* [PATCH] change strncpy to strscpy strncpy is now depricated. It may not NUL-terminate the destination string, resulting in potential memory content exposures, unbounded reads, or crashes. Link: https://github.com/KSPP/linux/issues/90
@ 2025-04-02 17:25 goralbaris
2025-04-02 19:14 ` Greg KH
2025-04-02 20:11 ` [[PATCH v2]] transform strncpy into strscpy Baris Can Goral
0 siblings, 2 replies; 13+ messages in thread
From: goralbaris @ 2025-04-02 17:25 UTC (permalink / raw)
To: martin.petersen
Cc: linux-scsi, target-devel, linux-kernel, skhan,
linux-kernel-mentees, goralbaris
Signed-off-by: goralbaris <goralbaris@gmail.com>
---
drivers/target/target_core_configfs.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/target/target_core_configfs.c b/drivers/target/target_core_configfs.c
index c40217f44b1b..5c0b74e76be2 100644
--- a/drivers/target/target_core_configfs.c
+++ b/drivers/target/target_core_configfs.c
@@ -143,7 +143,7 @@ static ssize_t target_core_item_dbroot_store(struct config_item *item,
}
filp_close(fp, NULL);
- strncpy(db_root, db_root_stage, read_bytes);
+ strscpy(db_root, db_root_stage, read_bytes);
pr_debug("Target_Core_ConfigFS: db_root set to %s\n", db_root);
r = read_bytes;
@@ -3664,7 +3664,7 @@ static void target_init_dbroot(void)
}
filp_close(fp, NULL);
- strncpy(db_root, db_root_stage, DB_ROOT_LEN);
+ strscpy(db_root, db_root_stage, DB_ROOT_LEN);
pr_debug("Target_Core_ConfigFS: db_root set to %s\n", db_root);
}
--
2.34.1
^ permalink raw reply related [flat|nested] 13+ messages in thread* Re: [PATCH] change strncpy to strscpy strncpy is now depricated. It may not NUL-terminate the destination string, resulting in potential memory content exposures, unbounded reads, or crashes. Link: https://github.com/KSPP/linux/issues/90
2025-04-02 17:25 [PATCH] change strncpy to strscpy strncpy is now depricated. It may not NUL-terminate the destination string, resulting in potential memory content exposures, unbounded reads, or crashes. Link: https://github.com/KSPP/linux/issues/90 goralbaris
@ 2025-04-02 19:14 ` Greg KH
2025-04-02 20:11 ` [[PATCH v2]] transform strncpy into strscpy Baris Can Goral
1 sibling, 0 replies; 13+ messages in thread
From: Greg KH @ 2025-04-02 19:14 UTC (permalink / raw)
To: goralbaris
Cc: martin.petersen, linux-scsi, target-devel, linux-kernel, skhan,
linux-kernel-mentees
On Wed, Apr 02, 2025 at 08:25:04PM +0300, goralbaris wrote:
> Signed-off-by: goralbaris <goralbaris@gmail.com>
I think something went wrong with your subject line :(
Also, don't use your email alias for signed-off-by please.
thanks,
greg k-h
^ permalink raw reply [flat|nested] 13+ messages in thread
* [[PATCH v2]] transform strncpy into strscpy
2025-04-02 17:25 [PATCH] change strncpy to strscpy strncpy is now depricated. It may not NUL-terminate the destination string, resulting in potential memory content exposures, unbounded reads, or crashes. Link: https://github.com/KSPP/linux/issues/90 goralbaris
2025-04-02 19:14 ` Greg KH
@ 2025-04-02 20:11 ` Baris Can Goral
2025-04-02 20:45 ` [PATCH v3] " Baris Can Goral
1 sibling, 1 reply; 13+ messages in thread
From: Baris Can Goral @ 2025-04-02 20:11 UTC (permalink / raw)
To: martin.petersen
Cc: linux-scsi, target-devel, linux-kernel, skhan,
linux-kernel-mentees, Baris Can Goral
Description:
The strncpy() function is actively dangerous to use since it may not NULL-terminate the destination string,
resulting in potential memory content exposures, unbounded reads, or crashes.
