From patchwork Mon Oct 30 22:36:57 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Justin Stitt X-Patchwork-Id: 159883 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:d641:0:b0:403:3b70:6f57 with SMTP id cy1csp2549143vqb; Mon, 30 Oct 2023 15:37:17 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHetw35TjfioS/ygJK3fAEiRTLiJJpfMcI4Hh023SNLX/5l69kPaRXwBguobo91dLD2vWkC X-Received: by 2002:a05:6a20:2d0e:b0:16b:bbca:4a5d with SMTP id g14-20020a056a202d0e00b0016bbbca4a5dmr8536033pzl.62.1698705436748; Mon, 30 Oct 2023 15:37:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698705436; cv=none; d=google.com; s=arc-20160816; b=KOetT2KcNZ34elBIPIOOIwvDf3/7n8lPM0FzMckr8josIFT4K8LOPOU2AZy6hv2L1O XuNKMLY0SFiqmlKD78P8X05HEvJPeha/PlKjJxFTNUZr/Axv6u6Z3XlLaFuFqoOPZUwR W/7z/tpFyMoPaWi6XfwhTSkZgkq2VcXhkpgr8xcD8LTqSnws1BqUdlDEl1OuEpfsm1bH +AS7CmjJsa83gAAjq3EnxtDcTkdSXbc7rJjpggeuvH5c/4N6RP7vjhlABrw5QH4SJIKv J85X3c1dEs2n6lw/vIuUi4q7i8pC1ZCIF9XUcDF09am6nSuDK1Qq+admOmU2AJRzge+w A8zg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:mime-version:date :dkim-signature; bh=lq5TwK+3n6zGzzimtcAIoXXorjYRH73jd8dtvn3Ft6I=; fh=xj8nTl55YM40VdqnxfQs4WpvsRY9vFNkcAfpZFL4Mds=; b=lOJ9xboHkcgDpV1kPbD6MTKX7rxFgPigor8NlKYGdUFk/41lfJB3UCb/5d4AuFRJZc PrvTw8TKJ7NwWD7ryfCI/kZNCcy9Cmotpn3URMQ1Gqzvzd7jTs+a4RCVYbIK67RatDy2 fVjuWVrrJyOX4oc3a9CUSt8PNdog38FIAxOjcVkIF5/WN0BGH+h3JRiZHlKroSnzO4q7 KnAUMJRMKQxkC3gGnQArH81mZlFaKWk4OT8/hDQlW5JFJTIvNcaeHwfOlNW6Iyjl/QKW 0g9lsW+7K0YQLxRsEnSLvzl9cpPTyvw9/jZ4/ZFgb5OMLnyVWfycTGBp6bXj7WuKL3J/ rFTA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b="RdGbf/No"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id p1-20020a170902f08100b001c722b269b4si39846pla.620.2023.10.30.15.37.16 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 30 Oct 2023 15:37:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20230601 header.b="RdGbf/No"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 43D448095899; Mon, 30 Oct 2023 15:37:14 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230352AbjJ3WhD (ORCPT + 32 others); Mon, 30 Oct 2023 18:37:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38762 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229738AbjJ3WhB (ORCPT ); Mon, 30 Oct 2023 18:37:01 -0400 Received: from mail-ot1-x349.google.com (mail-ot1-x349.google.com [IPv6:2607:f8b0:4864:20::349]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 93591E8 for ; Mon, 30 Oct 2023 15:36:58 -0700 (PDT) Received: by mail-ot1-x349.google.com with SMTP id 46e09a7af769-6ce2cce763eso7358670a34.0 for ; Mon, 30 Oct 2023 15:36:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1698705418; x=1699310218; darn=vger.kernel.org; h=cc:to:from:subject:message-id:mime-version:date:from:to:cc:subject :date:message-id:reply-to; bh=lq5TwK+3n6zGzzimtcAIoXXorjYRH73jd8dtvn3Ft6I=; b=RdGbf/NoSiOuyh5onpF3BZoHSI1vl0NLpmmOHSolZPmMOyhBJMYsa/7V1/FJsFBM6a