Date: Mon, 08 May 2017 16:50:37 -0400 From: Daniel Micay <danielmicay@...il.com> To: Daniel Axtens <dja@...ens.net>, Kees Cook <keescook@...omium.org>, kernel-hardening@...ts.openwall.com, linuxppc-dev@...ts.ozlabs.org Cc: andrew.donnellan@....ibm.com Subject: Re: [PATCH] add the option of fortified string.h functions On Tue, 2017-05-09 at 03:57 +1000, Daniel Axtens wrote: > Hi Daniel and ppc people, > > (ppc people: this does some compile and run time bounds checking on > string functions. It's cool - currently it picks up a lot of random > things so it will require some more work across the tree, but > hopefully > it will eventually hit mainline.) > > I've tested this on ppc with pseries_le_defconfig. > > I needed a couple of the fixes from github > (https://github.com/thestinger/linux-hardened/commits/4.11) in order > to > build, specifically > https://github.com/thestinger/linux-hardened/commit/c65d6a6f309b067035 > 84a23ac2b2bda4bb363143 > https://github.com/thestinger/linux- > hardened/commit/adcec4756574a8c7f7cb5b6fa51ebeaeeae71aae By the way, Kees is working on landing these upstream as proper fixes rather than the workarounds I did there. In most cases, it's a matter of migrating from memcpy past the end of a constant string to strncpy (to make sure that the destination is still fully filled but with zeroes instead of arbitrary junk from rodata vs strcpy/strlcpy which won't cover that). A few of them are a bit weirder though. I haven't seen any false positives yet though, due to sticking to __builtin_object_size(p, 0) for now. > Once those were added, I needed to disable fortification in > prom_init.c, > as we apparently can't have new symbols there. (I don't understand > that > file so I haven't dug into it.) > > We also have problems with the feature fixup tests leading to a panic > on > boot. It relates to getting what I think are asm labels(?) and how we > address them. I have just disabled fortify here for now; I think the > code could be rewritten to take the labels as unsigned char *, but I > haven't dug into it. They probably need to be changed to use 'unsigned char foo' instead of 'char foo' with &foo taken as an address and used as a larger buffer. That's undefined and the compiler can assume it's limited to the size of the type used to define it which then gets enforced by these fortified wrappers rather than just used for optimization (in practice, it won't break much without these, but it could).
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.