Link: [1] https://github.com/KSPP/linux/issues/90
Changes from v2:
-Description added
-User Name corrected
Signed-off-by: Baris Can Goral <goralbaris@gmail.com>
---
drivers/target/target_core_configfs.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/target/target_core_configfs.c b/drivers/target/target_core_configfs.c
index c40217f44b1b..5c0b74e76be2 100644
--- a/drivers/target/target_core_configfs.c
+++ b/drivers/target/target_core_configfs.c
@@ -143,7 +143,7 @@ static ssize_t target_core_item_dbroot_store(struct config_item *item,
}
filp_close(fp, NULL);
- strncpy(db_root, db_root_stage, read_bytes);
+ strscpy(db_root, db_root_stage, read_bytes);
pr_debug("Target_Core_ConfigFS: db_root set to %s\n", db_root);
r = read_bytes;
@@ -3664,7 +3664,7 @@ static void target_init_dbroot(void)
}
filp_close(fp, NULL);
- strncpy(db_root, db_root_stage, DB_ROOT_LEN);
+ strscpy(db_root, db_root_stage, DB_ROOT_LEN);
pr_debug("Target_Core_ConfigFS: db_root set to %s\n", db_root);
}
--
2.34.1
^ permalink raw reply related [flat|nested] 13+ messages in thread* [PATCH v3] transform strncpy into strscpy
2025-04-02 20:11 ` [[PATCH v2]] transform strncpy into strscpy Baris Can Goral
@ 2025-04-02 20:45 ` Baris Can Goral
2025-04-03 12:41 ` Maurizio Lombardi
2025-04-05 14:36 ` [PATCH v4] scsi: target: " Baris Can Goral
0 siblings, 2 replies; 13+ messages in thread
From: Baris Can Goral @ 2025-04-02 20:45 UTC (permalink / raw)
To: martin.petersen
Cc: linux-scsi, target-devel, linux-kernel, skhan,
linux-kernel-mentees, Baris Can Goral
Description:
The strncpy() function is actively dangerous to use since it may not
NULL-terminate the destination string,resulting in potential memory
content exposures, unbounded reads, or crashes.
Link:https://github.com/KSPP/linux/issues/90
Signed-off-by: Baris Can Goral <goralbaris@gmail.com>
---
Changes from v3:
-Description added
-User name corrected
-formatting issues.
drivers/target/target_core_configfs.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/target/target_core_configfs.c b/drivers/target/target_core_configfs.c
index c40217f44b1b..5c0b74e76be2 100644
--- a/drivers/target/target_core_configfs.c
+++ b/drivers/target/target_core_configfs.c
@@ -143,7 +143,7 @@ static ssize_t target_core_item_dbroot_store(struct config_item *item,
}
filp_close(fp, NULL);
- strncpy(db_root, db_root_stage, read_bytes);
+ strscpy(db_root, db_root_stage, read_bytes);
pr_debug("Target_Core_ConfigFS: db_root set to %s\n", db_root);
r = read_bytes;
@@ -3664,7 +3664,7 @@ static void target_init_dbroot(void)
}
filp_close(fp, NULL);
- strncpy(db_root, db_root_stage, DB_ROOT_LEN);
+ strscpy(db_root, db_root_stage, DB_ROOT_LEN);
pr_debug("Target_Core_ConfigFS: db_root set to %s\n", db_root);
}
--
2.34.1
^ permalink raw reply related [flat|nested] 13+ messages in thread* Re: [PATCH v3] transform strncpy into strscpy
2025-04-02 20:45 ` [PATCH v3] " Baris Can Goral
@ 2025-04-03 12:41 ` Maurizio Lombardi
2025-04-05 14:36 ` [PATCH v4] scsi: target: " Baris Can Goral
1 sibling, 0 replies; 13+ messages in thread
From: Maurizio Lombardi @ 2025-04-03 12:41 UTC (permalink / raw)
To: Baris Can Goral, martin.petersen
Cc: linux-scsi, target-devel, linux-kernel, skhan,
linux-kernel-mentees
Hello, two small things:
On Wed Apr 2, 2025 at 10:45 PM CEST, Baris Can Goral wrote:
> Description:
You can remove this "description" tag.
