linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [PATCH] net: sched: Replace strlcpy with strscpy
@ 2023-07-10  3:07 Azeem Shaikh
  2023-07-10  4:26 ` Pavan Chebbi
  2023-07-10  7:30 ` patchwork-bot+netdevbpf
  0 siblings, 2 replies; 3+ messages in thread
From: Azeem Shaikh @ 2023-07-10  3:07 UTC (permalink / raw)
  To: Jamal Hadi Salim, Cong Wang, Jiri Pirko
  Cc: linux-hardening, Azeem Shaikh, netdev, linux-kernel,
	David S. Miller, Eric Dumazet, Jakub Kicinski, Paolo Abeni

strlcpy() reads the entire source buffer first.
This read may exceed the destination size limit.
This is both inefficient and can lead to linear read
overflows if a source string is not NUL-terminated [1].
In an effort to remove strlcpy() completely [2], replace
strlcpy() here with strscpy().

Direct replacement is safe here since return value of -errno
is used to check for truncation instead of sizeof(dest).

[1] https://www.kernel.org/doc/html/latest/process/deprecated.html#strlcpy
[2] https://github.com/KSPP/linux/issues/89

Signed-off-by: Azeem Shaikh <azeemshaikh38@gmail.com>
---
 net/sched/act_api.c |    2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/net/sched/act_api.c b/net/sched/act_api.c
index f7887f42d542..9d3f26bf0440 100644
--- a/net/sched/act_api.c
+++ b/net/sched/act_api.c
@@ -1320,7 +1320,7 @@ struct tc_action_ops *tc_action_load_ops(struct nlattr *nla, bool police,
 			return ERR_PTR(err);
 		}
 	} else {
-		if (strlcpy(act_name, "police", IFNAMSIZ) >= IFNAMSIZ) {
+		if (strscpy(act_name, "police", IFNAMSIZ) < 0) {
 			NL_SET_ERR_MSG(extack, "TC action name too long");
 			return ERR_PTR(-EINVAL);
 		}
-- 
2.41.0.255.g8b1d071c50-goog



^ permalink raw reply related	[flat|nested] 3+ messages in thread

* Re: [PATCH] net: sched: Replace strlcpy with strscpy
  2023-07-10  3:07 [PATCH] net: sched: Replace strlcpy with strscpy Azeem Shaikh
@ 2023-07-10  4:26 ` Pavan Chebbi
  2023-07-10  7:30 ` patchwork-bot+netdevbpf
  1 sibling, 0 replies; 3+ messages in thread
From: Pavan Chebbi @ 2023-07-10  4:26 UTC (permalink / raw)
  To: Azeem Shaikh
  Cc: Jamal Hadi Salim, Cong Wang, Jiri Pirko, linux-hardening, netdev,
	linux-kernel, David S. Miller, Eric Dumazet, Jakub Kicinski,
	Paolo Abeni

[-- Attachment #1: Type: text/plain, Size: 1571 bytes --]

On Mon, Jul 10, 2023 at 8:37 AM Azeem Shaikh <azeemshaikh38@gmail.com> wrote:
>
> strlcpy() reads the entire source buffer first.
> This read may exceed the destination size limit.
> This is both inefficient and can lead to linear read
> overflows if a source string is not NUL-terminated [1].
> In an effort to remove strlcpy() completely [2], replace
> strlcpy() here with strscpy().
>
> Direct replacement is safe here since return value of -errno
> is used to check for truncation instead of sizeof(dest).
>
> [1] https://www.kernel.org/doc/html/latest/process/deprecated.html#strlcpy
> [2] https://github.com/KSPP/linux/issues/89
>
> Signed-off-by: Azeem Shaikh <azeemshaikh38@gmail.com>
> ---

Looks good to me.
Reviewed-by: Pavan Chebbi <pavan.chebbi@broadcom.com>

>  net/sched/act_api.c |    2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/net/sched/act_api.c b/net/sched/act_api.c
> index f7887f42d542..9d3f26bf0440 100644
> --- a/net/sched/act_api.c
> +++ b/net/sched/act_api.c
> @@ -1320,7 +1320,7 @@ struct tc_action_ops *tc_action_load_ops(struct nlattr *nla, bool police,
>                         return ERR_PTR(err);
>                 }
>         } else {
> -               if (strlcpy(act_name, "police", IFNAMSIZ) >= IFNAMSIZ) {
> +               if (strscpy(act_name, "police", IFNAMSIZ) < 0) {
>                         NL_SET_ERR_MSG(extack, "TC action name too long");
>                         return ERR_PTR(-EINVAL);
>                 }
> --
> 2.41.0.255.g8b1d071c50-goog
>
>
>

[-- Attachment #2: S/MIME Cryptographic Signature --]
[-- Type: application/pkcs7-signature, Size: 4209 bytes --]

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [PATCH] net: sched: Replace strlcpy with strscpy
  2023-07-10  3:07 [PATCH] net: sched: Replace strlcpy with strscpy Azeem Shaikh
  2023-07-10  4:26 ` Pavan Chebbi
@ 2023-07-10  7:30 ` patchwork-bot+netdevbpf
  1 sibling, 0 replies; 3+ messages in thread
From: patchwork-bot+netdevbpf @ 2023-07-10  7:30 UTC (permalink / raw)
  To: Azeem Shaikh
  Cc: jhs, xiyou.wangcong, jiri, linux-hardening, netdev, linux-kernel,
	davem, edumazet, kuba, pabeni

Hello:

This patch was applied to netdev/net.git (main)
by David S. Miller <davem@davemloft.net>:

On Mon, 10 Jul 2023 03:07:11 +0000 you wrote:
> strlcpy() reads the entire source buffer first.
> This read may exceed the destination size limit.
> This is both inefficient and can lead to linear read
> overflows if a source string is not NUL-terminated [1].
> In an effort to remove strlcpy() completely [2], replace
> strlcpy() here with strscpy().
> 
> [...]

Here is the summary with links:
  - net: sched: Replace strlcpy with strscpy
    https://git.kernel.org/netdev/net/c/989b52cdc849

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html



^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2023-07-10  7:30 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-07-10  3:07 [PATCH] net: sched: Replace strlcpy with strscpy Azeem Shaikh
2023-07-10  4:26 ` Pavan Chebbi
2023-07-10  7:30 ` patchwork-bot+netdevbpf

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).