Skip to content

Commit 36843bf

Browse files
committed
Merge tag 'hardening-v6.13-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux
Pull hardening updates from Kees Cook: - Disable __counted_by in Clang < 19.1.3 (Jan Hendrik Farr) - string_helpers: Silence output truncation warning (Bartosz Golaszewski) - compiler.h: Avoid needing BUILD_BUG_ON_ZERO() (Philipp Reisner) - MAINTAINERS: Add kernel hardening keywords __counted_by{_le|_be} (Thorsten Blum) * tag 'hardening-v6.13-rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/kees/linux: Compiler Attributes: disable __counted_by for clang < 19.1.3 compiler.h: Fix undefined BUILD_BUG_ON_ZERO() lib: string_helpers: silence snprintf() output truncation warning MAINTAINERS: Add kernel hardening keywords __counted_by{_le|_be}
2 parents 573f45a + f06e108 commit 36843bf

File tree

8 files changed

+41
-19
lines changed

8 files changed

+41
-19
lines changed

MAINTAINERS

+1-1
Original file line numberDiff line numberDiff line change
@@ -12403,7 +12403,7 @@ F: mm/usercopy.c
1240312403
F: security/Kconfig.hardening
1240412404
K: \b(add|choose)_random_kstack_offset\b
1240512405
K: \b__check_(object_size|heap_object)\b
12406-
K: \b__counted_by\b
12406+
K: \b__counted_by(_le|_be)?\b
1240712407

1240812408
KERNEL JANITORS
1240912409

drivers/misc/lkdtm/bugs.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -445,7 +445,7 @@ static void lkdtm_FAM_BOUNDS(void)
445445

446446
pr_err("FAIL: survived access of invalid flexible array member index!\n");
447447

448-
if (!__has_attribute(__counted_by__))
448+
if (!IS_ENABLED(CONFIG_CC_HAS_COUNTED_BY))
449449
pr_warn("This is expected since this %s was built with a compiler that does not support __counted_by\n",
450450
lkdtm_kernel_info);
451451
else if (IS_ENABLED(CONFIG_UBSAN_BOUNDS))

include/linux/compiler.h

+9-2
Original file line numberDiff line numberDiff line change
@@ -239,11 +239,18 @@ static inline void *offset_to_ptr(const int *off)
239239

240240
#endif /* __ASSEMBLY__ */
241241

242+
#ifdef __CHECKER__
243+
#define __BUILD_BUG_ON_ZERO_MSG(e, msg) (0)
244+
#else /* __CHECKER__ */
245+
#define __BUILD_BUG_ON_ZERO_MSG(e, msg) ((int)sizeof(struct {_Static_assert(!(e), msg);}))
246+
#endif /* __CHECKER__ */
247+
242248
/* &a[0] degrades to a pointer: a different type from an array */
243-
#define __must_be_array(a) BUILD_BUG_ON_ZERO(__same_type((a), &(a)[0]))
249+
#define __must_be_array(a) __BUILD_BUG_ON_ZERO_MSG(__same_type((a), &(a)[0]), "must be array")
244250

245251
/* Require C Strings (i.e. NUL-terminated) lack the "nonstring" attribute. */
246-
#define __must_be_cstr(p) BUILD_BUG_ON_ZERO(__annotated(p, nonstring))
252+
#define __must_be_cstr(p) \
253+
__BUILD_BUG_ON_ZERO_MSG(__annotated(p, nonstring), "must be cstr (NUL-terminated)")
247254

248255
/*
249256
* This returns a constant expression while determining if an argument is

include/linux/compiler_attributes.h

-13
Original file line numberDiff line numberDiff line change
@@ -94,19 +94,6 @@
9494
# define __copy(symbol)
9595
#endif
9696

97-
/*
98-
* Optional: only supported since gcc >= 15
99-
* Optional: only supported since clang >= 18
100-
*
101-
* gcc: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108896
102-
* clang: https://github.com/llvm/llvm-project/pull/76348
103-
*/
104-
#if __has_attribute(__counted_by__)
105-
# define __counted_by(member) __attribute__((__counted_by__(member)))
106-
#else
107-
# define __counted_by(member)
108-
#endif
109-
11097
/*
11198
* Optional: not supported by gcc
11299
* Optional: only supported since clang >= 14.0

include/linux/compiler_types.h

+19
Original file line numberDiff line numberDiff line change
@@ -329,6 +329,25 @@ struct ftrace_likely_data {
329329
#define __no_sanitize_or_inline __always_inline
330330
#endif
331331

332+
/*
333+
* Optional: only supported since gcc >= 15
334+
* Optional: only supported since clang >= 18
335+
*
336+
* gcc: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=108896
337+
* clang: https://github.com/llvm/llvm-project/pull/76348
338+
*
339+
* __bdos on clang < 19.1.2 can erroneously return 0:
340+
* https://github.com/llvm/llvm-project/pull/110497
341+
*
342+
* __bdos on clang < 19.1.3 can be off by 4:
343+
* https://github.com/llvm/llvm-project/pull/112636
344+
*/
345+
#ifdef CONFIG_CC_HAS_COUNTED_BY
346+
# define __counted_by(member) __attribute__((__counted_by__(member)))
347+
#else
348+
# define __counted_by(member)
349+
#endif
350+
332351
/*
333352
* Apply __counted_by() when the Endianness matches to increase test coverage.
334353
*/

init/Kconfig

+9
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,15 @@ config CC_HAS_ASM_INLINE
120120
config CC_HAS_NO_PROFILE_FN_ATTR
121121
def_bool $(success,echo '__attribute__((no_profile_instrument_function)) int x();' | $(CC) -x c - -c -o /dev/null -Werror)
122122

123+
config CC_HAS_COUNTED_BY
124+
# TODO: when gcc 15 is released remove the build test and add
125+
# a gcc version check
126+
def_bool $(success,echo 'struct flex { int count; int array[] __attribute__((__counted_by__(count))); };' | $(CC) $(CLANG_FLAGS) -x c - -c -o /dev/null -Werror)
127+
# clang needs to be at least 19.1.3 to avoid __bdos miscalculations
128+
# https://github.com/llvm/llvm-project/pull/110497
129+
# https://github.com/llvm/llvm-project/pull/112636
130+
depends on !(CC_IS_CLANG && CLANG_VERSION < 190103)
131+
123132
config PAHOLE_VERSION
124133
int
125134
default $(shell,$(srctree)/scripts/pahole-version.sh $(PAHOLE))

lib/overflow_kunit.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -1187,7 +1187,7 @@ static void DEFINE_FLEX_test(struct kunit *test)
11871187
{
11881188
/* Using _RAW_ on a __counted_by struct will initialize "counter" to zero */
11891189
DEFINE_RAW_FLEX(struct foo, two_but_zero, array, 2);
1190-
#if __has_attribute(__counted_by__)
1190+
#ifdef CONFIG_CC_HAS_COUNTED_BY
11911191
int expected_raw_size = sizeof(struct foo);
11921192
#else
11931193
int expected_raw_size = sizeof(struct foo) + 2 * sizeof(s16);

lib/string_helpers.c

+1-1
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ int string_get_size(u64 size, u64 blk_size, const enum string_size_units units,
5757
static const unsigned int rounding[] = { 500, 50, 5 };
5858
int i = 0, j;
5959
u32 remainder = 0, sf_cap;
60-
char tmp[8];
60+
char tmp[12];
6161
const char *unit;
6262

6363
tmp[0] = '\0';

0 commit comments

Comments
 (0)