zfs/module/os/freebsd/spl
Richard Yao 97143b9d31 Introduce kmem_scnprintf()
`snprintf()` is meant to protect against buffer overflows, but operating
on the buffer using its return value, possibly by calling it again, can
cause a buffer overflow, because it will return how many characters it
would have written if it had enough space even when it did not. In a
number of places, we repeatedly call snprintf() by successively
incrementing a buffer offset and decrementing a buffer length, by its
return value. This is a potentially unsafe usage of `snprintf()`
whenever the buffer length is reached. CodeQL complained about this.

To fix this, we introduce `kmem_scnprintf()`, which will return 0 when
the buffer is zero or the number of written characters, minus 1 to
exclude the NULL character, when the buffer was too small. In all other
cases, it behaves like snprintf(). The name is inspired by the Linux and
XNU kernels' `scnprintf()`. The implementation was written before I
thought to look at `scnprintf()` and had a good name for it, but it
turned out to have identical semantics to the Linux kernel version.
That lead to the name, `kmem_scnprintf()`.

CodeQL only catches this issue in loops, so repeated use of snprintf()
outside of a loop was not caught. As a result, a thorough audit of the
codebase was done to examine all instances of `snprintf()` usage for
potential problems and a few were caught. Fixes for them are included in
this patch.

Unfortunately, ZED is one of the places where `snprintf()` is
potentially used incorrectly. Since using `kmem_scnprintf()` in it would
require changing how it is linked, we modify its usage to make it safe,
no matter what buffer length is used. In addition, there was a bug in
the use of the return value where the NULL format character was not
being written by pwrite(). That has been fixed.

Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov>
Signed-off-by: Richard Yao <richard.yao@alumni.stonybrook.edu>
Closes #14098
2022-10-29 13:05:11 -07:00
..
acl_common.c Replace dead opensolaris.org license link 2022-07-11 14:16:13 -07:00
callb.c Cleanup: Switch to strlcpy from strncpy 2022-09-27 16:35:29 -07:00
list.c Replace dead opensolaris.org license link 2022-07-11 14:16:13 -07:00
sha224.h Add FreeBSD support to OpenZFS 2020-04-14 11:36:28 -07:00
sha256.h Add FreeBSD support to OpenZFS 2020-04-14 11:36:28 -07:00
sha256c.c Remove bcopy(), bzero(), bcmp() 2022-03-15 15:13:42 -07:00
sha384.h Add FreeBSD support to OpenZFS 2020-04-14 11:36:28 -07:00
sha512.h Add FreeBSD support to OpenZFS 2020-04-14 11:36:28 -07:00
sha512c.c Remove bcopy(), bzero(), bcmp() 2022-03-15 15:13:42 -07:00
sha512t.h Add FreeBSD support to OpenZFS 2020-04-14 11:36:28 -07:00
spl_acl.c Remove bcopy(), bzero(), bcmp() 2022-03-15 15:13:42 -07:00
spl_atomic.c Update FreeBSD SPL atomics 2020-05-04 15:07:04 -07:00
spl_cmn_err.c Replace dead opensolaris.org license link 2022-07-11 14:16:13 -07:00
spl_dtrace.c Refactor ccompile.h to not include system headers 2020-07-25 20:09:50 -07:00
spl_kmem.c Enable -Wwrite-strings 2022-06-29 14:08:54 -07:00
spl_kstat.c Remove pool io kstats (#12212) 2021-06-10 08:27:33 -07:00
spl_misc.c Reduce false positives from Static Analyzers 2022-09-30 15:30:12 -07:00
spl_policy.c Share zfs_fsync, zfs_read, zfs_write, et al between Linux and FreeBSD 2020-10-21 14:08:06 -07:00
spl_procfs_list.c FreeBSD: Add support for procfs_list 2020-09-23 16:43:51 -07:00
spl_string.c Introduce kmem_scnprintf() 2022-10-29 13:05:11 -07:00
spl_sunddi.c Remove hw_serial, ddi_strtoul() 2022-05-13 10:15:31 -07:00
spl_sysevent.c module: freebsd: avoid a taking a destroyed lock in zfs_zevent bits 2022-03-17 10:14:00 -07:00
spl_taskq.c Add notes to system_taskq 2021-11-19 10:02:45 -07:00
spl_uio.c Replace dead opensolaris.org license link 2022-07-11 14:16:13 -07:00
spl_vfs.c Remove bcopy(), bzero(), bcmp() 2022-03-15 15:13:42 -07:00
spl_vm.c Changes to make openzfs build within FreeBSD buildworld 2020-07-31 21:30:31 -07:00
spl_zlib.c Remove bcopy(), bzero(), bcmp() 2022-03-15 15:13:42 -07:00
spl_zone.c Remove bcopy(), bzero(), bcmp() 2022-03-15 15:13:42 -07:00