|
Message-ID: <87sgkbj7jt.fsf@dja-thinkpad.axtens.net> Date: Mon, 20 Jan 2020 11:27:50 +1100 From: Daniel Axtens <dja@...ens.net> To: Kees Cook <keescook@...omium.org> Cc: kernel-hardening@...ts.openwall.com, Daniel Micay <danielmicay@...il.com> Subject: Re: [PATCH] string.h: detect intra-object overflow in fortified string functions Hi Kees, >> Add a test demonstrating and validating the feature to lkdtm: >> FORTIFY_SUBOBJECT. > > Can you actually split this into two patches? One with the lkdtm changes > and one with the string.h changes? Will do. > I can take the lkdtm changes and then akpm can take the string.h changes > (please add him as the To for v2, and include lkml in Cc too). (Also, > it's be nice to have a non-subobject fortify test in lkdtm too.) (D'oh, both of those are obvious recipients in hind-sight, clearly I shouldn't send patches right before leaving work on Friday!) > > Thanks for doing this! Please consider these: > > Reviewed-by: Kees Cook <keescook@...omium.org> Thanks! Daniel > > -Kees > >> >> Cc: Daniel Micay <danielmicay@...il.com> >> Cc: Kees Cook <keescook@...omium.org> >> Signed-off-by: Daniel Axtens <dja@...ens.net> >> --- >> drivers/misc/lkdtm/bugs.c | 26 ++++++++++++++++++++++++++ >> drivers/misc/lkdtm/core.c | 1 + >> drivers/misc/lkdtm/lkdtm.h | 1 + >> include/linux/string.h | 27 ++++++++++++++++----------- >> 4 files changed, 44 insertions(+), 11 deletions(-) >> >> diff --git a/drivers/misc/lkdtm/bugs.c b/drivers/misc/lkdtm/bugs.c >> index a4fdad04809a..1bbe291e44b7 100644 >> --- a/drivers/misc/lkdtm/bugs.c >> +++ b/drivers/misc/lkdtm/bugs.c >> @@ -11,6 +11,7 @@ >> #include <linux/sched/signal.h> >> #include <linux/sched/task_stack.h> >> #include <linux/uaccess.h> >> +#include <linux/slab.h> >> >> #ifdef CONFIG_X86_32 >> #include <asm/desc.h> >> @@ -376,3 +377,28 @@ void lkdtm_DOUBLE_FAULT(void) >> panic("tried to double fault but didn't die\n"); >> } >> #endif >> + >> +void lkdtm_FORTIFY_SUBOBJECT(void) >> +{ >> + struct target { >> + char a[10]; >> + char b[10]; >> + } target; >> + char *src; >> + >> + src = kmalloc(20, GFP_KERNEL); >> + strscpy(src, "over ten bytes", 20); >> + >> + pr_info("trying to strcpy past the end of a member of a struct\n"); >> + >> + /* >> + * strncpy(target.a, src, 20); will hit a compile error because the >> + * compiler knows at build time that target.a < 20 bytes. Use strcpy() >> + * to force a runtime error. >> + */ >> + strcpy(target.a, src); >> + >> + /* Use target.a to prevent the code from being eliminated */ >> + pr_err("FAIL: fortify did not catch an sub-object overrun!\n" >> + "\"%s\" was copied.\n", target.a); >> +} >> diff --git a/drivers/misc/lkdtm/core.c b/drivers/misc/lkdtm/core.c >> index ee0d6e721441..c357e8fece3b 100644 >> --- a/drivers/misc/lkdtm/core.c >> +++ b/drivers/misc/lkdtm/core.c >> @@ -117,6 +117,7 @@ static const struct crashtype crashtypes[] = { >> CRASHTYPE(STACK_GUARD_PAGE_TRAILING), >> CRASHTYPE(UNSET_SMEP), >> CRASHTYPE(UNALIGNED_LOAD_STORE_WRITE), >> + CRASHTYPE(FORTIFY_SUBOBJECT), >> CRASHTYPE(OVERWRITE_ALLOCATION), >> CRASHTYPE(WRITE_AFTER_FREE), >> CRASHTYPE(READ_AFTER_FREE), >> diff --git a/drivers/misc/lkdtm/lkdtm.h b/drivers/misc/lkdtm/lkdtm.h >> index c56d23e37643..45928e25a3a5 100644 >> --- a/drivers/misc/lkdtm/lkdtm.h >> +++ b/drivers/misc/lkdtm/lkdtm.h >> @@ -31,6 +31,7 @@ void lkdtm_UNSET_SMEP(void); >> #ifdef CONFIG_X86_32 >> void lkdtm_DOUBLE_FAULT(void); >> #endif >> +void lkdtm_FORTIFY_SUBOBJECT(void); >> >> /* lkdtm_heap.c */ >> void __init lkdtm_heap_init(void); >> diff --git a/include/linux/string.h b/include/linux/string.h >> index 3b8e8b12dd37..e7f34c3113f8 