lql4DnFNZwfUde9/4v3VWLSNAD3XIoUGjibURqVKFM2u+EKn2t4ZvISAK6ZZ1r4gHP10 3ICQNxrFUryjHIRXZGo3qDdGf8cMXl3nPlp7uHtf4UUebbtkb+b+DWHaE47lPKJ+Tzlf 5RK//2wmpeoRc27RQI/9CWni5Z6P7dB5DZc+GKN3kTlenRIujv+AVn6SqZPwYAsZ1mZj ZlivGFvUawiPOr/J1EYYTNrXJaH/cirIkhLvS1HynALB3m8Qt2Y5cIYA8UnMhJYdYafK q8PA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1698705418; x=1699310218; h=cc:to:from:subject:message-id:mime-version:date:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=lq5TwK+3n6zGzzimtcAIoXXorjYRH73jd8dtvn3Ft6I=; b=U8z02NqQ8g6JP3rYBK1SwXzE45LqtSN3/WGq6x+uFDgmuazFx/tB+yLJhUEShoVsbc uVRb/fCb7jGvdwfiSNrMoaJI7xB+9hucMDMaQkjyrlqOEvUrgSnEDgrni1kWkZZfCxOV muPKmoKUKmhums0Pixqn+Qxe7Tsln38Vd06FNmg7T9O0qijKcoqimvs2Q0OXKZSXmxKX KGGUDeOWDeB679Ad5LC6vSTeoTKiozZu+t8iHSaUgqWz/igeWZrq4TN5qO+307P522ML oxA2HyHoKDw+gAYz1hHskgaUR28/rEWWxR1HEsCLN1o2XMh5QCv6Rw0cUjPiHn0XSvmi yA/Q== X-Gm-Message-State: AOJu0YzuEdu3ifF7x4VM3T2MW1G5Vpl0Qa/+jU9hSmI+w2QZleS4kPQX P1aJDzZwczsN+zyCFHbsQk9es+iHklbkaHQE8A== X-Received: from jstitt-linux1.c.googlers.com ([fda3:e722:ac3:cc00:2b:ff92:c0a8:23b5]) (user=justinstitt job=sendgmr) by 2002:a05:6830:4502:b0:6c4:58bd:290d with SMTP id i2-20020a056830450200b006c458bd290dmr222233otv.3.1698705417918; Mon, 30 Oct 2023 15:36:57 -0700 (PDT) Date: Mon, 30 Oct 2023 22:36:57 +0000 Mime-Version: 1.0 X-B4-Tracking: v=1; b=H4sIAAgwQGUC/x3NQQqDQAxA0atI1g2MIxX0KiLFJhkNyCiJSIt49 w5dvs3/F7iYikNfXWByquuWC+pHBbRMeRZULoYYYlOHJqAflmn/IpueYo5OrrjqOxEmekmmjQU XfE7cxi61LB1Bie0mST//0TDe9w/THRIxeAAAAA== X-Developer-Key: i=justinstitt@google.com; a=ed25519; pk=tC3hNkJQTpNX/gLKxTNQKDmiQl6QjBNCGKJINqAdJsE= X-Developer-Signature: v=1; a=ed25519-sha256; t=1698705417; l=3578; i=justinstitt@google.com; s=20230717; h=from:subject:message-id; bh=ZF9U9vNqxuweLPAWDBaMtDMKK84GlPUqwF7Byf2+S7s=; b=F1b2huUJ/pDsyqCT80uhn3Zf7p1L3WobUXybolIxFi5AJ2jvthi3HulpjB6iOjb1ZfU9kv111 QIVZJMEINgNAVdeMOm48S4aw+a0kgwvm8A0d34cYpiKqJhOyUf5Kp3i X-Mailer: b4 0.12.3 Message-ID: <20231030-strncpy-drivers-scsi-libfc-fc_encode-h-v1-1-c08c2be6befa@google.com> Subject: [PATCH] scsi: libfc: replace deprecated strncpy with memcpy From: Justin Stitt To: Hannes Reinecke , "James E.J. Bottomley" , "Martin K. Petersen" Cc: linux-scsi@vger.kernel.org, linux-kernel@vger.kernel.org, linux-hardening@vger.kernel.org, Justin Stitt X-Spam-Status: No, score=-8.4 required=5.0 tests=DKIMWL_WL_MED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Mon, 30 Oct 2023 15:37:14 -0700 (PDT) X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1781221752418815936 X-GMAIL-MSGID: 1781221752418815936 strncpy() is deprecated [1] and as such we should use different apis to copy string data. We can see that ct is NUL-initialized with fc_ct_hdr_fill: | ct = fc_ct_hdr_fill(fp, op, sizeof(struct fc_ns_rspn) + len, ... In fc_ct_hdr_fill(): | memset(ct, 0, ct_plen); We also calculate the length of the source string: | len = strnlen(fc_host_symbolic_name(lport->host), 