Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp254163rwd; Sat, 13 May 2023 17:52:50 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ5d+HqXuBAIlu24+TTJtRSbqI2iF3hmxdvX9yHVydY61lZlqMTWwdaMvsLRxA1Gi3Lllhci X-Received: by 2002:a17:903:185:b0:1aa:db0f:1aba with SMTP id z5-20020a170903018500b001aadb0f1abamr36257269plg.47.1684025569885; Sat, 13 May 2023 17:52:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1684025569; cv=none; d=google.com; s=arc-20160816; b=qRMaNlhFvVQcwbhhUWCUdEeg0uFybvbC9CylVubwHRYvhkMVWJ09lohdXCySt1Thnx oVua+LiWerohNrW85RqPe9D1zEC6S71qFeo8KWnwMUKsNWo8Bh5sbqiascidjp/jhhJs 6mbvUMqi+cn0hfoKS4UU1uWzYLcCID7zNQSsdNqC0Ci+k+P1uttq8HTQp980j83CEaZy JWyM9fnR1UgG0a9x7k+4tamKCl+Cu7BEwLYcgVDubFdBpS5IkviAynqBC3zR7PWKtDvR OpG5mnC0zun2EyvvToigpyM4aSPWR00oKpK1LP20qdXLCCcDDDKxzUq1wNAcfUDhPROu iJAw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=OkLfdzj+Mbw5/5LV5R5SnSiV4K77nX1JF+ED3IilGf0=; b=diPukVWeSE/ZvW5W4waPN5WN7yF+0iijIVdEgN8c/26LTfUIGdhEFxV8VqTmesP4Cp h7ddApiQ3wmDJwinwDL0B/lZZYjVtnVSTpXahqut2tCi2Ee5bsMvpnQk6I1wP85zNXRj d6you9W/vPFv0KNlDUscXvDvWV2IFoeVSapILrKBwXPmDoA3/d6zNMWhN0QZuMj2In8U sYficnYx/2dq4s08BPP/NrX8G7O7jGSQtBBZ9OHQgaLCgf+uG1nNmqSv9t/Oh1YNdh6r UQ2alTnOY3nkWs9igJIpayVCfioKT1k1nsX8SXMV8LIXRWgm9Rh6qmJwJeVXTnzREalu 6OWw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id v14-20020a17090a0c8e00b00250807e3c5dsi16036407pja.137.2023.05.13.17.52.25; Sat, 13 May 2023 17:52:49 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-nfs-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229603AbjEMXqQ (ORCPT + 99 others); Sat, 13 May 2023 19:46:16 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49078 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229447AbjEMXqP (ORCPT ); Sat, 13 May 2023 19:46:15 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8780D1FD4; Sat, 13 May 2023 16:46:13 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 1930560EEA; Sat, 13 May 2023 23:46:13 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id E3F43C433D2; Sat, 13 May 2023 23:46:11 +0000 (UTC) Date: Sat, 13 May 2023 19:46:09 -0400 From: Steven Rostedt To: Kees Cook Cc: Chuck Lever III , Azeem Shaikh , Jeff Layton , "linux-hardening@vger.kernel.org" , Linux NFS Mailing List , "linux-kernel@vger.kernel.org" Subject: Re: [PATCH] NFSD: Replace all non-returning strlcpy with strscpy Message-ID: <20230513194609.1b3121f6@rorschach.local.home> In-Reply-To: <202305110927.12508719D2@keescook> References: <20230510220952.3507366-1-azeemshaikh38@gmail.com> <72239648-C807-4CDD-8DA7-18440C83384E@oracle.com> <202305110927.12508719D2@keescook> X-Mailer: Claws Mail 3.17.8 (GTK+ 2.24.33; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-4.0 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Thu, 11 May 2023 09:32:31 -0700 Kees Cook wrote: > On Thu, May 11, 2023 at 02:47:54PM +0000, Chuck Lever III wrote: > > Hello Azeem - > > > > > On May 10, 2023, at 3:09 PM, Azeem Shaikh wrote: > > > > > > strlcpy() reads the entire source buffer first. > > > This read may exceed the destination size limit. > > > This is both inefficient and can lead to linear read > > > overflows if a source string is not NUL-terminated [1]. > > > In an effort to remove strlcpy() completely [2], replace > > > strlcpy() here with strscpy(). > > > No return values were used, so direct replacement is safe. > > > > Actually netid should use the __string() and __assign_str() > > macros rather than open-coding a string copy, I think. > > Ah, hm, yeah, this is tracing wrappers. > > Steve, is there a reason __assign_str() is using "strcpy" and not > strscpy()? Yes. Because __assign_str() predates strscpy() ;-) Note, to use __assign_str(), you first need to do __string(), which will do (in all that TRACE_EVENT() macro magic): #undef __dynamic_array #define __dynamic_array(type, item, len) \ __item_length = (len) * sizeof(type); \ __data_offsets->item = __data_size + \ offsetof(typeof(*entry), __data); \ __data_offsets->item |= __item_length << 16; \ __data_size += __item_length; #undef __string #define __string(item, src) __dynamic_array(char, item, \ strlen((src) ? (const char *)(src) : "(null)") + 1) In order to save a dynamic size string (or array) it must first calculate that size with a strlen(). If the source is not terminated, then this will crash there regardless. The strlen() is to know how much to allocate on the ring buffer, then a copy is done to copy it. I guess you could be worried about the size "changing" between the time it is allocated and copied. If that's the concern then we could do a length copy. > > > Fixes: 3c92fba557c6 ("NFSD: Enhance the nfsd_cb_setup tracepoint") > > Yeah, that works. I was on the fence about adding Fixes for these kinds > of refactoring. Like, it's not really _broken_; we're just trying to > remove the API. > > > > Signed-off-by: Azeem Shaikh > > > --- > > > fs/nfsd/trace.h | 2 +- > > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > > > diff --git a/fs/nfsd/trace.h b/fs/nfsd/trace.h > > > index 4183819ea082..9b32cda54808 100644 > > > --- a/fs/nfsd/trace.h > > > +++ b/fs/nfsd/trace.h > > > @@ -1370,7 +1370,7 @@ TRACE_EVENT(nfsd_cb_setup, > > > TP_fast_assign( > > > __entry->cl_boot = clp->cl_clientid.cl_boot; > > > __entry->cl_id = clp->cl_clientid.cl_id; > > > - strlcpy(__entry->netid, netid, sizeof(__entry->netid)); > > > + strscpy(__entry->netid, netid, sizeof(__entry->netid)); > > > __entry->authflavor = authflavor; > > > __assign_sockaddr(addr, &clp->cl_cb_conn.cb_addr, > > > clp->cl_cb_conn.cb_addrlen) > > Leaving code context for Steve to see... > The above isn't __assign_str(). Not exactly sure what you want me to see here. -- Steve