100644 >> --- a/include/linux/string.h >> +++ b/include/linux/string.h >> @@ -319,7 +319,7 @@ void __write_overflow(void) __compiletime_error("detected write beyond size of o >> #if !defined(__NO_FORTIFY) && defined(__OPTIMIZE__) && defined(CONFIG_FORTIFY_SOURCE) >> __FORTIFY_INLINE char *strncpy(char *p, const char *q, __kernel_size_t size) >> { >> - size_t p_size = __builtin_object_size(p, 0); >> + size_t p_size = __builtin_object_size(p, 1); >> if (__builtin_constant_p(size) && p_size < size) >> __write_overflow(); >> if (p_size < size) >> @@ -329,7 +329,7 @@ __FORTIFY_INLINE char *strncpy(char *p, const char *q, __kernel_size_t size) >> >> __FORTIFY_INLINE char *strcat(char *p, const char *q) >> { >> - size_t p_size = __builtin_object_size(p, 0); >> + size_t p_size = __builtin_object_size(p, 1); >> if (p_size == (size_t)-1) >> return __builtin_strcat(p, q); >> if (strlcat(p, q, p_size) >= p_size) >> @@ -340,7 +340,7 @@ __FORTIFY_INLINE char *strcat(char *p, const char *q) >> __FORTIFY_INLINE __kernel_size_t strlen(const char *p) >> { >> __kernel_size_t ret; >> - size_t p_size = __builtin_object_size(p, 0); >> + size_t p_size = __builtin_object_size(p, 1); >> >> /* Work around gcc excess stack consumption issue */ >> if (p_size == (size_t)-1 || >> @@ -355,7 +355,7 @@ __FORTIFY_INLINE __kernel_size_t strlen(const char *p) >> extern __kernel_size_t __real_strnlen(const char *, __kernel_size_t) __RENAME(strnlen); >> __FORTIFY_INLINE __kernel_size_t strnlen(const char *p, __kernel_size_t maxlen) >> { >> - size_t p_size = __builtin_object_size(p, 0); >> + size_t p_size = __builtin_object_size(p, 1); >> __kernel_size_t ret = __real_strnlen(p, maxlen < p_size ? maxlen : p_size); >> if (p_size <= ret && maxlen != ret) >> fortify_panic(__func__); >> @@ -367,8 +367,8 @@ extern size_t __real_strlcpy(char *, const char *, size_t) __RENAME(strlcpy); >> __FORTIFY_INLINE size_t strlcpy(char *p, const char *q, size_t size) >> { >> size_t ret; >> - size_t p_size = __builtin_object_size(p, 0); >> - size_t q_size = __builtin_object_size(q, 0); >> + size_t p_size = __builtin_object_size(p, 1); >> + size_t q_size = __builtin_object_size(q, 1); >> if (p_size == (size_t)-1 && q_size == (size_t)-1) >> return __real_strlcpy(p, q, size); >> ret = strlen(q); >> @@ -388,8 +388,8 @@ __FORTIFY_INLINE size_t strlcpy(char *p, const char *q, size_t size) >> __FORTIFY_INLINE char *strncat(char *p, const char *q, __kernel_size_t count) >> { >> size_t p_len, copy_len; >> - size_t p_size = __builtin_object_size(p, 0); >> - size_t q_size = __builtin_object_size(q, 0); >> + size_t p_size = __builtin_object_size(p, 1); >> + size_t q_size = __builtin_object_size(q, 1); >> if (p_size == (size_t)-1 && q_size == (size_t)-1) >> return __builtin_strncat(p, q, count); >> p_len = strlen(p); >> @@ -502,11 +502,16 @@ __FORTIFY_INLINE void *kmemdup(const void *p, size_t size, gfp_t gfp) >> /* defined after fortified strlen and memcpy to reuse them */ >> __FORTIFY_INLINE char *strcpy(char *p, const char *q) >> { >> - size_t p_size = __builtin_object_size(p, 0); >> - size_t q_size = __builtin_object_size(q, 0); >> + size_t p_size = __builtin_object_size(p, 1); >> + size_t q_size = __builtin_object_size(q, 1); >> + size_t size; >> if (p_size == (size_t)-1 && q_size == (size_t)-1) >> return __builtin_strcpy(p, q); >> - memcpy(p, q, strlen(q) + 1); >> + size = strlen(q) + 1; >> + /* test here to use the more stringent object size */ >> + if (p_size < size) >> + fortify_panic(__func__); >> + memcpy(p, q, size); >> return p; >> } >> >> -- >> 2.20.1 >> > > -- > Kees Cook
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.