Received: by 2002:a05:7412:d1aa:b0:fc:a2b0:25d7 with SMTP id ba42csp271219rdb; Mon, 29 Jan 2024 01:28:40 -0800 (PST) X-Google-Smtp-Source: AGHT+IFuW3whbwFLkCFUX3FiFJeZs8UrC0Cdzrt4RdCgPHHvKNgmdHaISzFoNG19fvCBEAD9oVBU X-Received: by 2002:a17:90b:618:b0:28e:7e94:d9f3 with SMTP id gb24-20020a17090b061800b0028e7e94d9f3mr1635372pjb.4.1706520519930; Mon, 29 Jan 2024 01:28:39 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1706520519; cv=pass; d=google.com; s=arc-20160816; b=UDkptnd0b72icwuVngrCCJjx8TG/nTU329k55zqEr4hEGXEE9tVeUXhXQ9Y4y41nGj 03Y5DapWnuTsuLdbNDtjXJYyFxrkhDL7+GouxIfqgBr1rW0w8UB4VftMLRoBt5AOo1VG Vf/F5ORRD1t8Xs/h0swsXVg/1kzYe6M6j2RIHjpcFr2QnpsSewpl3xo/cMVg8EAiksnK A4/3JushNtrw7MsvIeBKNVqTLUs5ts45RPQkbDAN+8MRwVxaEBFuHYBR6NMiQsMVMqNp gHfzs9ABWtJzx/wPms1GJy4x4b7UP9ubv+Fobaa8dJgLG8ICU278EjlAi7TeZA53p7YL 1skw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=yWfQ1+Xq/a7En5TKk4j9TaVEpdv09W5IQPTi6KiJdL4=; fh=xNh7mW2ZKaq+/STklqYqktzbguCjbgXU+1gzzJG8EQk=; b=ce/2rqLljXZHrKqecleXBPRCkEgQULZ+DcFEFF1wZa6kABKVvPpzC6ym5hR2uDLFkn s57CKGsWcY9uYDKDwlX0GJ0Jlvpg68Lo7hMM7OH8X5yU4uz9VU3HMp9ycP5NcRIgQKui qKHMHbJ+KhLlQPM2JCKPbTCYxTpXoB+U1Ke636QX5PbMlploY1XIgz9N6+lcd+0Yncbc qSPRA9uQHtI9B02g0pcF2DgFDQQcAlv/16J90uyMCbHQivociXWeQyf4wckxq9XD17xp 1noN/Pw1NV4VNvrzDus8Qi135ip7zYCKLyDGo5V7SILTCZELet/W1RpW3+6qAQiJXLFM 5qxA== ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=q+av6ih5; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-42450-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-42450-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id i7-20020a17090a65c700b00290ca285344si5376482pjs.134.2024.01.29.01.28.39 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 29 Jan 2024 01:28:39 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-42450-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=q+av6ih5; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-42450-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-42450-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 935AB281CFB for ; Mon, 29 Jan 2024 09:28:39 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 7856D55765; Mon, 29 Jan 2024 09:27:15 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="q+av6ih5" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 83E895786C; Mon, 29 Jan 2024 09:27:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706520434; cv=none; b=bXNebr89YDad8Th8wbhx093W8rV/totDeHWIqzFnDLxqSLj4exF4KFZrz3KrMAmo7hfDxMZy46lIL7kYjpLuBVnzp9RMXcLQDyEGth+rcx6ekxr1KVdnE/PT+VethEvhZw13A3xukXdRqTKlASYJU3qoeH6xaL+mL8D68t6DVu4= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1706520434; c=relaxed/simple; bh=FOtCAJxhqeqAJLlTKWeIWwK177ZkAY+IT7ykxd5EE7Y=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=IOdN5vr0iUVXhDWPfpXZKIRoW8RtyEwQZU7TJ9R5In0HKmOupOD1n2csXrc3IqJDRVJU97njyw2DYmQp/V4Sl+2FLlSPndzpDRuvFiAba+aepZApQqRgtikQm2f/SD/yzgjo833PCbjwx3rzaai+U3MlxXw54ImzAlny7ItADBg= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=q+av6ih5; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id A0044C433F1; Mon, 29 Jan 2024 09:27:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1706520434; bh=FOtCAJxhqeqAJLlTKWeIWwK177ZkAY+IT7ykxd5EE7Y=; h=From:To:Cc:Subject:Date:From; b=q+av6ih54ZLZDWN/dwHNNzDzJzLwXQc2Gr8JNYTfEfI9wKkF3L2DzZCDUUv7kyC54 HCosYi4MN+4aI6Rd2q0jLyLRH1QcnkngpAEwvdwuOvXQMnxnDHKQdfjw5lBTas/5l4 gpWAyhpCNan8gz07BLcZN2bRGih6qpjczrSpiaQz1vmVoNei89yGAs5745H+XKyCF4 DDeBlA35F0jWAmhb13+7n4Jwf+cQ87e0EyenKpsf5PzG1JTE21LXMFqUglx+sdQQDh G1HDYVbwprBNn+hLIdpmmKPcavfs+bnNI77Nii9PDQanYmP6848vahI/Dy/g6S/zVr o44X7sPwEKo6w== From: Lee Jones To: lee@kernel.org Cc: linux-kernel@vger.kernel.org, linux-hardening@vger.kernel.org, Andrew Morton , Petr Mladek , Steven Rostedt , Andy Shevchenko , Rasmus Villemoes , Sergey Senozhatsky , Crutcher Dunnavant , Juergen Quade , David Laight Subject: [PATCH 1/1] lib/vsprintf: Implement ssprintf() to catch truncated strings Date: Mon, 29 Jan 2024 09:27:05 +0000 Message-ID: <20240129092705.1978653-1-lee@kernel.org> X-Mailer: git-send-email 2.43.0.429.g432eaa2c6b-goog Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit There is an ongoing effort to replace the use of {v}snprintf() variants with safer alternatives - for a more in depth view, see Jon's write-up on LWN [0] and/or Alex's on the Kernel Self Protection Project [1]. Whist executing the task, it quickly became apparent that the initial thought of simply s/snprintf/scnprintf/ wasn't going to be adequate for a number of cases. Specifically ones where the caller needs to know whether the given string ends up being truncated. This is where ssprintf() [based on similar semantics of strscpy()] comes in, since