2 * Copyright (C) 2020 Oracle.
4 * This program is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU General Public License
6 * as published by the Free Software Foundation; either version 2
7 * of the License, or (at your option) any later version.
9 * This program is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
12 * GNU General Public License for more details.
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, see http://www.gnu.org/copyleft/gpl.txt
19 * The problem here is that we can have:
23 * In the olden days we would just set "*p = 0-255" which meant that it pointed
24 * to user data. But then if we say "if (*p == 11) {" that means that "*p" is
25 * not user data any more, so then "*(p + 1)" is marked as not user data but it
28 * So now we've separated out the stuff that points to a user_buf from the other
31 * There is a further complication because what if "p" points to a struct? In
32 * that case all the struct members are handled by smatch_kernel_user_data.c
33 * but we still need to keep in mind that "*(p + 1)" is user data. I'm not
34 * totally 100% sure how this will work.
36 * Generally a user pointer should be a void pointer, or an array etc. But if
37 * it points to a struct that can only be used for pointer math.
42 #include "smatch_slist.h"
43 #include "smatch_extra.h"
56 // Old stuff that was here, but I no longer believe is user data
60 // add_function_hook("memcpy_fromiovec", &match_user_copy, INT_PTR(0));
61 // add_function_hook("usb_control_msg", &match_user_copy, INT_PTR(6));
63 static struct user_fn_info func_table
[] = {
64 { "copy_from_user", USER_PTR_SET
, 0, "$" },
65 { "__copy_from_user", USER_PTR_SET
, 0, "$" },
66 { "kvm_read_guest_virt", USER_PTR_SET
, 2, "$" },
67 { "vpu_iface_receive_msg", USER_PTR_SET
, 1, "$" },
68 { "xdr_stream_decode_u32", USER_PTR_SET
, 1, "$" },
70 { "(struct ksmbd_transport_ops)->read", USER_PTR_SET
, 1, "$" },
71 { "nlmsg_data", USER_PTR_SET
, -1, "$" },
72 { "nla_data", USER_PTR_SET
, -1, "$" },
73 { "memdup_user", USER_PTR_SET
, -1, "$" },
74 { "cfg80211_find_elem_match", USER_PTR_SET
, -1, "$" },
75 { "ieee80211_bss_get_elem", USER_PTR_SET
, -1, "$" },
76 { "cfg80211_find_elem", USER_PTR_SET
, -1, "$" },
77 { "ieee80211_bss_get_ie", USER_PTR_SET
, -1, "$" },
79 { "brcmf_fweh_dequeue_event", USER_PTR_SET
, -1, "&$->emsg" },
80 { "wilc_wlan_rxq_remove", USER_PTR_SET
, -1, "$->buffer" },
81 { "cfg80211_find_vendor_ie", USER_PTR_SET
, -1, "$" },
83 { "xdr_copy_to_scratch", USER_PTR_SET
, -1, "$" },
84 { "xdr_inline_decode", USER_PTR_SET
, -1, "$" },
85 { "ntfs_read_run_nb", USER_PTR_SET
, 3, "$" },
86 { "ntfs_read_bh", USER_PTR_SET
, 3, "(0<~$0)" },
88 { "kstrtoull", USER_PTR_SET
, 2, "$" },
89 { "kstrtoll", USER_PTR_SET
, 2, "$" },
90 { "kstrtoul", USER_PTR_SET
, 2, "$" },
91 { "kstrtol", USER_PTR_SET
, 2, "$" },
92 { "kstrtoint", USER_PTR_SET
, 2, "$" },
93 { "kstrtou64", USER_PTR_SET
, 2, "$" },
94 { "kstrtos64", USER_PTR_SET
, 2, "$" },
95 { "kstrtou32", USER_PTR_SET
, 2, "$" },
96 { "kstrtos32", USER_PTR_SET
, 2, "$" },
97 { "kstrtou16", USER_PTR_SET
, 2, "$" },
98 { "kstrtos16", USER_PTR_SET
, 2, "$" },
99 { "kstrtou8", USER_PTR_SET
, 2, "$" },
100 { "kstrtos8", USER_PTR_SET
, 2, "$" },
101 { "kstrtoull_from_user", USER_PTR_SET
, 2, "$" },
102 { "kstrtoll_from_user", USER_PTR_SET
, 2, "$" },
103 { "kstrtoul_from_user", USER_PTR_SET
, 2, "$" },
104 { "kstrtol_from_user", USER_PTR_SET
, 2, "$" },
105 { "kstrtouint_from_user", USER_PTR_SET
, 2, "$" },
106 { "kstrtoint_from_user", USER_PTR_SET
, 2, "$" },
107 { "kstrtou16_from_user", USER_PTR_SET
, 2, "$" },
108 { "kstrtos16_from_user", USER_PTR_SET
, 2, "$" },
109 { "kstrtou8_from_user", USER_PTR_SET
, 2, "$" },
110 { "kstrtos8_from_user", USER_PTR_SET
