1
0
mirror of git://git.gnupg.org/gnupg.git synced 2024-11-10 21:38:50 +01:00
gnupg/util/secmem.c

379 lines
7.6 KiB
C
Raw Normal View History

1998-01-28 17:09:43 +01:00
/* secmem.c - memory allocation from a secure heap
* Copyright (C) 1998,1999 Free Software Foundation, Inc.
1998-01-28 17:09:43 +01:00
*
* This file is part of GnuPG.
1998-01-28 17:09:43 +01:00
*
* GnuPG is free software; you can redistribute it and/or modify
1998-01-28 17:09:43 +01:00
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* GnuPG is distributed in the hope that it will be useful,
1998-01-28 17:09:43 +01:00
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
*/
#include <config.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#include <stdarg.h>
#include <unistd.h>
1998-01-28 17:09:43 +01:00
#if defined(HAVE_MLOCK) || defined(HAVE_MMAP)
#include <sys/mman.h>
#include <sys/types.h>
1998-09-14 17:49:56 +02:00
#include <fcntl.h>
1998-01-28 17:09:43 +01:00
#endif
#include "types.h"
#include "memory.h"
#include "util.h"
1998-02-09 18:43:42 +01:00
#include "i18n.h"
1998-01-28 17:09:43 +01:00
1998-08-05 18:51:59 +02:00
#if defined(MAP_ANON) && !defined(MAP_ANONYMOUS)
#define MAP_ANONYMOUS MAP_ANON
#endif
1998-01-28 17:09:43 +01:00
#define DEFAULT_POOLSIZE 8196
typedef struct memblock_struct MEMBLOCK;
struct memblock_struct {
unsigned size;
union {
MEMBLOCK *next;
PROPERLY_ALIGNED_TYPE aligned;
1998-01-28 17:09:43 +01:00
} u;
};
static void *pool;
static int pool_okay;
static int pool_is_mmapped;
static size_t poolsize; /* allocated length */
static size_t poollen; /* used length */
static MEMBLOCK *unused_blocks;
static unsigned max_alloced;
static unsigned cur_alloced;
static unsigned max_blocks;
static unsigned cur_blocks;
1998-02-02 15:36:06 +01:00
static int disable_secmem;
1998-02-12 00:22:09 +01:00
static int show_warning;
static int no_warning;
1998-09-28 21:25:31 +02:00
static int suspend_warning;
static void
print_warn(void)
1998-09-28 21:25:31 +02:00
{
if( !no_warning )
log_info(_("Warning: using insecure memory!\n"));
}
1998-01-28 17:09:43 +01:00
static void
lock_pool( void *p, size_t n )
{
#ifdef HAVE_MLOCK
uid_t uid;
int err;
1998-09-18 17:24:53 +02:00
uid = getuid();
#ifdef HAVE_BROKEN_MLOCK
1998-09-28 21:25:31 +02:00
if( uid ) {
errno = EPERM;
err = errno;
}
1998-09-18 17:24:53 +02:00
else {
err = mlock( p, n );
if( err && errno )
err = errno;
}
#else
1998-06-26 11:45:36 +02:00
err = mlock( p, n );
1998-01-28 17:09:43 +01:00
if( err && errno )
err = errno;
1998-09-18 17:24:53 +02:00
#endif
1998-01-28 17:09:43 +01:00
if( uid && !geteuid() ) {
if( setuid( uid ) || getuid() != geteuid() )
1998-01-28 17:09:43 +01:00
log_fatal("failed to reset uid: %s\n", strerror(errno));
}
if( err ) {
1998-02-26 17:56:31 +01:00
if( errno != EPERM
#ifdef EAGAIN /* OpenBSD returns this */
&& errno != EAGAIN
#endif
)
1998-02-09 18:43:42 +01:00
log_error("can<EFBFBD>t lock memory: %s\n", strerror(err));
