Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp3413502pxf; Mon, 22 Mar 2021 06:02:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwuc5YkyTpgRNO6bcl7lTO8NUuvmN77xh8C+Fw/o3y7VEh0iy3+naKt8wzOboLS/Um/N46F X-Received: by 2002:a05:600c:22c7:: with SMTP id 7mr16208627wmg.85.1616418145971; Mon, 22 Mar 2021 06:02:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1616418145; cv=none; d=google.com; s=arc-20160816; b=0rtFuvD9MvsU0VJqhE3w5PMS0HphNBCYi7lSH2brsKj++hJ9Q6japouTXDH4bRnG/i FTIuYy6jmvigVnH965CrQPPZ1nfEUxDJQmNU6jpPyP/Z5eRw0WyXb9RsHG41ZC1udNAF ZqVvYaY4+T+cPbJ3KrBw8kvpVtWwhE4CwY9b5WwHcKfgxnKNFwVisfIz2HbbCYLSGyyp CSLDgQuop9YlHG8bq6oWdCppmCwSlkWLgxUcurIMOIyetsGG5xOaoMu8v04fOaQnNaEf RMKltEe9BUYomf+bPPDRiXySHE9E1v7e5Wg4fWGOANNLACbY+Irv/O3fydlo0cb+IjcL JHlg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=bBHli7VBor2yWZKc/Hj4eAzNBGsmOj5ay92M5ppyVlU=; b=lr8V7EfaOJouUs7moAoot10j20S5JIGE7Y1KRoRo0Bb78A6a9eKk8OeHhwrdizZxLr lwhvciGXYS96hNoPrhX86Gni3d9+PA4nFSrgmWI54wAjAaxCIfT8w2J4MJyd12QmFb5e 6jbipkqbCI5cNCgfe5FfCHzEdFxpqbm/AQpcn8M1BXoswVd6biU1RoJeOSSKGgOLV/Yo DVCipzriyFNu/hmjtbVzbmah4SOBm93ZsCTvqOV5V3sQdhqGD+EVLEL7piAOUnREc5Ty ul0GzEe7ich5zJM5I2XLjqsShfwvaNAH5gbQ765y24K2ejndZod8htnf2abYHRptsiUk nL5A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ttDrQn7q; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id m21si11295085edp.392.2021.03.22.06.01.59; Mon, 22 Mar 2021 06:02:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=ttDrQn7q; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233403AbhCVM6f (ORCPT + 99 others); Mon, 22 Mar 2021 08:58:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:40092 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232385AbhCVMrc (ORCPT ); Mon, 22 Mar 2021 08:47:32 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id AFCE9619C1; Mon, 22 Mar 2021 12:43:20 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1616417001; bh=+N/vEXPFA2h7Hs+Xp+Ysnyf4OFcbKK4iAvPi5aDZgn0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=ttDrQn7qBIT+lUaAHMaRyRNtFt3xkzeWl+h3UCO6wsajGf54eRmnq+ORm5le/5Zam xj9xd4RBJc2hnjBUA29iyPYZHq7K4sPf6+fu5WTYrAvka1W3e7cjQNSl/3ZJaN575l LrAFEpwnn7Lrm0i4dajntEnsZMDDJpbfsUjxbK30= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Tyrel Datwyler , Michael Ellerman Subject: [PATCH 5.4 48/60] PCI: rpadlpar: Fix potential drc_name corruption in store functions Date: Mon, 22 Mar 2021 13:28:36 +0100 Message-Id: <20210322121923.973844947@linuxfoundation.org> X-Mailer: git-send-email 2.31.0 In-Reply-To: <20210322121922.372583154@linuxfoundation.org> References: <20210322121922.372583154@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Tyrel Datwyler commit cc7a0bb058b85ea03db87169c60c7cfdd5d34678 upstream. Both add_slot_store() and remove_slot_store() try to fix up the drc_name copied from the store buffer by placing a NUL terminator at nbyte + 1 or in place of a '\n' if present. However, the static buffer that we copy the drc_name data into is not zeroed and can contain anything past the n-th byte. This is problematic if a '\n' byte appears in that buffer after nbytes and the string copied into the store buffer was not NUL terminated to start with as the strchr() search for a '\n' byte will mark this incorrectly as the end of the drc_name string resulting in a drc_name string that contains garbage data after the n-th byte. Additionally it will cause us to overwrite that '\n' byte on the stack with NUL, potentially corrupting data on the stack. The following debugging shows an example of the drmgr utility writing "PHB 4543" to the add_slot sysfs attribute, but add_slot_store() logging a corrupted string value. drmgr: drmgr: -c phb -a -s PHB 4543 -d 1 add_slot_store: drc_name = PHB 4543°|<82>!, rc = -19 Fix this by using strscpy() instead of memcpy() to ensure the string is NUL terminated when copied into the static drc_name buffer. Further, since the string is now NUL terminated the code only needs to change '\n' to '\0' when present. Cc: stable@vger.kernel.org Signed-off-by: Tyrel Datwyler [mpe: Reformat change log and add mention of possible stack corruption] Signed-off-by: Michael Ellerman Link: https://lore.kernel.org/r/20210315214821.452959-1-tyreld@linux.ibm.com Signed-off-by: Greg Kroah-Hartman --- drivers/pci/hotplug/rpadlpar_sysfs.c | 14 ++++++-------- 1 file changed, 6 insertions(+), 8 deletions(-) --- a/drivers/pci/hotplug/rpadlpar_sysfs.c +++ b/drivers/pci/hotplug/rpadlpar_sysfs.c @@ -34,12 +34,11 @@ static ssize_t add_slot_store(struct kob if (nbytes >= MAX_DRC_NAME_LEN) return 0; - memcpy(drc_name, buf, nbytes); + strscpy(drc_name, buf, nbytes + 1); end = strchr(drc_name, '\n'); - if (!end) - end = &drc_name[nbytes]; - *end = '\0'; + if (end) + *end = '\0'; rc = dlpar_add_slot(drc_name); if (rc) @@ -65,12 +64,11 @@ static ssize_t remove_slot_store(struct if (nbytes >= MAX_DRC_NAME_LEN) return 0; - memcpy(drc_name, buf, nbytes); + strscpy(drc_name, buf, nbytes + 1); end = strchr(drc_name, '\n'); - if (!end) - end = &drc_name[nbytes]; - *end = '\0'; + if (end) + *end = '\0'; rc = dlpar_remove_slot(drc_name); if (rc)