(__p[__p_len]) &&	\ +		    __p[__p_len] == '\0')			\ +			__ret = __builtin_strlen(__p);		\ +	}							\ +	__ret;							\ +})  #if defined(CONFIG_KASAN_GENERIC) || defined(CONFIG_KASAN_SW_TAGS)  extern void *__underlying_memchr(const void *p, int c, __kernel_size_t size) __RENAME(memchr); @@ -49,28 +70,38 @@ __FORTIFY_INLINE char *strcat(char *p, const char *q)  	return p;  } -__FORTIFY_INLINE __kernel_size_t strlen(const char *p) +extern __kernel_size_t __real_strnlen(const char *, __kernel_size_t) __RENAME(strnlen); +__FORTIFY_INLINE __kernel_size_t strnlen(const char *p, __kernel_size_t maxlen)  { -	__kernel_size_t ret;  	size_t p_size = __builtin_object_size(p, 1); +	size_t p_len = __compiletime_strlen(p); +	size_t ret; -	/* Work around gcc excess stack consumption issue */ -	if (p_size == (size_t)-1 || -		(__builtin_constant_p(p[p_size - 1]) && p[p_size - 1] == '\0')) -		return __underlying_strlen(p); -	ret = strnlen(p, p_size); -	if (p_size <= ret) +	/* We can take compile-time actions when maxlen is const. */ +	if (__builtin_constant_p(maxlen) && p_len != (size_t)-1) { +		/* If p is const, we can use its compile-time-known len. */ +		if (maxlen >= p_size) +			return p_len; +	} + +	/* Do not check characters beyond the end of p. */ +	ret = __real_strnlen(p, maxlen < p_size ? maxlen : p_size); +	if (p_size <= ret && maxlen != ret)  		fortify_panic(__func__);  	return ret;  } -extern __kernel_size_t __real_strnlen(const char *, __kernel_size_t) __RENAME(strnlen); -__FORTIFY_INLINE __kernel_size_t strnlen(const char *p, __kernel_size_t maxlen) +/* defined after fortified strnlen to reuse it. */ +__FORTIFY_INLINE __kernel_size_t strlen(const char *p)  { +	__kernel_size_t ret;  	size_t p_size = __builtin_object_size(p, 1); -	__kernel_size_t ret = __real_strnlen(p, maxlen < p_size ? maxlen : p_size); -	if (p_size <= ret && maxlen != ret) +	/* Give up if we don't know how large p is. */ +	if (p_size == (size_t)-1) +		return __underlying_strlen(p); +	ret = strnlen(p, p_size); +	if (p_size <= ret)  		fortify_panic(__func__);  	return ret;  } @@ -79,24 +110,27 @@ __FORTIFY_INLINE __kernel_size_t strnlen(const char *p, __kernel_size_t maxlen)  extern size_t __real_strlcpy(char *, const char *, size_t) __RENAME(strlcpy);  __FORTIFY_INLINE size_t strlcpy(char *p, const char *q, size_t size)  { -	size_t ret;  	size_t p_size = __builtin_object_size(p, 1);  	size_t q_size = __builtin_object_size(q, 1); +	size_t q_len;	/* Full count of source string length. */ +	size_t len;	/* Count of characters going into destination. */  	if (p_size == (size_t)-1 && q_size == (size_t)-1)  		return __real_strlcpy(p, q, size); -	ret = strlen(q); -	if (size) { -		size_t len = (ret >= size) ? size - 1 : ret; - -		if (__builtin_constant_p(len) && len >= p_size) +	q_len = strlen(q); +	len = (q_len >= size) ? size - 1 : q_len; +	if (__builtin_constant_p(size) && __builtin_constant_p(q_len) && size) { +		/* Write size is always larger than destination. */ +		if (len >= p_size)  			__write_overflow(); +	} +	if (size) {  		if (len >= p_size)  			fortify_panic(__func__);  		__underlying_memcpy(p, q, len);  		p[len] = '\0';  	} -	return ret; +	return q_len;  }  /* defined after fortified strnlen to reuse it */ @@ -280,7 +314,10 @@ __FORTIFY_INLINE char *strcpy(char *p, const char *q)  	if (p_size == (size_t)-1 && q_size == (size_t)-1)  		return __underlying_strcpy(p, q);  	size = strlen(q) + 1; -	/* test here to use the more stringent object size */ +	/* Compile-time check for const size overflow. */ +	if (__builtin_constant_p(size) && p_size < size) +		__write_overflow(); +	/* Run-time check for dynamic size overflow. */  	if (p_size < size)  		fortify_panic(__func__);  	memcpy(p, q, size); |