1998-02-12 00:22:09 +01:00
show_warning = 1;
1998-01-28 17:09:43 +01:00
}
#else
1998-02-24 19:50:46 +01:00
log_info("Please note that you don't have secure memory on this system\n");
1998-01-28 17:09:43 +01:00
#endif
}
static void
init_pool( size_t n)
{
1998-09-14 17:49:56 +02:00
size_t pgsize;
1998-01-28 17:09:43 +01:00
poolsize = n;
1998-02-02 15:36:06 +01:00
if( disable_secmem )
log_bug("secure memory is disabled");
1998-09-14 17:49:56 +02:00
#ifdef HAVE_GETPAGESIZE
pgsize = getpagesize();
#else
pgsize = 4096;
#endif
#if HAVE_MMAP
poolsize = (poolsize + pgsize -1 ) & ~(pgsize-1);
#ifdef MAP_ANONYMOUS
pool = mmap( 0, poolsize, PROT_READ|PROT_WRITE,
MAP_PRIVATE|MAP_ANONYMOUS, -1, 0);
#else /* map /dev/zero instead */
{ int fd;
fd = open("/dev/zero", O_RDWR);
if( fd == -1 ) {
log_error("can't open /dev/zero: %s\n", strerror(errno) );
pool = (void*)-1;
}
else {
pool = mmap( 0, poolsize, PROT_READ|PROT_WRITE,
MAP_PRIVATE, fd, 0);
}
}
#endif
1998-01-28 17:09:43 +01:00
if( pool == (void*)-1 )
1998-10-06 14:10:02 +02:00
log_info("can't mmap pool of %u bytes: %s - using malloc\n",
1998-01-28 17:09:43 +01:00
(unsigned)poolsize, strerror(errno));
else {
pool_is_mmapped = 1;
pool_okay = 1;
}
#endif
if( !pool_okay ) {
pool = malloc( poolsize );
if( !pool )
1998-02-02 15:36:06 +01:00
log_fatal("can't allocate memory pool of %u bytes\n",
1998-01-28 17:09:43 +01:00
(unsigned)poolsize);
else
pool_okay = 1;
}
lock_pool( pool, poolsize );
poollen = 0;
}
/* concatenate unused blocks */
static void
compress_pool(void)
{
}
1998-02-12 00:22:09 +01:00
void
secmem_set_flags( unsigned flags )
{
1998-09-28 21:25:31 +02:00
int was_susp = suspend_warning;
1998-02-12 00:22:09 +01:00
no_warning = flags & 1;
1998-09-28 21:25:31 +02:00
suspend_warning = flags & 2;
/* and now issue the warning if it is not longer suspended */
if( was_susp && !suspend_warning && show_warning ) {
show_warning = 0;
print_warn();
}
1998-02-12 00:22:09 +01:00
}
unsigned
secmem_get_flags(void)
{
1998-09-28 21:25:31 +02:00
unsigned flags;
flags = no_warning ? 1:0;
flags |= suspend_warning ? 2:0;
return flags;
1998-02-12 00:22:09 +01:00
}
1998-01-28 17:09:43 +01:00
void
secmem_init( size_t n )
{
1998-07-09 15:37:17 +02:00
if( !n ) {
#ifndef HAVE_DOSISH_SYSTEM
1998-07-09 15:37:17 +02:00
uid_t uid;
1998-02-02 15:36:06 +01:00
disable_secmem=1;
1998-07-09 15:37:17 +02:00
uid = getuid();
if( uid != geteuid() ) {
if( setuid( uid ) || getuid() != geteuid() )
1998-07-09 15:37:17 +02:00
log_fatal("failed to drop setuid\n" );
}
1998-10-06 14:10:02 +02:00
#endif
1998-07-09 15:37:17 +02:00
}
1998-02-02 15:36:06 +01:00
else {
if( n < DEFAULT_POOLSIZE )
n = DEFAULT_POOLSIZE;
if( !pool_okay )
init_pool(n);
else
log_error("Oops, secure memory pool already initialized\n");
}
1998-01-28 17:09:43 +01:00
}
void *
secmem_malloc( size_t size )
{
MEMBLOCK *mb, *mb2;
int compressed=0;
if( !pool_okay ) {
log_info(
_("operation is not possible without initialized secure memory\n"));
log_info(_("(you may have used the wrong program for this task)\n"));
exit(2);
}
1998-09-28 21:25:31 +02:00
if( show_warning && !suspend_warning ) {
1998-02-12 00:22:09 +01:00
show_warning = 0;
1998-09-28 21:25:31 +02:00
print_warn();
1998-02-12 00:22:09 +01:00
}
1998-01-28 17:09:43 +01:00
/* blocks are always a multiple of 32 */
size += sizeof(MEMBLOCK);
size = ((size + 31) / 32) * 32;
retry:
/* try to get it from the used blocks */
for(mb = unused_blocks,mb2=NULL; mb; mb2=mb, mb = mb->u.next )
if( mb->size >= size ) {
if( mb2 )
mb2->u.next = mb->u.next;
else
unused_blocks = mb->u.next;
goto leave;
}
/* allocate a new block */
if( (poollen + size <= poolsize) ) {
1998-07-29 21:35:05 +02:00
mb = (void*)((char*)pool + poollen);
1998-01-28 17:09:43 +01:00
poollen += size;
mb->size = size;
}
else if( !compressed ) {
compressed=1;
compress_pool();
goto retry;
}
else
return NULL;
leave:
cur_alloced += mb->size;
cur_blocks++;
if( cur_alloced > max_alloced )
max_alloced = cur_alloced;
if( cur_blocks > max_blocks )
max_blocks = cur_blocks;
return &mb->u.aligned.c;
1998-01-28 17:09:43 +01:00
}
1998-02-27 18:51:28 +01:00
void *
secmem_realloc( void *p, size_t newsize )
{
MEMBLOCK *mb;
size_t size;
void *a;
mb = (MEMBLOCK*)((char*)p - ((size_t) &((MEMBLOCK*)0)->u.aligned.c));
1998-02-27 18:51:28 +01:00
size = mb->size;
if( newsize < size )
return p; /* it is easier not to shrink the memory */
a = secmem_malloc( newsize );
memcpy(a, p, size);
1998-07-29 21:35:05 +02:00
memset((char*)a+size, 0, newsize-size);
1998-02-27 18:51:28 +01:00
secmem_free(p);
return a;
}
1998-01-28 17:09:43 +01:00
void
secmem_free( void *a )
{
MEMBLOCK *mb;
size_t size;
if( !a )
return;
mb = (MEMBLOCK*)((char*)a - ((size_t) &((MEMBLOCK*)0)->u.aligned.c));
1998-01-28 17:09:43 +01:00
size = mb->size;
/* This does not make much sense: probably this memory is held in the
* cache. We do it anyway: */
1998-01-28 17:09:43 +01:00
memset(mb, 0xff, size );
memset(mb, 0xaa, size );
memset(mb, 0x55, size );
memset(mb, 0x00, size );
mb->size = size;
mb->u.next = unused_blocks;
unused_blocks = mb;
cur_blocks--;
cur_alloced -= size;
}
1998-02-27 18:51:28 +01:00
int
m_is_secure( const void *p )
{
1998-07-31 18:45:58 +02:00
return p >= pool && p < (void*)((char*)pool+poolsize);
1998-02-27 18:51:28 +01:00
}
1998-01-28 17:09:43 +01:00
void
secmem_term()
{
if( !pool_okay )
return;
memset( pool, 0xff, poolsize);
memset( pool, 0xaa, poolsize);
memset( pool, 0x55, poolsize);
memset( pool, 0x00, poolsize);
#if HAVE_MMAP
if( pool_is_mmapped )
munmap( pool, poolsize );
#endif
pool = NULL;
pool_okay = 0;
poolsize=0;
poollen=0;
unused_blocks=NULL;
}
void
secmem_dump_stats()
{
1998-02-02 15:36:06 +01:00
if( disable_secmem )
return;
1998-01-28 17:09:43 +01:00
fprintf(stderr,
"secmem usage: %u/%u bytes in %u/%u blocks of pool %lu/%lu\n",
cur_alloced, max_alloced, cur_blocks, max_blocks,
(ulong)poollen, (ulong)poolsize );
}