[LTP] [PATCH] tst_kconfig: Avoid buffer overflow when parsing /proc/cmdline

Petr Vorel pvorel@suse.cz
Wed Jun 19 15:30:58 CEST 2024


Hi Li,

> On Wed, Jun 19, 2024 at 3:47 PM Petr Vorel <pvorel@suse.cz> wrote:

> > > When the test is run with a kernel booting with many parameters, the
> > > buffer size is often not large enough to store the complete command
> > > line. This results in a buffer overflow and the test complains with
> > > the following message:

> > >   tst_kconfig.c:609: TWARN: Buffer overflowed while parsing /proc/cmdline

> > Thanks for the fix!

> > Reviewed-by: Petr Vorel <pvorel@suse.cz>
> > Fixes: 180834982 ("kconfig: add funtion to parse /proc/cmdline")

> > NOTE tst_kconfig_read() has char line[128], also struct tst_kcmdline_var
> > member


> Typically 128 is long enough for Linux kernel parameters, otherwise it hard
> for people to memorize the name and value.

Sure, let's keep it for now, but examples we are getting close :). Sooner or
later these configs, which are generated by toolchain will be longer than 128
chars:

$ awk 'length > max_length { max_length = length; longest_line = $0 } END { print longest_line }' /boot/config*
CONFIG_CC_VERSION_TEXT="gcc (SUSE Linux) 13.2.1 20240206 [revision 67ac78caf31f7cb3202177e6428a46d829b70f23]"

$ awk 'length > max_length { max_length = length; longest_line = $0 } END { print longest_line }' /boot/config* | wc -L
109

I was surprised even real config option was quite long:

$ awk 'length > max_length { max_length = length; longest_line = $0 } END { print longest_line }' /boot/config*
CONFIG_LSM="landlock,lockdown,yama,loadpin,safesetid,integrity,apparmor,selinux,smack,tomoyo,bpf"

$ awk 'length > max_length { max_length = length; longest_line = $0 } END { print longest_line }' /boot/config* | wc -L
97

> > has this length. The longest line on some on my systems is 109, it's still
> > OK,
> > hopefully it stays :).


> Hmm, good point. After thinking it over, seems too hasty to enlarge the
> buf[] size to 512.

> We'd better keep the size same between 'tst_kcmdline_var.value' to the
> local 'buf[]'.
+1. I would even define a constant to keep these 2 sizes the same.

> And the overflow is not a problem, it just drops some unused info[1] to
> reloop to
> the head for saving our target parameter.

> [1] BOOT_IMAGE=(hd0,gpt2)/ostree/centos-dd7415ed2c7cc3f65bdc4bf8f9a63b95bbb13ee0fee633f6b92a872944d1d6e4/vmlinuz-5.14.0-4xx.4xx.4495_1336583944.el9iv.x86_64

Ah, what a long parameter :). OTOH would it harm to enlarge both to 256 or even
512?

> I'm thinking of lowering the priority info from TWARN to TINFO in that line:
>     tst_res(TWARN, "Buffer overflowed while parsing /proc/cmdline");

Yes, but are you sure that occasional long parameter will be always irrelevant?
I'd really increase the size.

Kind regards,
Petr

> I will send a patch V2 once get a better solution.


More information about the ltp mailing list