All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] ARM: uaccess: Implement strict user copy checks
@ 2010-08-04  3:02 ` Stephen Boyd
  0 siblings, 0 replies; 60+ messages in thread
From: Stephen Boyd @ 2010-08-04  3:02 UTC (permalink / raw)
  To: linux-arm-kernel; +Cc: Russell King, linux-kernel

This is mostly a copy from the s390 implementation (which copied
from x86 and sparc), except we print a warning if the Kconfig
option is disabled.

Signed-off-by: Stephen Boyd <sboyd@codeaurora.org>
---
 arch/arm/Kconfig.debug         |   14 ++++++++++++++
 arch/arm/include/asm/uaccess.h |   14 ++++++++++++++
 arch/arm/lib/Makefile          |    3 ++-
 arch/arm/lib/usercopy.c        |   25 +++++++++++++++++++++++++
 4 files changed, 55 insertions(+), 1 deletions(-)
 create mode 100644 arch/arm/lib/usercopy.c

diff --git a/arch/arm/Kconfig.debug b/arch/arm/Kconfig.debug
index 91344af..2cc0cdc 100644
--- a/arch/arm/Kconfig.debug
+++ b/arch/arm/Kconfig.debug
@@ -128,4 +128,18 @@ config DEBUG_S3C_UART
 	  The uncompressor code port configuration is now handled
 	  by CONFIG_S3C_LOWLEVEL_UART_PORT.
 
+config DEBUG_STRICT_USER_COPY_CHECKS
+	bool "Strict user copy size checks"
+	depends on DEBUG_KERNEL
+	help
+	  Enabling this option turns a certain set of sanity checks for user
+	  copy operations into compile time errors.
+
+	  The copy_from_user() etc checks are there to help test if there
+	  are sufficient security checks on the length argument of
+	  the copy operation, by having gcc prove that the argument is
+	  within bounds.
+
+	  If unsure, or if you run an older (pre 4.4) gcc, say N.
+
 endmenu
diff --git a/arch/arm/include/asm/uaccess.h b/arch/arm/include/asm/uaccess.h
index 33e4a48..3153e1a 100644
--- a/arch/arm/include/asm/uaccess.h
+++ b/arch/arm/include/asm/uaccess.h
@@ -401,8 +401,22 @@ extern unsigned long __must_check __clear_user_std(void __user *addr, unsigned l
 extern unsigned long __must_check __strncpy_from_user(char *to, const char __user *from, unsigned long count);
 extern unsigned long __must_check __strnlen_user(const char __user *s, long n);
 
+extern void copy_from_user_overflow(void)
+#ifdef CONFIG_DEBUG_STRICT_USER_COPY_CHECKS
+	__compiletime_error("copy_from_user() buffer size is not provably correct")
+#else
+	__compiletime_warning("copy_from_user() buffer size is not provably correct")
+#endif
+;
+
 static inline unsigned long __must_check copy_from_user(void *to, const void __user *from, unsigned long n)
 {
+	unsigned int sz = __compiletime_object_size(to);
+
+	if (unlikely(sz != -1 && sz < n)) {
+		copy_from_user_overflow();
+		return n;
+	}
 	if (access_ok(VERIFY_READ, from, n))
 		n = __copy_from_user(to, from, n);
 	else /* security hole - plug it */
diff --git a/arch/arm/lib/Makefile b/arch/arm/lib/Makefile
index 59ff42d..561cf3d 100644
--- a/arch/arm/lib/Makefile
+++ b/arch/arm/lib/Makefile
@@ -13,7 +13,8 @@ lib-y		:= backtrace.o changebit.o csumipv6.o csumpartial.o   \
 		   testchangebit.o testclearbit.o testsetbit.o        \
 		   ashldi3.o ashrdi3.o lshrdi3.o muldi3.o             \
 		   ucmpdi2.o lib1funcs.o div64.o sha1.o               \
-		   io-readsb.o io-writesb.o io-readsl.o io-writesl.o
+		   io-readsb.o io-writesb.o io-readsl.o io-writesl.o \
+		   usercopy.o
 
 mmu-y	:= clear_user.o copy_page.o getuser.o putuser.o
 
diff --git a/arch/arm/lib/usercopy.c b/arch/arm/lib/usercopy.c
new file mode 100644
index 0000000..e57e6e2
--- /dev/null
+++ b/arch/arm/lib/usercopy.c
@@ -0,0 +1,25 @@
+/*
+ * Copyright (c) 2009-2010, Code Aurora Forum. All rights reserved.
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License version 2 and
+ * only version 2 as published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program; if not, write to the Free Software
+ * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
+ * 02110-1301, USA.
+ */
+#include <linux/module.h>
+#include <linux/bug.h>
+
+void copy_from_user_overflow(void)
+{
+	WARN(1, "Buffer overflow detected!\n");
+}
+EXPORT_SYMBOL(copy_from_user_overflow);
-- 
Sent by an employee of the Qualcomm Innovation Center, Inc.
The Qualcomm Innovation Center, Inc. is a member of the Code Aurora Forum.


