Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp195367imu; Fri, 25 Jan 2019 00:20:35 -0800 (PST) X-Google-Smtp-Source: ALg8bN75AfavKYzhLmWedWMM5zBHoJySbuaNw61zkLNp/SPC7m8y30Egkk9X/e5JQ6BNj9B88KeM X-Received: by 2002:a63:4f5e:: with SMTP id p30mr9073930pgl.71.1548404435444; Fri, 25 Jan 2019 00:20:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548404435; cv=none; d=google.com; s=arc-20160816; b=C1yUCTf6wpc1GYhFGAbnBBkCU3MsmCsibYx1odRU/2Bfb7jsmyLrvqmmLiMxku+b+F X2CgNkOFGhte3bR5BkuQYAVkIN7afH9ZxhZQLciaufgD8GRe35zr0QZ1XtClUUu4qPPg 0WCUwYIx2ObV54clJzeyPNpenTSQKMcS2WfWX9VTr0LN3rsCArREVR0yEEmVMpZjAgHa KRWTvu2MlYEiPIuz/olsFY5IxFuoWNvJ+5xAYUhvf9Bxk5sE1d3gOr6WN7/RLGFpb0YU DQPdf9xp9cyqD/gLlGIERGAhOqJBaktBeRn2bajAAYaaX2gzUNrK/cj9QSHlmyTnKIXP bw+A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version; bh=8Zlmdjy5XkZ2rL0/5E9GQ1qmVMGgIWthiVHeC78Ds0g=; b=et4g9hE6koJxTSJqrKcDIcOi5HMmOPQAREO04Z4wXIs0fD2dnRl0WK43r5tq1EJuwg NUvQhBbM2/DOsJ44P8X50WBosl5L/BK/a2imOIxXNlcOoNZ5kg7aLRNZbOWUqsjt+vN1 Aqi+bvtGDuLC22eQFY3YrnMwmNREpwI+MnzCKnevpzgCDYGuKahu1fAvhiO0VbLAvRWd bC1Ag5q+oKwnlaDq7TMrNpeJE/+9JJBKaVPmcH7lFVLVp33RFPLeJR5isA6ehea03b5z 8eojTtd8ubrC6LabM+k9yS6WrryA6YASA8hIalbPTFGbNn9Q7l7tuFrGBj5NJ+mHAO0s LD+Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m8si13604138plt.171.2019.01.25.00.20.20; Fri, 25 Jan 2019 00:20:35 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728296AbfAYISq (ORCPT + 99 others); Fri, 25 Jan 2019 03:18:46 -0500 Received: from mail-oi1-f195.google.com ([209.85.167.195]:47097 "EHLO mail-oi1-f195.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726607AbfAYISq (ORCPT ); Fri, 25 Jan 2019 03:18:46 -0500 Received: by mail-oi1-f195.google.com with SMTP id x202so7060445oif.13 for ; Fri, 25 Jan 2019 00:18:45 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=8Zlmdjy5XkZ2rL0/5E9GQ1qmVMGgIWthiVHeC78Ds0g=; b=bKffSKYHcQou9AclqB9FCooFUANmXR9d9j1hZXvI7to2fx27T4ab7BoSuE6d0nePMR K9fEaW6xhiBsS8GjW6YkHKqRBAARGWyVDTuW7Fs88BtS7UMSXnKT20nQIQYT6NpL/RZ2 vJECKjhlTHiCQNAZvL8QwWlmaadvB3/wF/zqdV7ybM3ghRL93U4qPQjwdUAleH9aOxJ1 3v63pIpS9MBl40iq1cXt46bT/EpaJce45jG0/7v4MbrLz6bKnUu3bWvIbt09Fojm8AWh h40y/ErpZO7VX+6qrZz1Y0c5e9dVpxM/PRaeWO415oyThECvq3y/6yR6hF2VcggzAVGB 0VJQ== X-Gm-Message-State: AJcUukflaXNTpDGcqYmlaJKqfb2NEDQ1Dox+1XRMqAp9REgQ3dsYoE4W e+IhpCzVjcyJpCwcfOMD/eBP9JsXg7Ad0cTgDMHToxYz X-Received: by 2002:a05:6808:13:: with SMTP id u19mr718410oic.57.1548403124836; Thu, 24 Jan 2019 23:58:44 -0800 (PST) MIME-Version: 1.0 References: <20190118193200.32691-1-malat@debian.org> In-Reply-To: From: Mathieu Malaterre Date: Fri, 25 Jan 2019 08:58:32 +0100 Message-ID: Subject: Re: [PATCH] writeback: tracing: Copy only up to 31 characters in strncpy() calls To: Nick Desaulniers Cc: Steven Rostedt , Ingo Molnar , Linux Kernel Mailing List , Kees Cook Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jan 25, 2019 at 5:26 AM Nick Desaulniers wrote: > > On Fri, Jan 18, 2019 at 11:32 AM Mathieu Malaterre wrote: > > > > In the past an attempt was made to remove a set of warnings triggered by > > gcc 8.x and W=1 by changing calls to strncpy() into strlcpy(). This was > > rejected as one of the desired behavior is to keep initializing the rest > > of the destination string whenever the source string is less than the > > size. > > > > However the code makes it clear that this is not a desired behavior to > > copy the entire 32 characters into the destination buffer, since it is > > expected that the string is NUL terminated. So change the maximum number > > of characters to be copied to be the size of the destination buffer > > minus 1. > > > > Break long lines and make this patch go through `checkpatch --strict` with > > no errors. > > > > This commit removes the following warnings: > > > > include/trace/events/writeback.h:69:3: warning: 'strncpy' specified bound 32 equals destination size [-Wstringop-truncation] > > include/trace/events/writeback.h:99:3: warning: 'strncpy' specified bound 32 equals destination size [-Wstringop-truncation] > > include/trace/events/writeback.h:179:3: warning: 'strncpy' specified bound 32 equals destination size [-Wstringop-truncation] > > include/trace/events/writeback.h:223:3: warning: 'strncpy' specified bound 32 equals destination size [-Wstringop-truncation] > > include/trace/events/writeback.h:277:3: warning: 'strncpy' specified bound 32 equals destination size [-Wstringop-truncation] > > include/trace/events/writeback.h:299:3: warning: 'strncpy' specified bound 32 equals destination size [-Wstringop-truncation] > > include/trace/events/writeback.h:324:3: warning: 'strncpy' specified bound 32 equals destination size [-Wstringop-truncation] > > include/trace/events/writeback.h:375:3: warning: 'strncpy' specified bound 32 equals destination size [-Wstringop-truncation] > > include/trace/events/writeback.h:586:3: warning: 'strncpy' specified bound 32 equals destination size [-Wstringop-truncation] > > include/trace/events/writeback.h:660:3: warning: 'strncpy' specified bound 32 equals destination size [-Wstringop-truncation] > > > > Cc: Nick Desaulniers > > Link: https://lore.kernel.org/patchwork/patch/910830/ > > Signed-off-by: Mathieu Malaterre > > --- > > include/trace/events/writeback.h | 30 ++++++++++++++++++++---------- > > 1 file changed, 20 insertions(+), 10 deletions(-) > > > > diff --git a/include/trace/events/writeback.h b/include/trace/events/writeback.h > > index 32db72c7c055..7bc58980f84f 100644 > > --- a/include/trace/events/writeback.h > > +++ b/include/trace/events/writeback.h > > @@ -67,7 +67,8 @@ TRACE_EVENT(writeback_dirty_page, > > > > TP_fast_assign( > > strncpy(__entry->name, > > - mapping ? dev_name(inode_to_bdi(mapping->host)->dev) : "(unknown)", 32); > > + mapping ? dev_name(inode_to_bdi(mapping->host)->dev) : > > + "(unknown)", sizeof(__entry->name) - 1); > > Does strncpy guarantee that destination will be NULL terminated if > (sizeof(src) > sizeof(dst)) || (32 > sizeof(dst))? No, that's the point here: https://www.kernel.org/doc/htmldocs/kernel-api/API-strncpy.html ... The result is not NUL-terminated if the source exceeds count bytes. In the case where the length of src is less than that of count, the remainder of dest will be padded with NUL. ... One should use strlcpy for the use case you describe: https://www.kernel.org/doc/htmldocs/kernel-api/API-strlcpy.html > > __entry->ino = mapping ? mapping->host->i_ino : 0; > > __entry->index = page->index; > > ), > > @@ -97,7 +98,8 @@ DECLARE_EVENT_CLASS(writeback_dirty_inode_template, > > > > /* may be called for files on pseudo FSes w/ unregistered bdi */ > > strncpy(__entry->name, > > - bdi->dev ? dev_name(bdi->dev) : "(unknown)", 32); > > + bdi->dev ? dev_name(bdi->dev) : "(unknown)", > > + sizeof(__entry->name) - 1); > > __entry->ino = inode->i_ino; > > __entry->state = inode->i_state; > > __entry->flags = flags; > > @@ -177,7 +179,8 @@ DECLARE_EVENT_CLASS(writeback_write_inode_template, > > > > TP_fast_assign( > > strncpy(__entry->name, > > - dev_name(inode_to_bdi(inode)->dev), 32); > > + dev_name(inode_to_bdi(inode)->dev), > > + sizeof(__entry->name) - 1); > > __entry->ino = inode->i_ino; > > __entry->sync_mode = wbc->sync_mode; > > __entry->cgroup_ino = __trace_wbc_assign_cgroup(wbc); > > @@ -221,7 +224,8 @@ DECLARE_EVENT_CLASS(writeback_work_class, > > ), > > TP_fast_assign( > > strncpy(__entry->name, > > - wb->bdi->dev ? dev_name(wb->bdi->dev) : "(unknown)", 32); > > + wb->bdi->dev ? dev_name(wb->bdi->dev) : "(unknown)", > > + sizeof(__entry->name) - 1); > > __entry->nr_pages = work->nr_pages; > > __entry->sb_dev = work->sb ? work->sb->s_dev : 0; > > __entry->sync_mode = work->sync_mode; > > @@ -274,7 +278,8 @@ DECLARE_EVENT_CLASS(writeback_class, > > __field(unsigned int, cgroup_ino) > > ), > > TP_fast_assign( > > - strncpy(__entry->name, dev_name(wb->bdi->dev), 32); > > + strncpy(__entry->name, dev_name(wb->bdi->dev), > > + sizeof(__entry->name) - 1); > > __entry->cgroup_ino = __trace_wb_assign_cgroup(wb); > > ), > > TP_printk("bdi %s: cgroup_ino=%u", > > @@ -296,7 +301,8 @@ TRACE_EVENT(writeback_bdi_register, > > __array(char, name, 32) > > ), > > TP_fast_assign( > > - strncpy(__entry->name, dev_name(bdi->dev), 32); > > + strncpy(__entry->name, dev_name(bdi->dev), > > + sizeof(__entry->name) - 1); > > ), > > TP_printk("bdi %s", > > __entry->name > > @@ -321,7 +327,8 @@ DECLARE_EVENT_CLASS(wbc_class, > > ), > > > > TP_fast_assign( > > - strncpy(__entry->name, dev_name(bdi->dev), 32); > > + strncpy(__entry->name, dev_name(bdi->dev), > > + sizeof(__entry->name) - 1); > > __entry->nr_to_write = wbc->nr_to_write; > > __entry->pages_skipped = wbc->pages_skipped; > > __entry->sync_mode = wbc->sync_mode; > > @@ -372,7 +379,8 @@ TRACE_EVENT(writeback_queue_io, > > ), > > TP_fast_assign( > > unsigned long *older_than_this = work->older_than_this; > > - strncpy(__entry->name, dev_name(wb->bdi->dev), 32); > > + strncpy(__entry->name, dev_name(wb->bdi->dev), > > + sizeof(__entry->name) - 1); > > __entry->older = older_than_this ? *older_than_this : 0; > > __entry->age = older_than_this ? > > (jiffies - *older_than_this) * 1000 / HZ : -1; > > @@ -584,7 +592,8 @@ TRACE_EVENT(writeback_sb_inodes_requeue, > > > > TP_fast_assign( > > strncpy(__entry->name, > > - dev_name(inode_to_bdi(inode)->dev), 32); > > + dev_name(inode_to_bdi(inode)->dev), > > + sizeof(__entry->name) - 1); > > __entry->ino = inode->i_ino; > > __entry->state = inode->i_state; > > __entry->dirtied_when = inode->dirtied_when; > > @@ -658,7 +667,8 @@ DECLARE_EVENT_CLASS(writeback_single_inode_template, > > > > TP_fast_assign( > > strncpy(__entry->name, > > - dev_name(inode_to_bdi(inode)->dev), 32); > > + dev_name(inode_to_bdi(inode)->dev), > > + sizeof(__entry->name) - 1); > > __entry->ino = inode->i_ino; > > __entry->state = inode->i_state; > > __entry->dirtied_when = inode->dirtied_when; > > -- > > 2.19.2 > >