commit:     94948c9cb994f123f6ae59b50e400eb6e617c46f
Author:     Sam James <sam <AT> gentoo <DOT> org>
AuthorDate: Thu Apr 28 01:25:20 2022 +0000
Commit:     Sam James <sam <AT> gentoo <DOT> org>
CommitDate: Thu Apr 28 01:26:34 2022 +0000
URL:        https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=94948c9c

sys-apps/systemd: backport -D_FORTIFY_SOURCE=3 patch

Notably not bothering to revbump for now because this manifests
during self-execution during build and FORTIFY_SOURCE=3 is only
available in GCC 12 which isn't even released yet, let alone
exposed or enabled by default in Gentoo.

It's far more likely that systemd 251 will be released (or
at least another RC for it) before we're even close to unleashing
FORTIFY_SOURCE=3 on Gentoo Hardened users by default.

Bug: https://github.com/systemd/systemd/issues/22801
Signed-off-by: Sam James <sam <AT> gentoo.org>

 .../files/250.4-fortify-source-3-malloc.patch      | 42 ++++++++++++++++++++++
 sys-apps/systemd/systemd-250.4-r1.ebuild           |  1 +
 2 files changed, 43 insertions(+)

diff --git a/sys-apps/systemd/files/250.4-fortify-source-3-malloc.patch 
b/sys-apps/systemd/files/250.4-fortify-source-3-malloc.patch
new file mode 100644
index 000000000000..ed9eb80f21fa
--- /dev/null
+++ b/sys-apps/systemd/files/250.4-fortify-source-3-malloc.patch
@@ -0,0 +1,42 @@
+https://github.com/systemd/systemd/commit/0bd292567a543d124cd303f7dd61169a209cae64
+
+From 0bd292567a543d124cd303f7dd61169a209cae64 Mon Sep 17 00:00:00 2001
+From: Martin Liska <mli...@suse.cz>
+Date: Thu, 31 Mar 2022 10:27:45 +0200
+Subject: [PATCH] Support -D_FORTIFY_SOURCE=3 by using
+ __builtin_dynamic_object_size.
+
+As explained in the issue, -D_FORTIFY_SOURCE=3 requires usage
+of __builtin_dynamic_object_size in MALLOC_SIZEOF_SAFE macro.
+
+Fixes: #22801
+--- a/src/basic/alloc-util.h
++++ b/src/basic/alloc-util.h
+@@ -174,13 +174,23 @@ void* greedy_realloc0(void **p, size_t need, size_t 
size);
+  * is compatible with _FORTIFY_SOURCES. If _FORTIFY_SOURCES is used many 
memory operations will take the
+  * object size as returned by __builtin_object_size() into account. Hence, 
let's return the smaller size of
+  * malloc_usable_size() and __builtin_object_size() here, so that we 
definitely operate in safe territory by
+- * both the compiler's and libc's standards. Note that 
__builtin_object_size() evaluates to SIZE_MAX if the
+- * size cannot be determined, hence the MIN() expression should be safe with 
dynamically sized memory,
+- * too. Moreover, when NULL is passed malloc_usable_size() is documented to 
return zero, and
++ * both the compiler's and libc's standards. Note that _FORTIFY_SOURCES=3 
handles also dynamically allocated
++ * objects and thus it's safer using __builtin_dynamic_object_size if 
_FORTIFY_SOURCES=3 is used (#22801).
++ * Moreover, when NULL is passed malloc_usable_size() is documented to return 
zero, and
+  * __builtin_object_size() returns SIZE_MAX too, hence we also return a 
sensible value of 0 in this corner
+  * case. */
++
++#if defined __has_builtin
++#  if __has_builtin(__builtin_dynamic_object_size)
++#    define MALLOC_SIZEOF_SAFE(x) \
++        MIN(malloc_usable_size(x), __builtin_dynamic_object_size(x, 0))
++#  endif
++#endif
++
++#ifndef MALLOC_SIZEOF_SAFE
+ #define MALLOC_SIZEOF_SAFE(x) \
+         MIN(malloc_usable_size(x), __builtin_object_size(x, 0))
++#endif
+
+ /* Inspired by ELEMENTSOF() but operates on malloc()'ed memory areas: 
typesafely returns the number of items
+  * that fit into the specified memory block */
+

diff --git a/sys-apps/systemd/systemd-250.4-r1.ebuild 
b/sys-apps/systemd/systemd-250.4-r1.ebuild
index 0a50c49d2cc6..949d0d02e69c 100644
--- a/sys-apps/systemd/systemd-250.4-r1.ebuild
+++ b/sys-apps/systemd/systemd-250.4-r1.ebuild
@@ -244,6 +244,7 @@ src_prepare() {
        # Add local patches here
        PATCHES+=(
                "${FILESDIR}/250.4-random-seed-hash.patch"
+               "${FILESDIR}/250.4-fortify-source-3-malloc.patch"
        )
 
        if ! use vanilla; then

Reply via email to