From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7A697C433FE for ; Fri, 7 Oct 2022 13:30:28 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229946AbiJGNaZ convert rfc822-to-8bit (ORCPT ); Fri, 7 Oct 2022 09:30:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59532 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229899AbiJGNaW (ORCPT ); Fri, 7 Oct 2022 09:30:22 -0400 Received: from mail.astralinux.ru (mail.astralinux.ru [217.74.38.119]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F3E5A5A3D4; Fri, 7 Oct 2022 06:30:18 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by mail.astralinux.ru (Postfix) with ESMTP id 4345938629ED; Fri, 7 Oct 2022 16:30:10 +0300 (MSK) Received: from mail.astralinux.ru ([127.0.0.1]) by localhost (rbta-msk-vsrv-mail01.astralinux.ru [127.0.0.1]) (amavisd-new, port 10032) with ESMTP id DPVhyZ6N5ULc; Fri, 7 Oct 2022 16:29:57 +0300 (MSK) Received: from localhost (localhost [127.0.0.1]) by mail.astralinux.ru (Postfix) with ESMTP id 1876638629BD; Fri, 7 Oct 2022 16:29:57 +0300 (MSK) X-Virus-Scanned: amavisd-new at astralinux.ru Received: from mail.astralinux.ru ([127.0.0.1]) by localhost (rbta-msk-vsrv-mail01.astralinux.ru [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id 1H5dKxmWl2H1; Fri, 7 Oct 2022 16:29:56 +0300 (MSK) Received: from work-laptop.astralinux.ru (unknown [10.177.20.36]) by mail.astralinux.ru (Postfix) with ESMTPSA id EC35B38629B9; Fri, 7 Oct 2022 16:29:55 +0300 (MSK) From: Andrew Chernyakov To: acherniakov@astralinux.ru, Greg Kroah-Hartman Cc: Andy Gross , Bjorn Andersson , Konrad Dybcio , Mathieu Poirier , linux-arm-msm@vger.kernel.org, linux-remoteproc@vger.kernel.org, linux-kernel@vger.kernel.org, Krzysztof Kozlowski , stable@vger.kernel.org, lvc-project@linuxtesting.org Subject: [PATCH 5.10 0/1] rpmsg: qcom: glink: replace strncpy() with strscpy_pad() Date: Fri, 7 Oct 2022 16:29:30 +0300 Message-Id: <20221007132931.123755-1-acherniakov@astralinux.ru> X-Mailer: git-send-email 2.35.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org With static analisys tools we found that strncpy() is used in rpmsg. This function is not safe and can lead to buffer overflow. This patchset replaces strncpy() with strscpy_pad(). Link: https://lore.kernel.org/all/20220519073330.7187-1-krzysztof.kozlowski@linaro.org/ Found by Linux Verification Center (linuxtesting.org) with SVACE.