255); then this argument is used in strncpy(), which is bad because the pattern of (dest, src, strlen(src)) usually leaves the destination buffer without NUL-termination. However, this seems to be correct in this instance since fr_name is part of a seq_buf-like structure monitoring the length: | struct fc_ns_rspn { | struct fc_ns_fid fr_fid; /* port ID object */ | __u8 fr_name_len; | char fr_name[]; | } __attribute__((__packed__)); So, this is really just a byte copy into a length-bounded string. Let's use memcpy() and mark the buffers as __nonstring. Link: https://www.kernel.org/doc/html/latest/process/deprecated.html#strncpy-on-nul-terminated-strings [1] Link: https://github.com/KSPP/linux/issues/90 Cc: linux-hardening@vger.kernel.org Signed-off-by: Justin Stitt --- Note: build-tested only. Found with: $ rg "strncpy\(" --- drivers/scsi/libfc/fc_encode.h | 8 ++++---- include/uapi/scsi/fc/fc_ns.h | 6 +++--- 2 files changed, 7 insertions(+), 7 deletions(-) --- base-commit: ffc253263a1375a65fa6c9f62a893e9767fbebfa change-id: 20231030-strncpy-drivers-scsi-libfc-fc_encode-h-5ad629f6de9c Best regards, -- Justin Stitt diff --git a/drivers/scsi/libfc/fc_encode.h b/drivers/scsi/libfc/fc_encode.h index 7dcac3b6baa7..ba8cc4ee650c 100644 --- a/drivers/scsi/libfc/fc_encode.h +++ b/drivers/scsi/libfc/fc_encode.h @@ -140,8 +140,8 @@ static inline int fc_ct_ns_fill(struct fc_lport *lport, ct = fc_ct_hdr_fill(fp, op, sizeof(struct fc_ns_rspn) + len, FC_FST_DIR, FC_NS_SUBTYPE); hton24(ct->payload.spn.fr_fid.fp_fid, lport->port_id); - strncpy(ct->payload.spn.fr_name, - fc_host_symbolic_name(lport->host), len); + memcpy(ct->payload.spn.fr_name, + fc_host_symbolic_name(lport->host), len); ct->payload.spn.fr_name_len = len; break; @@ -150,8 +150,8 @@ static inline int fc_ct_ns_fill(struct fc_lport *lport, ct = fc_ct_hdr_fill(fp, op, sizeof(struct fc_ns_rsnn) + len, FC_FST_DIR, FC_NS_SUBTYPE); put_unaligned_be64(lport->wwnn, &ct->payload.snn.fr_wwn); - strncpy(ct->payload.snn.fr_name, - fc_host_symbolic_name(lport->host), len); + memcpy(ct->payload.snn.fr_name, + fc_host_symbolic_name(lport->host), len); ct->payload.snn.fr_name_len = len; break; diff --git a/include/uapi/scsi/fc/fc_ns.h b/include/uapi/scsi/fc/fc_ns.h index 4cf0a40a099a..8a6f6c6b5213 100644 --- a/include/uapi/scsi/fc/fc_ns.h +++ b/include/uapi/scsi/fc/fc_ns.h @@ -145,7 +145,7 @@ struct fc_gid_pn_resp { */ struct fc_gspn_resp { __u8 fp_name_len; - char fp_name[]; + char fp_name[] __nonstring; }; /* @@ -171,7 +171,7 @@ struct fc_ns_rn_id { struct fc_ns_rsnn { __be64 fr_wwn; /* node name */ __u8 fr_name_len; - char fr_name[]; + char fr_name[] __nonstring; } __attribute__((__packed__)); /* @@ -180,7 +180,7 @@ struct fc_ns_rsnn { struct fc_ns_rspn { struct fc_ns_fid fr_fid; /* port ID object */ __u8 fr_name_len; - char fr_name[]; + char fr_name[] __nonstring; } __attribute__((__packed__)); /*