Also, it's better to add a prefix to the subject, for example:
"scsi: target: transform strncpy into strscpy"
Maurizio
^ permalink raw reply [flat|nested] 13+ messages in thread
* [PATCH v4] scsi: target: transform strncpy into strscpy
2025-04-02 20:45 ` [PATCH v3] " Baris Can Goral
2025-04-03 12:41 ` Maurizio Lombardi
@ 2025-04-05 14:36 ` Baris Can Goral
2025-04-05 15:25 ` David Laight
2025-04-07 7:53 ` Maurizio Lombardi
1 sibling, 2 replies; 13+ messages in thread
From: Baris Can Goral @ 2025-04-05 14:36 UTC (permalink / raw)
To: martin.petersen
Cc: linux-scsi, target-devel, linux-kernel, skhan,
linux-kernel-mentees, Baris Can Goral
The strncpy() function is actively dangerous to use since it may not
NULL-terminate the destination string,resulting in potential memory
content exposures, unbounded reads, or crashes.
Link:https://github.com/KSPP/linux/issues/90
Signed-off-by: Baris Can Goral <goralbaris@gmail.com>
---
Changes from v4:
-Description added
-User name corrected
-formatting issues.
-commit name changed
drivers/target/target_core_configfs.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/target/target_core_configfs.c b/drivers/target/target_core_configfs.c
index c40217f44b1b..5c0b74e76be2 100644
--- a/drivers/target/target_core_configfs.c
+++ b/drivers/target/target_core_configfs.c
@@ -143,7 +143,7 @@ static ssize_t target_core_item_dbroot_store(struct config_item *item,
}
filp_close(fp, NULL);
- strncpy(db_root, db_root_stage, read_bytes);
+ strscpy(db_root, db_root_stage, read_bytes);
pr_debug("Target_Core_ConfigFS: db_root set to %s\n", db_root);
r = read_bytes;
@@ -3664,7 +3664,7 @@ static void target_init_dbroot(void)
}
filp_close(fp, NULL);
- strncpy(db_root, db_root_stage, DB_ROOT_LEN);
+ strscpy(db_root, db_root_stage, DB_ROOT_LEN);
pr_debug("Target_Core_ConfigFS: db_root set to %s\n", db_root);
}
--
2.34.1
^ permalink raw reply related [flat|nested] 13+ messages in thread* Re: [PATCH v4] scsi: target: transform strncpy into strscpy
2025-04-05 14:36 ` [PATCH v4] scsi: target: " Baris Can Goral
@ 2025-04-05 15:25 ` David Laight
[not found] ` <CAJOJxizEDm_th4G=BvejM4_jGcF6+QYT=LjD_J_FTbsNFVTjCQ@mail.gmail.com>
2025-04-07 7:53 ` Maurizio Lombardi
1 sibling, 1 reply; 13+ messages in thread
From: David Laight @ 2025-04-05 15:25 UTC (permalink / raw)
To: Baris Can Goral
Cc: martin.petersen, linux-scsi, target-devel, linux-kernel, skhan,
linux-kernel-mentees
On Sat, 5 Apr 2025 17:36:47 +0300
Baris Can Goral <goralbaris@gmail.com> wrote:
> The strncpy() function is actively dangerous to use since it may not
> NULL-terminate the destination string,resulting in potential memory
> content exposures, unbounded reads, or crashes.
>
> Link:https://github.com/KSPP/linux/issues/90
> Signed-off-by: Baris Can Goral <goralbaris@gmail.com>
> ---
> Changes from v4:
> -Description added
> -User name corrected
> -formatting issues.
> -commit name changed
> drivers/target/target_core_configfs.c | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/drivers/target/target_core_configfs.c b/drivers/target/target_core_configfs.c
> index c40217f44b1b..5c0b74e76be2 100644
> --- a/drivers/target/target_core_configfs.c
> +++ b/drivers/target/target_core_configfs.c
> @@ -143,7 +143,7 @@ static ssize_t target_core_item_dbroot_store(struct config_item *item,
> }
> filp_close(fp, NULL);
>
> - strncpy(db_root, db_root_stage, read_bytes);
> + strscpy(db_root, db_root_stage, read_bytes);
> pr_debug("Target_Core_ConfigFS: db_root set to %s\n", db_root);
That code is broken, it reads:
read_bytes = snprintf(db_root_stage, DB_ROOT_LEN, "%s", page);
if (!read_bytes)
goto unlock;
if (db_root_stage[read_bytes - 1] == '\n')
db_root_stage[read_bytes - 1] = '\0';
/* validate new db root before accepting it */
fp = filp_open(db_root_stage, O_RDONLY, 0);
if (IS_ERR(fp)) {
pr_err("db_root: cannot open: %s\n", db_root_stage);
goto unlock;
}
if (!S_ISDIR(file_inode(fp)->i_mode)) {
filp_close(fp, NULL);
pr_err("db_root: not a directory: %s\n", db_root_stage);
goto unlock;
}
filp_close(fp, NULL);
strncpy(db_root, db_root_stage, read_bytes);
pr_debug("Target_Core_ConfigFS: db_root set to %s\n", db_root);
r = read_bytes;
unlock:
mutex_unlock(&target_devices_lock);
return r;
'Really nasty (tm)' things happen if 'page' is too long.
David
>
> r = read_bytes;
> @@ -3664,7 +3664,7 @@ static void target_init_dbroot(void)
> }
> filp_close(fp, NULL);
>
> - strncpy(db_root, db_root_stage, DB_ROOT_LEN);
> + strscpy(db_root, db_root_stage, DB_ROOT_LEN);
> pr_debug("Target_Core_ConfigFS: db_root set to %s\n", db_root);
> }
>
^ permalink raw reply [flat|nested] 13+ messages in thread* Re: [PATCH v4] scsi: target: transform strncpy into strscpy
2025-04-05 14:36 ` [PATCH v4] scsi: target: " Baris Can Goral
2025-04-05 15:25 ` David Laight
@ 2025-04-07 7:53 ` Maurizio Lombardi
2025-04-07 17:48 ` Baris Can Goral
1 sibling, 1 reply; 13+ messages in thread
From: Maurizio Lombardi @ 2025-04-07 7:53 UTC (permalink / raw)
To: Baris Can Goral, martin.petersen
Cc: linux-scsi, target-devel, linux-kernel, skhan,
linux-kernel-mentees
On Sat Apr 5, 2025 at 4:36 PM CEST, Baris Can Goral wrote:
> The strncpy() function is actively dangerous to use since it may not
> NULL-terminate the destination string,resulting in potential memory
> content exposures, unbounded reads, or crashes.
>
> Link:https://github.com/KSPP/linux/issues/90
> Signed-off-by: Baris Can Goral <goralbaris@gmail.com>
> ---
> Changes from v4:
> -Description added
> -User name corrected
> -formatting issues.
> -commit name changed
> drivers/target/target_core_configfs.c | 4 ++--
> 1 file changed, 2 insertions(+), 2 deletions(-)
>
> diff --git a/drivers/target/target_core_configfs.c b/drivers/target/target_core_configfs.c
> index c40217f44b1b..5c0b74e76be2 100644
> --- a/drivers/target/target_core_configfs.c
> +++ b/drivers/target/target_core_configfs.c
> @@ -143,7 +143,7 @@ static ssize_t target_core_item_dbroot_store(struct config_item *item,
> }
> filp_close(fp, NULL);
>
> - strncpy(db_root, db_root_stage, read_bytes);
> + strscpy(db_root, db_root_stage, read_bytes);
> pr_debug("Target_Core_ConfigFS: db_root set to %s\n", db_root);
>
> r = read_bytes;
> @@ -3664,7 +3664,7 @@ static void target_init_dbroot(void)
> }
> filp_close(fp, NULL);
>
> - strncpy(db_root, db_root_stage, DB_ROOT_LEN);
> + strscpy(db_root, db_root_stage, DB_ROOT_LEN);
> pr_debug("Target_Core_ConfigFS: db_root set to %s\n", db_root);
> }
>
This patch doesn't apply anymore.
strncpy() has already been replaced with strscpy()
in version 6.14-rc2.
Maurizio
^ permalink raw reply [flat|nested] 13+ messages in thread* Re: [PATCH v4] scsi: target: transform strncpy into strscpy
2025-04-07 7:53 ` Maurizio Lombardi
@ 2025-04-07 17:48 ` Baris Can Goral
2025-04-08 7:18 ` Maurizio Lombardi
0 siblings, 1 reply; 13+ messages in thread
From: Baris Can Goral @ 2025-04-07 17:48 UTC (permalink / raw)
To: martin.petersen
Cc: linux-scsi, target-devel, linux-kernel, skhan,
linux-kernel-mentees
Hi Maurizio,
Unfourtunately, in version 6.14-rc2 (and also v6.14) strncpy is still there.
