public inbox for linux-scsi@vger.kernel.org
 help / color / mirror / Atom feed
* [PATCH] scsi: message: fusion: Replace all non-returning strlcpy with strscpy
@ 2023-05-30 16:02 Azeem Shaikh
  2023-05-30 23:17 ` Kees Cook
                   ` (2 more replies)
  0 siblings, 3 replies; 4+ messages in thread
From: Azeem Shaikh @ 2023-05-30 16:02 UTC (permalink / raw)
  To: Sathya Prakash, Sreekanth Reddy, Suganath Prabu Subramani
  Cc: linux-hardening, Azeem Shaikh, MPT-FusionLinux.pdl, linux-scsi,
	linux-kernel

strlcpy() reads the entire source buffer first.
This read may exceed the destination size limit.
This is both inefficient and can lead to linear read
overflows if a source string is not NUL-terminated [1].
In an effort to remove strlcpy() completely [2], replace
strlcpy() here with strscpy().
No return values were used, so direct replacement is safe.

[1] https://www.kernel.org/doc/html/latest/process/deprecated.html#strlcpy
[2] https://github.com/KSPP/linux/issues/89

Signed-off-by: Azeem Shaikh <azeemshaikh38@gmail.com>
---
 drivers/message/fusion/mptbase.c |    4 ++--
 drivers/message/fusion/mptctl.c  |    2 +-
 2 files changed, 3 insertions(+), 3 deletions(-)

diff --git a/drivers/message/fusion/mptbase.c b/drivers/message/fusion/mptbase.c
index 4f0afce8428d..4bf669c55649 100644
--- a/drivers/message/fusion/mptbase.c
+++ b/drivers/message/fusion/mptbase.c
@@ -712,7 +712,7 @@ mpt_register(MPT_CALLBACK cbfunc, MPT_DRIVER_CLASS dclass, char *func_name)
 			MptDriverClass[cb_idx] = dclass;
 			MptEvHandlers[cb_idx] = NULL;
 			last_drv_idx = cb_idx;
-			strlcpy(MptCallbacksName[cb_idx], func_name,
+			strscpy(MptCallbacksName[cb_idx], func_name,
 				MPT_MAX_CALLBACKNAME_LEN+1);
 			break;
 		}
@@ -7666,7 +7666,7 @@ mpt_display_event_info(MPT_ADAPTER *ioc, EventNotificationReply_t *pEventReply)
 		break;
 	}
 	if (ds)
-		strlcpy(evStr, ds, EVENT_DESCR_STR_SZ);
+		strscpy(evStr, ds, EVENT_DESCR_STR_SZ);
 
 
 	devtprintk(ioc, printk(MYIOC_s_DEBUG_FMT
diff --git a/drivers/message/fusion/mptctl.c b/drivers/message/fusion/mptctl.c
index 1decd09a08d8..dd028df4b283 100644
--- a/drivers/message/fusion/mptctl.c
+++ b/drivers/message/fusion/mptctl.c
@@ -2408,7 +2408,7 @@ mptctl_hp_hostinfo(MPT_ADAPTER *ioc, unsigned long arg, unsigned int data_size)
 				if (mpt_config(ioc, &cfg) == 0) {
 					ManufacturingPage0_t *pdata = (ManufacturingPage0_t *) pbuf;
 					if (strlen(pdata->BoardTracerNumber) > 1) {
-						strlcpy(karg.serial_number,
+						strscpy(karg.serial_number,
 							pdata->BoardTracerNumber, 24);
 					}
 				}


^ permalink raw reply related	[flat|nested] 4+ messages in thread

* Re: [PATCH] scsi: message: fusion: Replace all non-returning strlcpy with strscpy
  2023-05-30 16:02 [PATCH] scsi: message: fusion: Replace all non-returning strlcpy with strscpy Azeem Shaikh
@ 2023-05-30 23:17 ` Kees Cook
  2023-05-31 22:03 ` Martin K. Petersen
  2023-06-08  1:42 ` Martin K. Petersen
  2 siblings, 0 replies; 4+ messages in thread
From: Kees Cook @ 2023-05-30 23:17 UTC (permalink / raw)
  To: Azeem Shaikh
  Cc: Sathya Prakash, Sreekanth Reddy, Suganath Prabu Subramani,
	linux-hardening, MPT-FusionLinux.pdl, linux-scsi, linux-kernel

