linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH v2 1/2] seq_buf: Make seq_buf_puts() null-terminate the buffer
@ 2018-10-19  4:21 Michael Ellerman
  2018-10-19  4:21 ` [PATCH v2 2/2] seq_buf: Use size_t for len in seq_buf_puts() Michael Ellerman
  2018-12-12 11:21 ` [PATCH v2 1/2] seq_buf: Make seq_buf_puts() null-terminate the buffer Michael Ellerman
  0 siblings, 2 replies; 6+ messages in thread
From: Michael Ellerman @ 2018-10-19  4:21 UTC (permalink / raw)
  To: rostedt; +Cc: linux-kernel, kernel-hardening, jannh, keescook

Currently seq_buf_puts() will happily create a non null-terminated
string for you in the buffer. This is particularly dangerous if the
buffer is on the stack.

For example:

  char buf[8];
  char secret = "secret";
  struct seq_buf s;

  seq_buf_init(&s, buf, sizeof(buf));
  seq_buf_puts(&s, "foo");
  printk("Message is %s\n", buf);

Can result in:

  Message is fooªªªªªsecret

We could require all users to memset() their buffer to zero before
use. But that seems likely to be forgotten and lead to bugs.

Instead we can change seq_buf_puts() to always leave the buffer in a
null-terminated state.

The only downside is that this makes the buffer 1 character smaller
for seq_buf_puts(), but that seems like a good trade off.

Acked-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
---
 lib/seq_buf.c | 6 +++++-
 1 file changed, 5 insertions(+), 1 deletion(-)

v2: Fix NULL/null terminology.

diff --git a/lib/seq_buf.c b/lib/seq_buf.c
index 11f2ae0f9099..6aabb609dd87 100644
--- a/lib/seq_buf.c
+++ b/lib/seq_buf.c
@@ -144,9 +144,13 @@ int seq_buf_puts(struct seq_buf *s, const char *str)
 
 	WARN_ON(s->size == 0);
 
+	/* Add 1 to len for the trailing null byte which must be there */
+	len += 1;
+
 	if (seq_buf_can_fit(s, len)) {
 		memcpy(s->buffer + s->len, str, len);
-		s->len += len;
+		/* Don't count the trailing null byte against the capacity */
+		s->len += len - 1;
 		return 0;
 	}
 	seq_buf_set_overflow(s);
-- 
2.17.2


^ permalink raw reply related	[flat|nested] 6+ messages in thread

* [PATCH v2 2/2] seq_buf: Use size_t for len in seq_buf_puts()
  2018-10-19  4:21 [PATCH v2 1/2] seq_buf: Make seq_buf_puts() null-terminate the buffer Michael Ellerman
@ 2018-10-19  4:21 ` Michael Ellerman
  2018-12-12 11:21 ` [PATCH v2 1/2] seq_buf: Make seq_buf_puts() null-terminate the buffer Michael Ellerman
  1 sibling, 0 replies; 6+ messages in thread
From: Michael Ellerman @ 2018-10-19  4:21 UTC (permalink / raw)
  To: rostedt; +Cc: linux-kernel, kernel-hardening, jannh, keescook

Jann Horn points out that we're using unsigned int for len in
seq_buf_puts(), which could potentially overflow if we're passed a
UINT_MAX sized string.

The rest of the code already uses size_t, so we should also use that
in seq_buf_puts() to avoid any issues.

Suggested-by: Jann Horn <jannh@google.com>
Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
---
 lib/seq_buf.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

v2: New in v2.

diff --git a/lib/seq_buf.c b/lib/seq_buf.c
index 6aabb609dd87..bd807f545a9d 100644
--- a/lib/seq_buf.c
+++ b/lib/seq_buf.c
@@ -140,7 +140,7 @@ int seq_buf_bprintf(struct seq_buf *s, const char *fmt, const u32 *binary)
  */
 int seq_buf_puts(struct seq_buf *s, const char *str)
 {
-	unsigned int len = strlen(str);
+	size_t len = strlen(str);
 
 	WARN_ON(s->size == 0);
 
-- 
2.17.2


^ permalink raw reply related	[flat|nested] 6+ messages in thread

* Re: [PATCH v2 1/2] seq_buf: Make seq_buf_puts() null-terminate the buffer
  2018-10-19  4:21 [PATCH v2 1/2] seq_buf: Make seq_buf_puts() null-terminate the buffer Michael Ellerman
  2018-10-19  4:21 ` [PATCH v2 2/2] seq_buf: Use size_t for len in seq_buf_puts() Michael Ellerman
@ 2018-12-12 11:21 ` Michael Ellerman
  2018-12-12 13:45   ` Steven Rostedt
  1 sibling, 1 reply; 6+ messages in thread
From: Michael Ellerman @ 2018-12-12 11:21 UTC (permalink / raw)
  To: rostedt; +Cc: linux-kernel, kernel-hardening, jannh, keescook

Hi Steve,

Friendly ping :)

Do you mind picking this one up for 4.21 ?

cheers

Michael Ellerman <mpe@ellerman.id.au> writes:
> Currently seq_buf_puts() will happily create a non null-terminated
> string for you in the buffer. This is particularly dangerous if the
> buffer is on the stack.
>
> For example:
>
>   char buf[8];
>   char secret = "secret";
>   struct seq_buf s;
>
>   seq_buf_init(&s, buf, sizeof(buf));
>   seq_buf_puts(&s, "foo");
>   printk("Message is %s\n", buf);
>
> Can result in:
>
>   Message is fooªªªªªsecret
>
> We could require all users to memset() their buffer to zero before
> use. But that seems likely to be forgotten and lead to bugs.
>
> Instead we can change seq_buf_puts() to always leave the buffer in a
> null-terminated state.
>
> The only downside is that this makes the buffer 1 character smaller
> for seq_buf_puts(), but that seems like a good trade off.
>
> Acked-by: Kees Cook <keescook@chromium.org>
> Signed-off-by: Michael Ellerman <mpe@ellerman.id.au>
> ---
>  lib/seq_buf.c | 6 +++++-
>  1 file changed, 5 insertions(+), 1 deletion(-)
>
> v2: Fix NULL/null terminology.
>
> diff --git a/lib/seq_buf.c b/lib/seq_buf.c
> index 11f2ae0f9099..6aabb609dd87 100644
> --- a/lib/seq_buf.c
> +++ b/lib/seq_buf.c
> @@ -144,9 +144,13 @@ int seq_buf_puts(struct seq_buf *s, const char *str)
>  
>  	WARN_ON(s->size == 0);
>  
> +	/* Add 1 to len for the trailing null byte which must be there */
> +	len += 1;
> +
>  	if (seq_buf_can_fit(s, len)) {
>  		memcpy(s->buffer + s->len, str, len);
> -		s->len += len;
> +		/* Don't count the trailing null byte against the capacity */
> +		s->len += len - 1;
>  		return 0;
>  	}
>  	seq_buf_set_overflow(s);
> -- 
> 2.17.2

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH v2 1/2] seq_buf: Make seq_buf_puts() null-terminate the buffer
  2018-12-12 11:21 ` [PATCH v2 1/2] seq_buf: Make seq_buf_puts() null-terminate the buffer Michael Ellerman
@ 2018-12-12 13:45   ` Steven Rostedt
  2018-12-12 13:50     ` Steven Rostedt
  0 siblings, 1 reply; 6+ messages in thread
From: Steven Rostedt @ 2018-12-12 13:45 UTC (permalink / raw)
  To: Michael Ellerman; +Cc: linux-kernel, kernel-hardening, jannh, keescook

On Wed, 12 Dec 2018 22:21:46 +1100
Michael Ellerman <mpe@ellerman.id.au> wrote:

> Hi Steve,
> 
> Friendly ping :)
> 
> Do you mind picking this one up for 4.21 ?
> 
>

Thanks for the reminder, I've been swamped lately. I'll take a look now.


-- Steve

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH v2 1/2] seq_buf: Make seq_buf_puts() null-terminate the buffer
  2018-12-12 13:45   ` Steven Rostedt
@ 2018-12-12 13:50     ` Steven Rostedt
  2018-12-18  3:58       ` Michael Ellerman
  0 siblings, 1 reply; 6+ messages in thread
From: Steven Rostedt @ 2018-12-12 13:50 UTC (permalink / raw)
  To: Michael Ellerman; +Cc: linux-kernel, kernel-hardening, jannh, keescook

On Wed, 12 Dec 2018 08:45:32 -0500
Steven Rostedt <rostedt@goodmis.org> wrote:

> On Wed, 12 Dec 2018 22:21:46 +1100
> Michael Ellerman <mpe@ellerman.id.au> wrote:
> 
> > Hi Steve,
> > 
> > Friendly ping :)
> > 
> > Do you mind picking this one up for 4.21 ?
> > 
> >  
> 
> Thanks for the reminder, I've been swamped lately. I'll take a look now.
> 
>

OK, I applied both to my local queue, and it will reach linux-next
probably some time at the end of this week or early next week. It needs
to wait till I'm ready to run my local changes through my test suite.

Thanks!

-- Steve

^ permalink raw reply	[flat|nested] 6+ messages in thread

* Re: [PATCH v2 1/2] seq_buf: Make seq_buf_puts() null-terminate the buffer
  2018-12-12 13:50     ` Steven Rostedt
@ 2018-12-18  3:58       ` Michael Ellerman
  0 siblings, 0 replies; 6+ messages in thread
From: Michael Ellerman @ 2018-12-18  3:58 UTC (permalink / raw)
  To: Steven Rostedt; +Cc: linux-kernel, kernel-hardening, jannh, keescook

Steven Rostedt <rostedt@goodmis.org> writes:
> On Wed, 12 Dec 2018 08:45:32 -0500
> Steven Rostedt <rostedt@goodmis.org> wrote:
>
>> On Wed, 12 Dec 2018 22:21:46 +1100
>> Michael Ellerman <mpe@ellerman.id.au> wrote:
>> 
>> > Hi Steve,
>> > 
>> > Friendly ping :)
>> > 
>> > Do you mind picking this one up for 4.21 ?
>> > 
>> >  
>> 
>> Thanks for the reminder, I've been swamped lately. I'll take a look now.
>> 
>
> OK, I applied both to my local queue, and it will reach linux-next
> probably some time at the end of this week or early next week. It needs
> to wait till I'm ready to run my local changes through my test suite.

Sure, no rush. Thanks.

cheers

^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2018-12-18  3:58 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-10-19  4:21 [PATCH v2 1/2] seq_buf: Make seq_buf_puts() null-terminate the buffer Michael Ellerman
2018-10-19  4:21 ` [PATCH v2 2/2] seq_buf: Use size_t for len in seq_buf_puts() Michael Ellerman
2018-12-12 11:21 ` [PATCH v2 1/2] seq_buf: Make seq_buf_puts() null-terminate the buffer Michael Ellerman
2018-12-12 13:45   ` Steven Rostedt
2018-12-12 13:50     ` Steven Rostedt
2018-12-18  3:58       ` Michael Ellerman

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).