Best Regards,
Baris
^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [PATCH v4] scsi: target: transform strncpy into strscpy
2025-04-07 17:48 ` Baris Can Goral
@ 2025-04-08 7:18 ` Maurizio Lombardi
0 siblings, 0 replies; 13+ messages in thread
From: Maurizio Lombardi @ 2025-04-08 7:18 UTC (permalink / raw)
To: Baris Can Goral, martin.petersen
Cc: linux-scsi, target-devel, linux-kernel, skhan,
linux-kernel-mentees
On Mon Apr 7, 2025 at 7:48 PM CEST, Baris Can Goral wrote:
> Hi Maurizio,
>
> Unfourtunately, in version 6.14-rc2 (and also v6.14) strncpy is still there.
Sorry, my mistake.
commit dfb7df1ddb29c89662e84b2c82c1ff7943358ae0 that replaces
strncpy() with strscpy() has been merged in kernel version 6.15-rc1
Maurizio
^ permalink raw reply [flat|nested] 13+ messages in thread
* [PATCH] change strncpy to strscpy strncpy is now depricated. It may not NUL-terminate the destination string, resulting in potential memory content exposures, unbounded reads, or crashes. Link: https://github.com/KSPP/linux/issues/90
@ 2025-04-02 17:33 goralbaris
0 siblings, 0 replies; 13+ messages in thread
From: goralbaris @ 2025-04-02 17:33 UTC (permalink / raw)
To: martin.petersen
Cc: linux-scsi, target-devel, linux-kernel, skhan,
linux-kernel-mentees, goralbaris
The strncpy is depricated.
It may not NUL-terminate the destination string, resulting in potential memory
content exposures, unbounded reads, or crashes. Link: https://github.com/KSPP/linux/issues/90
Signed-off-by: goralbaris <goralbaris@gmail.com>
---
drivers/target/target_core_configfs.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/drivers/target/target_core_configfs.c b/drivers/target/target_core_configfs.c
index c40217f44b1b..5c0b74e76be2 100644
--- a/drivers/target/target_core_configfs.c
+++ b/drivers/target/target_core_configfs.c
@@ -143,7 +143,7 @@ static ssize_t target_core_item_dbroot_store(struct config_item *item,
}
filp_close(fp, NULL);
- strncpy(db_root, db_root_stage, read_bytes);
+ strscpy(db_root, db_root_stage, read_bytes);
pr_debug("Target_Core_ConfigFS: db_root set to %s\n", db_root);
r = read_bytes;
@@ -3664,7 +3664,7 @@ static void target_init_dbroot(void)
}
filp_close(fp, NULL);
- strncpy(db_root, db_root_stage, DB_ROOT_LEN);
+ strscpy(db_root, db_root_stage, DB_ROOT_LEN);
pr_debug("Target_Core_ConfigFS: db_root set to %s\n", db_root);
}
--
2.34.1
^ permalink raw reply related [flat|nested] 13+ messages in thread
end of thread, other threads:[~2025-04-08 7:18 UTC | newest]
Thread overview: 13+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-04-02 17:25 [PATCH] change strncpy to strscpy strncpy is now depricated. It may not NUL-terminate the destination string, resulting in potential memory content exposures, unbounded reads, or crashes. Link: https://github.com/KSPP/linux/issues/90 goralbaris
2025-04-02 19:14 ` Greg KH
2025-04-02 20:11 ` [[PATCH v2]] transform strncpy into strscpy Baris Can Goral
2025-04-02 20:45 ` [PATCH v3] " Baris Can Goral
2025-04-03 12:41 ` Maurizio Lombardi
2025-04-05 14:36 ` [PATCH v4] scsi: target: " Baris Can Goral
2025-04-05 15:25 ` David Laight
[not found] ` <CAJOJxizEDm_th4G=BvejM4_jGcF6+QYT=LjD_J_FTbsNFVTjCQ@mail.gmail.com>
2025-04-05 17:28 ` baris goral
2025-04-05 20:07 ` David Laight
2025-04-07 7:53 ` Maurizio Lombardi
2025-04-07 17:48 ` Baris Can Goral
2025-04-08 7:18 ` Maurizio Lombardi
-- strict thread matches above, loose matches on Subject: below --
2025-04-02 17:33 [PATCH] change strncpy to strscpy strncpy is now depricated. It may not NUL-terminate the destination string, resulting in potential memory content exposures, unbounded reads, or crashes. Link: https://github.com/KSPP/linux/issues/90 goralbaris
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox