Skip to content
Commit 3d2f47bf authored by Daniel Micay's avatar Daniel Micay Committed by Vikram Mulukutla
Browse files

replace incorrect strscpy use in FORTIFY_SOURCE



Using strscpy was wrong because FORTIFY_SOURCE is passing the maximum
possible size of the outermost object, but strscpy defines the count
parameter as the exact buffer size, so this could copy past the end of
the source.  This would still be wrong with the planned usage of
__builtin_object_size(p, 1) for intra-object overflow checks since it's
the maximum possible size of the specified object with no guarantee of
it being that large.

Reuse of the fortified functions like this currently makes the runtime
error reporting less precise but that can be improved later on.

Noticed by Dave Jones and KASAN.

Change-Id: I559abc94e1fd8acaa97cfc2c23d454caa43ce804
Signed-off-by: default avatarDaniel Micay <danielmicay@gmail.com>
Acked-by: default avatarKees Cook <keescook@chromium.org>
Reported-by: default avatarDave Jones <davej@codemonkey.org.uk>
Signed-off-by: default avatarLinus Torvalds <torvalds@linux-foundation.org>
Git-commit: 077d2ba519b2e8bf1abd80cbade699b1de42cafe
Git-repo: git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git


Signed-off-by: default avatarVikram Mulukutla <markivx@codeaurora.org>
parent ba13b75c
Loading
Loading
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment