Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp562761rwi; Thu, 20 Oct 2022 02:16:59 -0700 (PDT) X-Google-Smtp-Source: AMsMyM7dMBehidAMsLwnQIMwuaIxw9HfqLjUlpkCE2qVwul2jD8Fxi2elXJYbyiRXBwUumrIE1jI X-Received: by 2002:a05:6a00:4c8e:b0:562:a157:6599 with SMTP id eb14-20020a056a004c8e00b00562a1576599mr12868719pfb.59.1666257418824; Thu, 20 Oct 2022 02:16:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666257418; cv=none; d=google.com; s=arc-20160816; b=Xt3itq0prEGz290GzKDPTTg+eH7roc0UEvFLBU/Wd6FojaU4SLfdjojjTkjXmJ1+iN i1tJ6PJgQ8it5u/ntoZK2UQ+FViJve4pKGmFZfumKOxnbnmRpHxEhGZq/xyw5+rtuPoB 6rPX76GBztNhNzgyMMkDiSar8yFVZkXgwOz8QDnCHX3fIg2eOlcAlnodqnzCjf3sXgEl vQlRpiVsBMMyjk6v4dbKe16kKl8juQVclsGZht3AW4n0r6CbRusroMpXaERS4u01/8we 8cA68bCAa7rPtVVaJ3mAJUCO1w4i0xuhMeKuq+nbS5qF89qHJK5x93W1rcQHLIMFwWR1 XH4A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature; bh=z4JdVTNocmv+5C7FFGGGdfOf1ttmjLbFkFJntY9Bfk4=; b=d/QcMFKUr80RI/eTXRnCNJ4eJIeU+OwCVSMUjJK7RirCpH0jf3PGTOUbFpPMfKudF3 SaADIxQ+MGJxBVKAETuQquGs1ud3g6U3HDEht8HYWPPIuQyHPB1MIaGMQV+iS0PGDijR 3PuVT1p6xtLB1oA4CaIdssYnMEbQoCwc7ig1n4iEZgJO8NBT6pscWdCLOsENzU+LEmhi 7yKIXspdHMtCa2uOnDeZxeoE/+gwBR6IaZ4MNwGsWY+JCLdAX8j6eETYUIepjcRyvzTz UeH7pvYCYfF16ltXgAZA0fdkjQWkLlcWtzWMX8kVhvErF1uONvlmCRfA83sCVKiOZyVz +d/w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Zax5i9ay; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id z24-20020a631918000000b00439ae523fd2si21140801pgl.289.2022.10.20.02.16.42; Thu, 20 Oct 2022 02:16:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Zax5i9ay; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229784AbiJTI7S (ORCPT + 99 others); Thu, 20 Oct 2022 04:59:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45884 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229918AbiJTI67 (ORCPT ); Thu, 20 Oct 2022 04:58:59 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BB8F3194221 for ; Thu, 20 Oct 2022 01:58:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1666256338; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=z4JdVTNocmv+5C7FFGGGdfOf1ttmjLbFkFJntY9Bfk4=; b=Zax5i9ayjz8anF3R1dvhueLGwcykDdKonXoTXAxpPEO6EpDS1Ei5MdnH1O3YyH0eOysSok 21CWRRwb6H9R5GrEBh/DVRMwOkBn0rVJPWZS0KYrBt19q2Ta9dkeSSD3usuVX3XgQEtdAX cm6d674C8dAKQGeCTepqF6EzDIJhEqI= Received: from mail-qt1-f197.google.com (mail-qt1-f197.google.com [209.85.160.197]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_128_GCM_SHA256) id us-mta-584-o2YQCuwdPleR911od18Hjw-1; Thu, 20 Oct 2022 04:58:56 -0400 X-MC-Unique: o2YQCuwdPleR911od18Hjw-1 Received: by mail-qt1-f197.google.com with SMTP id 22-20020ac85756000000b0039cf0d41e2cso6599333qtx.13 for ; Thu, 20 Oct 2022 01:58:56 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:mime-version:user-agent:references :in-reply-to:date:cc:to:from:subject:message-id:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=z4JdVTNocmv+5C7FFGGGdfOf1ttmjLbFkFJntY9Bfk4=; b=zedjQLAYtPSew5SKu/GQ7NIkAEi6gdib0FT4QgU5/TUs4PLFoj19w7wgE6yBYb+GIV 3xUOEs3BCwCPK9qpZcgllT8nRYrR7/j3gWLleLtt7iJs+b2kyrsnRM2z4Rhvpg2pw8aq d6twertSSgFNybyUiEnWnosWfmFDL8ezXWCXriBMYUHe/BUZDhAeGWXyHluz0LTalbt4 Ng5l11TgYmOVyIq0Z6h5TDJz4WZHNlC40posFbNy2FrS9WpV56jAm8plrjkAAyDHYmuW GzfjcY++ZvJM2hL+0DEBPTxB//ch5j1OoEzI26VioPKcA17q0byZ/GC9FvIywc/F9cw5 +o6A== X-Gm-Message-State: ACrzQf31tdV0EamU8X4h8zK+OWVAPgOjkPLh8oxT2s2HwcnhO8iQls8P 7jQVj0GlhNMgOVQyIbhEyX6jAN+kwZX6Qm7DlbrGZeQVsF44Dan1duTol9dBml35RYICpecC4jy 1Uuu8cJcil/SproIf1Wn8vvDJ X-Received: by 2002:a0c:cb88:0:b0:4b8:d79e:b2c1 with SMTP id p8-20020a0ccb88000000b004b8d79eb2c1mr694650qvk.85.1666256336284; Thu, 20 Oct 2022 01:58:56 -0700 (PDT) X-Received: by 2002:a0c:cb88:0:b0:4b8:d79e:b2c1 with SMTP id p8-20020a0ccb88000000b004b8d79eb2c1mr694632qvk.85.1666256336012; Thu, 20 Oct 2022 01:58:56 -0700 (PDT) Received: from gerbillo.redhat.com (146-241-103-235.dyn.eolo.it. [146.241.103.235]) by smtp.gmail.com with ESMTPSA id z15-20020a05622a124f00b0039a08c0a594sm5671319qtx.82.2022.10.20.01.58.51 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 20 Oct 2022 01:58:55 -0700 (PDT) Message-ID: Subject: Re: [PATCH][next] net: dev: Convert sa_data to flexible array in struct sockaddr From: Paolo Abeni To: Kees Cook , Jakub Kicinski Cc: "David S. Miller" , Eric Dumazet , Jens Axboe , Pavel Begunkov , David Ahern , Dylan Yudaken , Yajun Deng , Petr Machata , Hangbin Liu , Leon Romanovsky , syzbot , Willem de Bruijn , Pablo Neira Ayuso , netdev@vger.kernel.org, Nathan Chancellor , Nick Desaulniers , Tom Rix , "D. Wythe" , Jeremy Kerr , Sebastian Andrzej Siewior , Menglong Dong , Kuniyuki Iwashima , Congyu Liu , Wolfram Sang , Ziyang Xuan , linux-kernel@vger.kernel.org, llvm@lists.linux.dev, linux-hardening@vger.kernel.org Date: Thu, 20 Oct 2022 10:58:50 +0200 In-Reply-To: <20221018095503.never.671-kees@kernel.org> References: <20221018095503.never.671-kees@kernel.org> Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.42.4 (3.42.4-2.fc35) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2,SPF_HELO_NONE,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, On Tue, 2022-10-18 at 02:56 -0700, Kees Cook wrote: > One of the worst offenders of "fake flexible arrays" is struct sockaddr, > as it is the classic example of why GCC and Clang have been traditionally > forced to treat all trailing arrays as fake flexible arrays: in the > distant misty past, sa_data became too small, and code started just > treating it as a flexible array, even though it was fixed-size. The > special case by the compiler is specifically that sizeof(sa->sa_data) > and FORTIFY_SOURCE (which uses __builtin_object_size(sa->sa_data, 1)) > do not agree (14 and -1 respectively), which makes FORTIFY_SOURCE treat > it as a flexible array. > > However, the coming -fstrict-flex-arrays compiler flag will remove > these special cases so that FORTIFY_SOURCE can gain coverage over all > the trailing arrays in the kernel that are _not_ supposed to be treated > as a flexible array. To deal with this change, convert sa_data to a true > flexible array. To keep the structure size the same, move sa_data into > a union with a newly introduced sa_data_min with the original size. The > result is that FORTIFY_SOURCE can continue to have no idea how large > sa_data may actually be, but anything using sizeof(sa->sa_data) must > switch to sizeof(sa->sa_data_min). > > Cc: Jakub Kicinski > Cc: "David S. Miller" > Cc: Eric Dumazet > Cc: Paolo Abeni > Cc: Jens Axboe > Cc: Pavel Begunkov > Cc: David Ahern > Cc: Dylan Yudaken > Cc: Yajun Deng > Cc: Petr Machata > Cc: Hangbin Liu > Cc: Leon Romanovsky > Cc: syzbot > Cc: Willem de Bruijn > Cc: Pablo Neira Ayuso > Cc: netdev@vger.kernel.org > Signed-off-by: Kees Cook > --- > include/linux/socket.h | 5 ++++- > net/core/dev.c | 2 +- > net/core/dev_ioctl.c | 2 +- > net/packet/af_packet.c | 10 +++++----- > 4 files changed, 11 insertions(+), 8 deletions(-) > > diff --git a/include/linux/socket.h b/include/linux/socket.h > index de3701a2a212..13c3a237b9c9 100644 > --- a/include/linux/socket.h > +++ b/include/linux/socket.h > @@ -33,7 +33,10 @@ typedef __kernel_sa_family_t sa_family_t; > > struct sockaddr { > sa_family_t sa_family; /* address family, AF_xxx */ > - char sa_data[14]; /* 14 bytes of protocol address */ > + union { > + char sa_data_min[14]; /* Minimum 14 bytes of protocol address */ > + DECLARE_FLEX_ARRAY(char, sa_data); Any special reason to avoid preserving the old name for the array and e.g. using sa_data_flex for the new field, so we don't have to touch the sockaddr users? Thanks! Paolo