, 2, "$" },
111 { "kstrtou64_from_user", USER_PTR_SET
, 2, "$" },
112 { "kstrtos64_from_user", USER_PTR_SET
, 2, "$" },
113 { "kstrtou32_from_user", USER_PTR_SET
, 2, "$" },
114 { "kstrtos32_from_user", USER_PTR_SET
, 2, "$" },
117 static struct user_fn_info call_table
[] = {
118 { "__handle_ksmbd_work", USER_DATA
, 0, "$->request_buf" },
121 bool is_skb_data(struct expression
*expr
)
125 expr
= strip_expr(expr
);
128 if (expr
->type
!= EXPR_DEREF
)
133 if (strcmp(expr
->member
->name
, "data") != 0)
136 sym
= get_type(expr
->deref
);
139 if (sym
->type
== SYM_PTR
)
140 sym
= get_real_base_type(sym
);
141 if (!sym
|| sym
->type
!= SYM_STRUCT
|| !sym
->ident
)
143 if (strcmp(sym
->ident
->name
, "sk_buff") != 0)
149 static bool is_array_of_user_data(struct expression
*expr
)
151 struct expression
*deref
;
154 if (expr
->type
== EXPR_PREOP
&& expr
->op
== '&') {
155 expr
= strip_expr(expr
->unop
);
156 if (expr
->type
== EXPR_PREOP
&& expr
->op
== '*')
157 expr
= strip_expr(expr
->unop
);
160 /* This is for array elements &foo->data[4] */
161 if (expr
->type
== EXPR_BINOP
&& expr
->op
== '+') {
162 if (points_to_user_data(expr
->left
))
164 if (points_to_user_data(expr
->right
))
168 /* This is for if you have: foo = skb->data; frob(foo->array); */
169 type
= get_type(expr
);
170 if (!type
|| type
->type
!= SYM_ARRAY
)
173 if (expr
->type
!= EXPR_DEREF
)
175 deref
= strip_expr(expr
->deref
);
176 if (deref
->type
!= EXPR_PREOP
|| deref
->op
!= '*')
178 deref
= strip_expr(deref
->unop
);
179 return points_to_user_data(deref
);
182 static struct expression
*remove_addr_stuff(struct expression
*expr
)
184 /* take "&foo->bar" and return "foo" */
185 expr
= strip_expr(expr
);
186 if (expr
->type
!= EXPR_PREOP
|| expr
->op
!= '&')
188 expr
= strip_expr(expr
->unop
);
189 while (expr
&& expr
->type
== EXPR_DEREF
) {
190 expr
= strip_expr(expr
->deref
);
196 if (expr
->type
== EXPR_PREOP
&& expr
->op
== '*')
197 expr
= strip_expr(expr
->unop
);
201 static bool math_points_to_user_data(struct expression
*expr
)
205 // TODO: is_array_of_user_data() should probably be handled here
207 if (expr
->type
== EXPR_BINOP
&& expr
->op
== '+')
208 return math_points_to_user_data(expr
->left
);
210 expr
= remove_addr_stuff(expr
);
212 sm
= get_sm_state_expr(my_id
, expr
);
215 if (slist_has_state(sm
->possible
, &user_data
) ||
216 slist_has_state(sm
->possible
, &user_data_set
))
221 bool points_to_user_data(struct expression
*expr
)
225 expr
= strip_expr(expr
);
229 if (expr
->type
== EXPR_POSTOP
)
230 expr
= strip_expr(expr
->unop
);
232 if (is_fake_call(expr
))
235 if (expr
->type
== EXPR_ASSIGNMENT
)
236 return points_to_user_data(expr
->left
);
238 if (is_array_of_user_data(expr
))
241 if (expr
->type
== EXPR_BINOP
&& expr
->op
== '+')
242 return math_points_to_user_data(expr
);
244 if (is_skb_data(expr
))
247 // FIXME if you have a struct pointer p then p->foo should be handled
248 // by smatch_kernel_user_data.c but if you have (p + 1)->foo then this
249 // should be handled here.
250 sm
= get_sm_state_expr(my_id
, expr
);
253 if (slist_has_state(sm
->possible
, &user_data
) ||
254 slist_has_state(sm
->possible
, &user_data_set
))
259 void set_array_user_ptr(struct expression
*expr
, bool is_new
)
261 struct expression
*tmp
;
263 tmp
= get_assigned_expr(expr
);
265 set_state_expr(my_id
, tmp
, is_new
? &user_data_set
: &user_data
);
266 set_state_expr(my_id
, expr
, is_new
? &user_data_set
: &user_data
);
269 static void match_assign(struct expression
*expr
)
271 if (is_fake_call(expr
->right
))
274 if (!is_ptr_type(get_type(expr
->left
)))
277 if (points_to_user_data(expr
->right
)) {
278 // FIXME: if the types are different then mark the stuff on
279 // the left as user data.
