forked from mirrors/linux
		
	 496d2d2388
			
		
	
	
		496d2d2388
		
	
	
	
	
		
			
			HARDENED_USERCOPY is checked within a function so even if disabled, the function overhead still exists. Move the static check inline. This is at best a micro-optimisation and any difference in performance was within noise but it is relatively consistent with the init_on_* implementations. Suggested-by: Kees Cook <kees@kernel.org> Signed-off-by: Mel Gorman <mgorman@techsingularity.net> Link: https://lore.kernel.org/r/20250123221115.19722-4-mgorman@techsingularity.net Signed-off-by: Kees Cook <kees@kernel.org>
		
			
				
	
	
		
			63 lines
		
	
	
	
		
			1.7 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			63 lines
		
	
	
	
		
			1.7 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| /* SPDX-License-Identifier: GPL-2.0 */
 | |
| /* Perform sanity checking for object sizes for uaccess.h and uio.h. */
 | |
| #ifndef __LINUX_UCOPYSIZE_H__
 | |
| #define __LINUX_UCOPYSIZE_H__
 | |
| 
 | |
| #include <linux/bug.h>
 | |
| 
 | |
| #ifdef CONFIG_HARDENED_USERCOPY
 | |
| #include <linux/jump_label.h>
 | |
| extern void __check_object_size(const void *ptr, unsigned long n,
 | |
| 					bool to_user);
 | |
| 
 | |
| DECLARE_STATIC_KEY_MAYBE(CONFIG_HARDENED_USERCOPY_DEFAULT_ON,
 | |
| 			   validate_usercopy_range);
 | |
| 
 | |
| static __always_inline void check_object_size(const void *ptr, unsigned long n,
 | |
| 					      bool to_user)
 | |
| {
 | |
| 	if (!__builtin_constant_p(n) &&
 | |
| 	    static_branch_maybe(CONFIG_HARDENED_USERCOPY_DEFAULT_ON,
 | |
| 				&validate_usercopy_range)) {
 | |
| 		__check_object_size(ptr, n, to_user);
 | |
| 	}
 | |
| }
 | |
| #else
 | |
| static inline void check_object_size(const void *ptr, unsigned long n,
 | |
| 				     bool to_user)
 | |
| { }
 | |
| #endif /* CONFIG_HARDENED_USERCOPY */
 | |
| 
 | |
| extern void __compiletime_error("copy source size is too small")
 | |
| __bad_copy_from(void);
 | |
| extern void __compiletime_error("copy destination size is too small")
 | |
| __bad_copy_to(void);
 | |
| 
 | |
| void __copy_overflow(int size, unsigned long count);
 | |
| 
 | |
| static inline void copy_overflow(int size, unsigned long count)
 | |
| {
 | |
| 	if (IS_ENABLED(CONFIG_BUG))
 | |
| 		__copy_overflow(size, count);
 | |
| }
 | |
| 
 | |
| static __always_inline __must_check bool
 | |
| check_copy_size(const void *addr, size_t bytes, bool is_source)
 | |
| {
 | |
| 	int sz = __builtin_object_size(addr, 0);
 | |
| 	if (unlikely(sz >= 0 && sz < bytes)) {
 | |
| 		if (!__builtin_constant_p(bytes))
 | |
| 			copy_overflow(sz, bytes);
 | |
| 		else if (is_source)
 | |
| 			__bad_copy_from();
 | |
| 		else
 | |
| 			__bad_copy_to();
 | |
| 		return false;
 | |
| 	}
 | |
| 	if (WARN_ON_ONCE(bytes > INT_MAX))
 | |
| 		return false;
 | |
| 	check_object_size(addr, bytes, is_source);
 | |
| 	return true;
 | |
| }
 | |
| 
 | |
| #endif /* __LINUX_UCOPYSIZE_H__ */
 |