it takes the best parts of both of the aforementioned variants. It has the testability of truncation of snprintf() and returns the number of Bytes *actually* written, similar to scnprintf(), making it a very programmer friendly alternative. Here's some examples to show the differences: Success: No truncation - all 9 Bytes successfully written to the buffer ret = snprintf (buf, 10, "%s", "123456789"); // ret = 9 ret = scnprintf(buf, 10, "%s", "123456789"); // ret = 9 ret = ssprintf (buf, 10, "%s", "123456789"); // ret = 9 Failure: Truncation - only 9 of 10 Bytes written; '-' is truncated ret = snprintf (buf, 10, "%s", "123456789-"); // ret = 10 Reports: "10 Bytes would have been written if buf was large enough" Issue: Programmers need to know/remember to check ret against "10" ret = scnprintf(buf, 10, "%s", "123456789-"); // ret = 9 Reports: "9 Bytes actually written" Issue: Returns 9 on success AND failure (see above) ret = ssprintf (buf, 10, "%s", "123456789-"); // ret = -E2BIG Reports: "Data provided is too large to fit in the buffer" Issue: No tangible impact: No way to tell how much data was lost [0] https://lwn.net/Articles/69419/ [1] https://github.com/KSPP/linux/issues/105 Signed-off-by: Lee Jones --- Changelog: v1 => v2: - Address Rasmus Villemoes's review comments: - Remove explicit check for zero sized buffer (-E2BIG is appropriate) - Remove unreachable branch in vssprintf() include/linux/sprintf.h | 2 ++ lib/vsprintf.c | 51 +++++++++++++++++++++++++++++++++++++++++ 2 files changed, 53 insertions(+) Cc: Andrew Morton Cc: Petr Mladek Cc: Steven Rostedt Cc: Andy Shevchenko Cc: Rasmus Villemoes Cc: Sergey Senozhatsky Cc: Crutcher Dunnavant Cc: Juergen Quade Cc: David Laight diff --git a/include/linux/sprintf.h b/include/linux/sprintf.h index 33dcbec719254..2a3db6285492a 100644 --- a/include/linux/sprintf.h +++ b/include/linux/sprintf.h @@ -13,6 +13,8 @@ __printf(3, 4) int snprintf(char *buf, size_t size, const char *fmt, ...); __printf(3, 0) int vsnprintf(char *buf, size_t size, const char *fmt, va_list args); __printf(3, 4) int scnprintf(char *buf, size_t size, const char *fmt, ...); __printf(3, 0) int vscnprintf(char *buf, size_t size, const char *fmt, va_list args); +__printf(3, 4) int ssprintf(char *buf, size_t size, const char *fmt, ...); +__printf(3, 0) int vssprintf(char *buf, size_t size, const char *fmt, va_list args); __printf(2, 3) __malloc char *kasprintf(gfp_t gfp, const char *fmt, ...); __printf(2, 0) __malloc char *kvasprintf(gfp_t gfp, const char *fmt, va_list args); __printf(2, 0) const char *kvasprintf_const(gfp_t gfp, const char *fmt, va_list args); diff --git a/lib/vsprintf.c b/lib/vsprintf.c index 552738f14275a..e2b51fc625564 100644 --- a/lib/vsprintf.c +++ b/lib/vsprintf.c @@ -2936,6 +2936,34 @@ int vscnprintf(char *buf, size_t size, const char *fmt, va_list args) } EXPORT_SYMBOL(vscnprintf); +/** + * vssprintf - Format a string and place it in a buffer + * @buf: The buffer to place the result into + * @size: The size of the buffer, including the trailing null space + * @fmt: The format string to use + * @args: Arguments for the format string + * + * The return value is the number of characters which have been written into + * the @buf not including the trailing '\0' or -E2BIG if the string was + * truncated. + * + * If you're not already dealing with a va_list consider using ssprintf(). + * + * See the vsnprintf() documentation for format string extensions over C99. + */ +int vssprintf(char *buf, size_t size, const char *fmt, va_list args) +{ + int i; + + i = vsnprintf(buf, size, fmt, args); + + if (likely(i < size)) + return i; + + return -E2BIG; +} +EXPORT_SYMBOL(vssprintf); + /** * snprintf - Format a string and place it in a buffer * @buf: The buffer to place the result into @@ -2987,6 +3015,29 @@ int scnprintf(char *buf, size_t size, const char *fmt, ...) } EXPORT_SYMBOL(scnprintf); +/** + * ssprintf - Format a string and place it in a buffer + * @buf: The buffer to place the result into + * @size: The size of the buffer, including the trailing null space + * @fmt: The format string to use + * @...: Arguments for the format string + * + * The return value is the number of characters written into @buf not including + * the trailing '\0' or -E2BIG if the string was truncated. + */ +int ssprintf(char *buf, size_t size, const char *fmt, ...) +{ + va_list args; + int i; + + va_start(args, fmt); + i = vssprintf(buf, size, fmt, args); + va_end(args); + + return i; +} +EXPORT_SYMBOL(ssprintf); + /** * vsprintf - Format a string and place it in a buffer * @buf: The buffer to place the result into -- 2.43.0.429.g432eaa2c6b-goog