Received: by 2002:ac0:946b:0:0:0:0:0 with SMTP id j40csp2436620imj; Mon, 18 Feb 2019 06:04:26 -0800 (PST) X-Google-Smtp-Source: AHgI3IbsmN0WXIzl62SJRCHyMjLQvlE8/vsn/FA3aEMxFgSNz660EQDHqMaS7bhN4lCz2x/xQTm6 X-Received: by 2002:a17:902:42e4:: with SMTP id h91mr25878588pld.18.1550498665999; Mon, 18 Feb 2019 06:04:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1550498665; cv=none; d=google.com; s=arc-20160816; b=lWIUlv89bRsMWoMl7pNLbOM2YU9mlE+JzSnw365goPYkzAdjfqESXIQAcQi6UXtrE0 CUMnoLCe5pqcdfNlZ4o6++jiY8iJTozMWZYcLXEr8r0zgYhtlbDW2yAoGhk3Ou+L2X6+ QZwca4FpFii/+9V6NhKbO4oUIQEIlVYnB3QJnpcO4EAzREPOPaLwwMpatTaPFWSyISRj 0kV0hgEAhnujcs0ig5aFPZ1A3M6IF/pQj8TE+g7BNnAB240vcawNIuqozJbyP8bk3ZvI oYOjhyG2XP6GV1we2I3/p/iQD0k+7cZ2QfyWRfN43rnLpbmzCQOi0f9QNPrGS/JpW72J BEsg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=jzxKGw/XdCcFGELCkmjwUI3FmFzcTFcvVL/ewO66nz0=; b=S57R1ntmM3n3RcOXLE3rz38H+feHAhjF5RlklpQ/Yx3Oms9EvNNRdvoYFiB0/mQ+oM 66uOooCAVvHKkPInoP3y5nKggdf9dyPLlw9NLHS2WeSHc9yfCIFl2+mrVqdPuXGemXbp e+tle1xjHsAmg6KD/oh5iQsOINRT/3VNsOTY2XLcPv2+VG+66Rc8sK1h2lXNRwvz1vhE +M0/UriBax3j8+3qmfB31uWrrHpQdsoMDM/3hPV2wePms0s2w36rSQ1jsoH1j2sghYAT e6Ac0lxAEGMuCL8IBZX+cfaaDOfwy339AmQmpMSSL3RfubUXNzsxW43B+FTX6l8x1Nv5 vPOQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1gtNV5eS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u77si14903114pfj.139.2019.02.18.06.04.10; Mon, 18 Feb 2019 06:04:25 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=1gtNV5eS; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389655AbfBRODR (ORCPT + 99 others); Mon, 18 Feb 2019 09:03:17 -0500 Received: from mail.kernel.org ([198.145.29.99]:45102 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388695AbfBRODL (ORCPT ); Mon, 18 Feb 2019 09:03:11 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 783A721902; Mon, 18 Feb 2019 14:03:10 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1550498591; bh=C0lUUxTNesCnhz+70Jy2jufvFEbdvqBrC4I1gGMSZRs=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=1gtNV5eSjNGgbKzIST7J92uB3WfY6FgX/YYcXj0ttdVV+lWVMXcsVW5j/8xuEZHzq Er61LDY8dbaWkQFcvdGXZ7E9ByP1gnxPsY7JjytgRxndolOE0+gf+YwGtT0QHPAGN1 /AeDOqOmxg99eHTgxGNfiRGhLEL2ibppzwCgWJtU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Kees Cook , Michael Ellerman , "Steven Rostedt (VMware)" , Sasha Levin Subject: [PATCH 4.4 058/143] seq_buf: Make seq_buf_puts() null-terminate the buffer Date: Mon, 18 Feb 2019 14:43:06 +0100 Message-Id: <20190218133531.232733761@linuxfoundation.org> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190218133529.099444112@linuxfoundation.org> References: <20190218133529.099444112@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ [ Upstream commit 0464ed24380905d640030d368cd84a4e4d1e15e2 ] Currently seq_buf_puts() will happily create a non null-terminated string for you in the buffer. This is particularly dangerous if the buffer is on the stack. For example: char buf[8]; char secret = "secret"; struct seq_buf s; seq_buf_init(&s, buf, sizeof(buf)); seq_buf_puts(&s, "foo"); printk("Message is %s\n", buf); Can result in: Message is fooªªªªªsecret We could require all users to memset() their buffer to zero before use. But that seems likely to be forgotten and lead to bugs. Instead we can change seq_buf_puts() to always leave the buffer in a null-terminated state. The only downside is that this makes the buffer 1 character smaller for seq_buf_puts(), but that seems like a good trade off. Link: http://lkml.kernel.org/r/20181019042109.8064-1-mpe@ellerman.id.au Acked-by: Kees Cook Signed-off-by: Michael Ellerman Signed-off-by: Steven Rostedt (VMware) Signed-off-by: Sasha Levin --- lib/seq_buf.c | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/lib/seq_buf.c b/lib/seq_buf.c index 5c94e1012a91..cbef5ee4c459 100644 --- a/lib/seq_buf.c +++ b/lib/seq_buf.c @@ -143,9 +143,13 @@ int seq_buf_puts(struct seq_buf *s, const char *str) WARN_ON(s->size == 0); + /* Add 1 to len for the trailing null byte which must be there */ + len += 1; + if (seq_buf_can_fit(s, len)) { memcpy(s->buffer + s->len, str, len); - s->len += len; + /* Don't count the trailing null byte against the capacity */ + s->len += len - 1; return 0; } seq_buf_set_overflow(s); -- 2.19.1