Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2537171pxj; Mon, 10 May 2021 05:26:35 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxppY19gSGR0iXHjaq59Dp10+4GWYCBCW8QTGfMptaY0sXisExEqpt6F1CELBGBux07Uisn X-Received: by 2002:a17:906:8a51:: with SMTP id gx17mr25274720ejc.549.1620649595418; Mon, 10 May 2021 05:26:35 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620649595; cv=none; d=google.com; s=arc-20160816; b=G+CCDL4pFCHDDfc2SnYI2zWLNPzPiaQ+A7iE90O5WdhG91gQ1OyNkZ7JxMnnohKTny 60SVlDqpYWeV3zRi68pj6AHVTsmWWxAp0VYTo/Zxhdc8UENXq5hKJdQJphlfBFxTLZ73 lf9AUscsz5ornwZ0pQ+Gpn2LX5Umo72FYyIg7ViH3Nr7C0dJDJsYYaCMWk8wDNAfQ79N WL6IZ0AXzSGnf9QUd8M1IDMlUiISu5ajEdWy8HRvOF3ZxAY+7GDOlnidhNb5cxgN3V5j Fh3IQi5GReew7OgqSgXaFhlsiZ48/r8qEVaJ0crwQCcrzTD3hU8rtaJdDZBOuwfxYeIL k4Sw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Fjk6Y7F930uujALfvehucZUl9EttDxLxaI4a+Xgwv3o=; b=JodFJYtTnLwoUNWM78nRyH+hUHV19n3H8VeJdApaIWr00Vn7f6v+X4eoDk8BKKEcCO fZbtPIkagwADsmiSrW03l0avDQQ8mSutoc3gUiEr/sYWchCzuTDIyvDqE+wE3QLNMF/1 Nn1gNCMQeUubYCW1PjT1HTOprr3djFLIQk5O/5RtMn3xTYZmFk3vzyDSH7MNilUVn9DF Yd4h2vnMMpHIus2rA26MomCaFi7H5wHvBmTebDAb4eZzPRgp4PXETTqy5Cg+fTB7BaQF LkbWtubg+CBrLGUr25egU+8in7QzWQPiNZU2zMj4XzMuYc0w6d5PEw5Br32bl4PFt1od zmpw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=nkSjKpNg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id rh5si13044086ejb.475.2021.05.10.05.26.11; Mon, 10 May 2021 05:26:35 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=nkSjKpNg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345139AbhEJMVw (ORCPT + 99 others); Mon, 10 May 2021 08:21:52 -0400 Received: from mail.kernel.org ([198.145.29.99]:45768 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236814AbhEJLKa (ORCPT ); Mon, 10 May 2021 07:10:30 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 138546146E; Mon, 10 May 2021 11:05:40 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1620644741; bh=/xf+7x4AEiy/zFNMH/8OOITRPwL2zDSYp2kW7m6GlWg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=nkSjKpNgd6b9M4mg7oquJ3GzyymAUCgKY5gzNIHZ0gCd6niBLSpDPp3dpmE+6dYIt bG2foN0A0bIDFOW79RrOz8hU3MYNuGO+8gqmqZN+NbuqLeL0LiRS9UzoGB7m8vHJn+ iRzQ6LZ4BW1sfrSuJagz814SY8Dl2EG764gQVL7U= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, David Binderman , Babu Moger , Fenghua Yu , Shuah Khan , Sasha Levin Subject: [PATCH 5.12 206/384] selftests/resctrl: Enable gcc checks to detect buffer overflows Date: Mon, 10 May 2021 12:19:55 +0200 Message-Id: <20210510102021.676252866@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210510102014.849075526@linuxfoundation.org> References: <20210510102014.849075526@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Fenghua Yu [ Upstream commit a9d26a302dea29eb84f491b1340a57e56c631a71 ] David reported a buffer overflow error in the check_results() function of the cmt unit test and he suggested enabling _FORTIFY_SOURCE gcc compiler option to automatically detect any such errors. Feature Test Macros man page describes_FORTIFY_SOURCE as below "Defining this macro causes some lightweight checks to be performed to detect some buffer overflow errors when employing various string and memory manipulation functions (for example, memcpy, memset, stpcpy, strcpy, strncpy, strcat, strncat, sprintf, snprintf, vsprintf, vsnprintf, gets, and wide character variants thereof). For some functions, argument consistency is checked; for example, a check is made that open has been supplied with a mode argument when the specified flags include O_CREAT. Not all problems are detected, just some common cases. If _FORTIFY_SOURCE is set to 1, with compiler optimization level 1 (gcc -O1) and above, checks that shouldn't change the behavior of conforming programs are performed. With _FORTIFY_SOURCE set to 2, some more checking is added, but some conforming programs might fail. Some of the checks can be performed at compile time (via macros logic implemented in header files), and result in compiler warnings; other checks take place at run time, and result in a run-time error if the check fails. Use of this macro requires compiler support, available with gcc since version 4.0." Fix the buffer overflow error in the check_results() function of the cmt unit test and enable _FORTIFY_SOURCE gcc check to catch any future buffer overflow errors. Reported-by: David Binderman Suggested-by: David Binderman Tested-by: Babu Moger Signed-off-by: Fenghua Yu Signed-off-by: Shuah Khan Signed-off-by: Sasha Levin --- tools/testing/selftests/resctrl/Makefile | 2 +- tools/testing/selftests/resctrl/cqm_test.c | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/tools/testing/selftests/resctrl/Makefile b/tools/testing/selftests/resctrl/Makefile index d585cc1948cc..6bcee2ec91a9 100644 --- a/tools/testing/selftests/resctrl/Makefile +++ b/tools/testing/selftests/resctrl/Makefile @@ -1,5 +1,5 @@ CC = $(CROSS_COMPILE)gcc -CFLAGS = -g -Wall +CFLAGS = -g -Wall -O2 -D_FORTIFY_SOURCE=2 SRCS=$(wildcard *.c) OBJS=$(SRCS:.c=.o) diff --git a/tools/testing/selftests/resctrl/cqm_test.c b/tools/testing/selftests/resctrl/cqm_test.c index c8756152bd61..5e7308ac63be 100644 --- a/tools/testing/selftests/resctrl/cqm_test.c +++ b/tools/testing/selftests/resctrl/cqm_test.c @@ -86,7 +86,7 @@ static int check_results(struct resctrl_val_param *param, int no_of_bits) return errno; } - while (fgets(temp, 1024, fp)) { + while (fgets(temp, sizeof(temp), fp)) { char *token = strtok(temp, ":\t"); int fields = 0; -- 2.30.2