^ permalink raw reply related	[flat|nested] 60+ messages in thread

end of thread, other threads:[~2010-09-14 14:18 UTC | newest]

Thread overview: 60+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2010-08-04  3:02 [PATCH] ARM: uaccess: Implement strict user copy checks Stephen Boyd
2010-08-04  3:02 ` Stephen Boyd
2010-08-10 22:46 ` Stephen Boyd
2010-08-10 22:46   ` Stephen Boyd
2010-08-10 22:55   ` Russell King - ARM Linux
2010-08-10 22:55     ` Russell King - ARM Linux
2010-08-11  0:27     ` Stephen Boyd
2010-08-11  0:27       ` Stephen Boyd
2010-08-18  1:29       ` [PATCH v2] " Stephen Boyd
2010-08-18  1:29         ` Stephen Boyd
2010-08-18 12:28         ` Arnd Bergmann
2010-08-18 12:28           ` Arnd Bergmann
2010-08-18 19:48           ` Stephen Boyd
2010-08-18 19:48             ` Stephen Boyd
2010-08-19 11:09             ` Arnd Bergmann
2010-08-19 11:09               ` Arnd Bergmann
2010-08-24 15:06               ` Heiko Carstens
2010-08-24 15:06                 ` Heiko Carstens
2010-08-24 15:26                 ` Arnd Bergmann
2010-08-24 15:26                   ` Arnd Bergmann
2010-08-24 15:47                   ` Heiko Carstens
2010-08-24 15:47                     ` Heiko Carstens
2010-08-25 12:14                     ` Arnd Bergmann
2010-08-25 12:14                       ` Arnd Bergmann
2010-08-25 12:54                       ` Heiko Carstens
2010-08-25 12:54                         ` Heiko Carstens
2010-08-25 13:55                         ` Arnd Bergmann
2010-08-25 13:55                           ` Arnd Bergmann
2010-08-25 14:40                           ` Heiko Carstens
2010-08-25 14:40                             ` Heiko Carstens
2010-08-28  1:35                             ` Stephen Boyd
2010-08-28  1:35                               ` Stephen Boyd
2010-08-28  7:43                               ` Heiko Carstens
2010-08-28  7:43                                 ` Heiko Carstens
2010-08-28  9:56                                 ` Arnd Bergmann
2010-08-28  9:56                                   ` Arnd Bergmann
2010-09-04  4:49                                 ` Stephen Boyd
2010-09-04  4:49                                   ` Stephen Boyd
2010-09-14  3:07                                   ` Stephen Boyd
2010-09-14  3:07                                     ` Stephen Boyd
2010-09-14  8:25                                     ` Heiko Carstens
2010-09-14  8:25                                       ` Heiko Carstens
2010-09-14 13:10                                       ` Arnd Bergmann
2010-09-14 13:10                                         ` Arnd Bergmann
2010-09-14 14:18                                         ` Heiko Carstens
2010-09-14 14:18                                           ` Heiko Carstens
2010-08-19  2:28           ` [PATCHv2 2/1] Consolidate CONFIG_DEBUG_STRICT_USER_COPY_CHECKS Stephen Boyd
2010-08-19  2:28             ` Stephen Boyd
2010-08-19  4:38             ` Arjan van de Ven
2010-08-19  4:38               ` Arjan van de Ven
2010-08-19  4:47             ` Stephen Rothwell
2010-08-19  4:47               ` Stephen Rothwell
2010-08-19 11:04               ` Arnd Bergmann
2010-08-19 11:04                 ` Arnd Bergmann
2010-08-11  3:04 ` [PATCH] ARM: uaccess: Implement strict user copy checks Arnd Bergmann
2010-08-11  3:04   ` Arnd Bergmann
2010-08-11 18:46   ` Stephen Boyd
2010-08-11 18:46     ` Stephen Boyd
2010-08-12 15:00     ` Arnd Bergmann
2010-08-12 15:00       ` Arnd Bergmann

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.