On Tue, May 30, 2023 at 04:02:48PM +0000, Azeem Shaikh wrote:
> strlcpy() reads the entire source buffer first.
> This read may exceed the destination size limit.
> This is both inefficient and can lead to linear read
> overflows if a source string is not NUL-terminated [1].
> In an effort to remove strlcpy() completely [2], replace
> strlcpy() here with strscpy().
> No return values were used, so direct replacement is safe.
> 
> [1] https://www.kernel.org/doc/html/latest/process/deprecated.html#strlcpy
> [2] https://github.com/KSPP/linux/issues/89
> 
> Signed-off-by: Azeem Shaikh <azeemshaikh38@gmail.com>

Reviewed-by: Kees Cook <keescook@chromium.org>

-- 
Kees Cook

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH] scsi: message: fusion: Replace all non-returning strlcpy with strscpy
  2023-05-30 16:02 [PATCH] scsi: message: fusion: Replace all non-returning strlcpy with strscpy Azeem Shaikh
  2023-05-30 23:17 ` Kees Cook
@ 2023-05-31 22:03 ` Martin K. Petersen
  2023-06-08  1:42 ` Martin K. Petersen
  2 siblings, 0 replies; 4+ messages in thread
From: Martin K. Petersen @ 2023-05-31 22:03 UTC (permalink / raw)
  To: Azeem Shaikh
  Cc: Sathya Prakash, Sreekanth Reddy, Suganath Prabu Subramani,
	linux-hardening, MPT-FusionLinux.pdl, linux-scsi, linux-kernel


Azeem,

> strlcpy() reads the entire source buffer first. This read may exceed
> the destination size limit. This is both inefficient and can lead to
> linear read overflows if a source string is not NUL-terminated [1]. In
> an effort to remove strlcpy() completely [2], replace strlcpy() here
> with strscpy(). No return values were used, so direct replacement is
> safe.

Applied to 6.5/scsi-staging, thanks!

-- 
Martin K. Petersen	Oracle Linux Engineering

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH] scsi: message: fusion: Replace all non-returning strlcpy with strscpy
  2023-05-30 16:02 [PATCH] scsi: message: fusion: Replace all non-returning strlcpy with strscpy Azeem Shaikh
  2023-05-30 23:17 ` Kees Cook
  2023-05-31 22:03 ` Martin K. Petersen
@ 2023-06-08  1:42 ` Martin K. Petersen
  2 siblings, 0 replies; 4+ messages in thread
From: Martin K. Petersen @ 2023-06-08  1:42 UTC (permalink / raw)
  To: Sathya Prakash, Sreekanth Reddy, Suganath Prabu Subramani,
	Azeem Shaikh
  Cc: Martin K . Petersen, linux-hardening, MPT-FusionLinux.pdl,
	linux-scsi, linux-kernel

On Tue, 30 May 2023 16:02:48 +0000, Azeem Shaikh wrote:

> strlcpy() reads the entire source buffer first.
> This read may exceed the destination size limit.
> This is both inefficient and can lead to linear read
> overflows if a source string is not NUL-terminated [1].
> In an effort to remove strlcpy() completely [2], replace
> strlcpy() here with strscpy().
> No return values were used, so direct replacement is safe.
> 
> [...]

Applied to 6.5/scsi-queue, thanks!

[1/1] scsi: message: fusion: Replace all non-returning strlcpy with strscpy
      https://git.kernel.org/mkp/scsi/c/dbe37c71d124

-- 
Martin K. Petersen	Oracle Linux Engineering

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2023-06-08  1:42 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-05-30 16:02 [PATCH] scsi: message: fusion: Replace all non-returning strlcpy with strscpy Azeem Shaikh
2023-05-30 23:17 ` Kees Cook
2023-05-31 22:03 ` Martin K. Petersen
2023-06-08  1:42 ` Martin K. Petersen

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox