Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp579734pxb; Thu, 19 Nov 2020 08:34:03 -0800 (PST) X-Google-Smtp-Source: ABdhPJyONFhfjivrfMHPYxc5bTrK0L4inqVLl7P01Elo9lCrMFFuIyfsTwBeous3NYuge87oBn8o X-Received: by 2002:a05:6402:1844:: with SMTP id v4mr30653301edy.346.1605803643381; Thu, 19 Nov 2020 08:34:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1605803643; cv=none; d=google.com; s=arc-20160816; b=A8zN/Srd2jQZfVTziHRXnIW5Ia/fVDz7Ru70KKc7ctRW0Qx/qFvCbUegEvDtmh/Mvm Qwyu9VV0JSUnfh+Ue3RWAerbaI9AzpkZrrbE2tVArtazqMpQk71IR93Se/qhxA96P+fF 8wYs9RciNSXCfyLJwzsYEkIsZUzfZMnOUioUp49rp0CQZ60H+JoyArJi08duHDfpBadr qSljVlM3ftiLIk+EvmXo4y9QjU6PoClyGJ/MPLOSOxtScariXBJfqokz7xr7o41AMF5K fzeindQ1U+z1rZnCBb7bg4Cld1O3reXlgNCW+w5yUIpWPmhcZOyGXcfIPHnmnwG7G4yI f4iA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=as/FP3+UtccsQc0KiRNQ/5PQHycuMz7qOGok4Ha1beI=; b=OlgdQzVLuPZR5TDcebL/7qsAad32d+Y/2qlZLd7tY4KvoPt4DJH+z2aRN87eWkPxu3 sseZfkD0KwhbpeySVmWye6DyafuEztvn9Hx7GWmKJWRiV7gA35MX39ae49l8js2aYyj6 mqZOiyA1+AnyZFRGE8FRW7ytJyusVn76gcWLmg9MtrlI3VRFVb4Fr75+znpcotTZpXlU uqlvyCZiz24JSdNsq+B5AKFXBv8mwyczWL89blmrEyTLfDeqXwaVaZ2ilIQv7VPSpcX+ hifahAolLZUvLPq1CZeqkuCihRZZ/+4By6GK6vnRB11fmulB3O53c/80XkkGEhRR2MIK lLJA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@privacyrequired.com header.s=stigmate header.b="DCQ/jYaV"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ok23si131806ejb.243.2020.11.19.08.33.40; Thu, 19 Nov 2020 08:34:03 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@privacyrequired.com header.s=stigmate header.b="DCQ/jYaV"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729088AbgKSQ3w (ORCPT + 99 others); Thu, 19 Nov 2020 11:29:52 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54380 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728707AbgKSQ3r (ORCPT ); Thu, 19 Nov 2020 11:29:47 -0500 Received: from latitanza.investici.org (latitanza.investici.org [IPv6:2001:888:2000:56::19]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8F444C0613CF; Thu, 19 Nov 2020 08:29:46 -0800 (PST) Received: from mx3.investici.org (unknown [127.0.0.1]) by latitanza.investici.org (Postfix) with ESMTP id 4CcQBJ153Pz8shH; Thu, 19 Nov 2020 16:29:44 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=privacyrequired.com; s=stigmate; t=1605803384; bh=as/FP3+UtccsQc0KiRNQ/5PQHycuMz7qOGok4Ha1beI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DCQ/jYaVXjRnpWR6Dv9XBaXUg4NRYXFa+IE9G8bTXwa/HBfDEaSY+EfLrt1YgTFnD N3NycX5FuQ1lmkW33nEwy88pE3mrBnFWx2Pu7MEyPVzVjQW/2f+9qGAAub7cM/fIh3 KOL9+YjSWZG2auZLX+ZhCLKRjizLQPE39ksFDRpw= Received: from [82.94.249.234] (mx3.investici.org [82.94.249.234]) (Authenticated sender: laniel_francis@privacyrequired.com) by localhost (Postfix) with ESMTPSA id 4CcQBH3sCxz8shD; Thu, 19 Nov 2020 16:29:43 +0000 (UTC) From: Francis Laniel To: Kees Cook Cc: akpm@linux-foundation.org, linux-hardening@vger.kernel.org, linux-mm@kvack.org, linux-kernel@vger.kernel.org, dja@axtens.net Subject: Re: [PATCH v5 4/5] Add new file in LKDTM to test fortified strscpy. Date: Thu, 19 Nov 2020 17:29:42 +0100 Message-ID: <17083947.HZsgYSklLr@machine> In-Reply-To: <202011181201.59B1B947A@keescook> References: <20201118110731.15833-1-laniel_francis@privacyrequired.com> <20201118110731.15833-5-laniel_francis@privacyrequired.com> <202011181201.59B1B947A@keescook> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="iso-8859-1" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Le mercredi 18 novembre 2020, 21:02:32 CET Kees Cook a =E9crit : > On Wed, Nov 18, 2020 at 12:07:30PM +0100, laniel_francis@privacyrequired.= com=20 wrote: > > From: Francis Laniel > >=20 > > This new test ensures that fortified strscpy has the same behavior than > > vanilla strscpy (e.g. returning -E2BIG when src content is truncated). > > Finally, it generates a crash at runtime because there is a write overf= low > > in destination string. > >=20 > > Signed-off-by: Francis Laniel > > Reviewed-by: Kees Cook > > --- > >=20 > > drivers/misc/lkdtm/Makefile | 1 + > > drivers/misc/lkdtm/core.c | 1 + > > drivers/misc/lkdtm/fortify.c | 82 +++++++++++++++++++++++++ > > drivers/misc/lkdtm/lkdtm.h | 3 + > > tools/testing/selftests/lkdtm/tests.txt | 1 + > > 5 files changed, 88 insertions(+) > > create mode 100644 drivers/misc/lkdtm/fortify.c > >=20 > > diff --git a/drivers/misc/lkdtm/Makefile b/drivers/misc/lkdtm/Makefile > > index c70b3822013f..d898f7b22045 100644 > > --- a/drivers/misc/lkdtm/Makefile > > +++ b/drivers/misc/lkdtm/Makefile > > @@ -10,6 +10,7 @@ lkdtm-$(CONFIG_LKDTM) +=3D rodata_objcopy.o > >=20 > > lkdtm-$(CONFIG_LKDTM) +=3D usercopy.o > > lkdtm-$(CONFIG_LKDTM) +=3D stackleak.o > > lkdtm-$(CONFIG_LKDTM) +=3D cfi.o > >=20 > > +lkdtm-$(CONFIG_LKDTM) +=3D fortify.o > >=20 > > KASAN_SANITIZE_stackleak.o :=3D n > > KCOV_INSTRUMENT_rodata.o :=3D n > >=20 > > diff --git a/drivers/misc/lkdtm/core.c b/drivers/misc/lkdtm/core.c > > index b8c51a633fcc..3c0a67f072c0 100644 > > --- a/drivers/misc/lkdtm/core.c > > +++ b/drivers/misc/lkdtm/core.c > > @@ -175,6 +175,7 @@ static const struct crashtype crashtypes[] =3D { > >=20 > > CRASHTYPE(USERCOPY_KERNEL), > > CRASHTYPE(STACKLEAK_ERASING), > > CRASHTYPE(CFI_FORWARD_PROTO), > >=20 > > + CRASHTYPE(FORTIFIED_STRSCPY), > >=20 > > #ifdef CONFIG_X86_32 > > =20 > > CRASHTYPE(DOUBLE_FAULT), > > =20 > > #endif > >=20 > > diff --git a/drivers/misc/lkdtm/fortify.c b/drivers/misc/lkdtm/fortify.c > > new file mode 100644 > > index 000000000000..790d46591bf5 > > --- /dev/null > > +++ b/drivers/misc/lkdtm/fortify.c > > @@ -0,0 +1,82 @@ > > +// SPDX-License-Identifier: GPL-2.0 > > +/* > > + * Copyright (c) 2020 Francis Laniel > > + * > > + * Add tests related to fortified functions in this file. > > + */ > > +#include > > +#include > > +#include "lkdtm.h" >=20 > Ah, I just noticed one small nit here during build testing: lkdtm.h > needs to be included first to get the correct pr_fmt to avoid a warning: >=20 > In file included from drivers/misc/lkdtm/fortify.c:9: > drivers/misc/lkdtm/lkdtm.h:5: warning: "pr_fmt" redefined > 5 | #define pr_fmt(fmt) "lkdtm: " fmt >=20 > -Kees This my bad, I noticed this warning but though it was "normal" with LKDTM. I should have asked about it! I will send the v6 soon!