280 set_state_expr(my_id
, expr
->left
, &user_data
);
284 // FIXME: just use a modification hook
285 if (get_state_expr(my_id
, expr
->left
))
286 set_state_expr(my_id
, expr
->left
, &undefined
);
289 static void match_memcpy(const char *fn
, struct expression
*expr
, void *_unused
)
291 struct expression
*dest
, *src
;
293 dest
= get_argument_from_call_expr(expr
->args
, 0);
294 src
= get_argument_from_call_expr(expr
->args
, 1);
296 if (points_to_user_data(src
)) {
297 set_state_expr(my_id
, expr
->left
, &user_data_set
);
301 if (get_state_expr(my_id
, dest
))
302 set_state_expr(my_id
, dest
, &undefined
);
305 static void fake_assign_helper(struct expression
*expr
, void *data
)
307 struct expression
*left
= expr
->left
;
311 type
= get_type(left
);
314 if (type
->type
== SYM_BASETYPE
)
315 mark_as_user_data(left
, set
);
316 else if (type
->type
== SYM_ARRAY
)
317 set_array_user_ptr(left
, set
);
320 static void returns_user_ptr_helper(struct expression
*expr
, const char *name
, struct symbol
*sym
, bool set
)
322 struct expression
*call
, *arg
;
325 while (call
&& call
->type
== EXPR_ASSIGNMENT
)
326 call
= strip_expr(expr
->right
);
327 if (!call
|| call
->type
!= EXPR_CALL
)
330 if (!set
&& !we_pass_user_data(call
))
333 arg
= gen_expression_from_name_sym(name
, sym
);
337 create_recursive_fake_assignments(deref_expression(arg
), &fake_assign_helper
, INT_PTR(set
));
339 if (arg
->type
== EXPR_PREOP
&& arg
->op
== '&') {
342 type
= get_type(arg
->unop
);
343 if (!type
|| type
->type
!= SYM_ARRAY
)
347 set_state_expr(my_id
, arg
, set
? &user_data_set
: &user_data
);
350 static void returns_user_ptr(struct expression
*expr
, const char *name
, struct symbol
*sym
, void *data
)
352 returns_user_ptr_helper(expr
, name
, sym
, false);
355 static void returns_user_ptr_set(struct expression
*expr
, const char *name
, struct symbol
*sym
, void *data
)
357 returns_user_ptr_helper(expr
, name
, sym
, true);
360 static void set_param_user_ptr(const char *name
, struct symbol
*sym
, char *value
)
362 set_state(my_id
, name
, sym
, &user_data
);
365 static void set_caller_param_key_user_ptr(struct expression
*expr
, const char *name
,
366 struct symbol
*sym
, void *data
)
368 set_state(my_id
, name
, sym
, &user_data
);
371 static void caller_info_callback(struct expression
*call
, int param
, char *printed_name
, struct sm_state
*sm
)
373 if (is_socket_stuff(sm
->sym
))
376 if (!slist_has_state(sm
->possible
, &user_data
) &&
377 !slist_has_state(sm
->possible
, &user_data_set
))
380 sql_insert_caller_info(call
, USER_PTR
, param
, printed_name
, "");
383 static void return_info_callback(int return_id
, char *return_ranges
,
384 struct expression
*returned_expr
,
386 const char *printed_name
,
391 /* is this even possible? */
392 if (strcmp(printed_name
, "&$") == 0)
395 if (is_socket_stuff(sm
->sym
))
399 if (!slist_has_state(sm
->possible
, &user_data_set
))
403 if (slist_has_state(sm
->possible
, &user_data_set
))
405 else if (slist_has_state(sm
->possible
, &user_data
))
410 if (parent_is_gone_var_sym(sm
->name
, sm
->sym
))
413 sql_insert_return_states(return_id
, return_ranges
, type
,
414 param
, printed_name
, "");
417 void register_points_to_user_data(int id
)
419 struct user_fn_info
*info
;
424 if (option_project
!= PROJ_KERNEL
)
427 add_hook(&match_assign
, ASSIGNMENT_HOOK
);
429 add_function_hook("memcpy", &match_memcpy
, NULL
);
430 add_function_hook("__memcpy", &match_memcpy
, NULL
);
432 add_caller_info_callback(my_id
, caller_info_callback
);
433 add_return_info_callback(my_id
, return_info_callback
);
435 select_caller_name_sym(set_param_user_ptr
, USER_PTR
);
436 for (i
= 0; i
< ARRAY_SIZE(call_table
); i
++) {
437 info
= &call_table
[i
];
438 add_function_param_key_hook_early(info
->name
,
439 &set_caller_param_key_user_ptr
,
440 info
->param
, info
->key
, info
);
443 select_return_param_key(USER_PTR
, &returns_user_ptr
);
444 select_return_param_key(USER_PTR_SET
, &returns_user_ptr_set
);
445 for (i
= 0; i
< ARRAY_SIZE(func_table
); i
++) {
446 info
= &func_table
[i
];
447 add_function_param_key_hook_late(info
->name
,
448 &returns_user_ptr_set
,
449 info
->param
, info
->key
, info
);