Received: by 2002:a05:6358:c692:b0:131:369:b2a3 with SMTP id fe18csp1398296rwb; Fri, 28 Jul 2023 08:52:59 -0700 (PDT) X-Google-Smtp-Source: APBJJlHtUnqA7I3xvnb1q0drsP/rQyLs6dK7Dakd6wCf0DfiHabpCrxdMy+SnfDOWvR//0FeZbOd X-Received: by 2002:a05:6a21:338f:b0:125:4d74:ac77 with SMTP id yy15-20020a056a21338f00b001254d74ac77mr2174919pzb.42.1690559579568; Fri, 28 Jul 2023 08:52:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690559579; cv=none; d=google.com; s=arc-20160816; b=rBExPBx7YKTvC1+xLsw4bBZeo1mm78wNtmKZukWSwOSIOKm2Zemx/7GVfTTPET/dLy YFhO813/VV2iimxOFs7ewCJ7Eef930ZngucX8yuftWEJFuyfBZl+SB3DoWJKAqLAJihp HIKmu+0QnLIKNzM0JZx1Y/y5PNYmRmFtJsWaurT1x3z/uvdR5Gf2bG76/BDZa+TpMDzZ Hu9QTm/nED32dxiMp/ZHsYyecEx8EolbrAFuj/fzMIJCVVr/uCZC/ghKvp+t15dfBdlY xZEjEaFzHprdykev6aSI0QV905oihyR4fNTlie3CKfZevZ15SyICIVMAd557Y1Th0GwC +Kaw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :mime-version:accept-language:in-reply-to:references:message-id:date :thread-index:thread-topic:subject:cc:to:from; bh=rn06A48zr99r9j04Dd0jo2DT227J2NtKeValAr/d2Qg=; fh=zpQksNFUqChokrj7HQTVX9fHxMlgAmrzVF4jJGxXcdI=; b=g+w+jaKE1mSKgPim84zgZssdGpbtqoL88lWDApsd4JY2aaBN8UX40CjAzvBXop/8DH c5XCL7U8Pa1dgZ4hVeBnKMavePDxtJmxCZ/BCLRUPbb9tSG1timw2kUGau6WotV1Gxga 51844FVOJlw96WpndUpz9Ey70EohC3XXuWi2pC43r/eN2KddHoUKSjS65r7z2tXtuanL 0t92nS24SBZ/Z/D4ONDMGdJAiZor5TWUo9d2asWhosLRJIT2N+b/WCDhzo7WwiQbU9Nx CeVxMpmUsoKR7ir3FX9Ek5+gDkrfItr46UBAY4QIIf3TFca1oSPorrM94Om+9FAwm8rX oPLg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=aculab.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t23-20020a656097000000b00530b6228f91si3155288pgu.895.2023.07.28.08.52.46; Fri, 28 Jul 2023 08:52:59 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=aculab.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237025AbjG1PXc convert rfc822-to-8bit (ORCPT + 99 others); Fri, 28 Jul 2023 11:23:32 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50910 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237037AbjG1PXa (ORCPT ); Fri, 28 Jul 2023 11:23:30 -0400 Received: from eu-smtp-delivery-151.mimecast.com (eu-smtp-delivery-151.mimecast.com [185.58.86.151]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9B10235B8 for ; Fri, 28 Jul 2023 08:23:29 -0700 (PDT) Received: from AcuMS.aculab.com (156.67.243.121 [156.67.243.121]) by relay.mimecast.com with ESMTP with both STARTTLS and AUTH (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id uk-mta-405-eJcN3k0sP7Kvuwhq7UFxfw-1; Fri, 28 Jul 2023 16:23:26 +0100 X-MC-Unique: eJcN3k0sP7Kvuwhq7UFxfw-1 Received: from AcuMS.Aculab.com (10.202.163.6) by AcuMS.aculab.com (10.202.163.6) with Microsoft SMTP Server (TLS) id 15.0.1497.48; Fri, 28 Jul 2023 16:23:25 +0100 Received: from AcuMS.Aculab.com ([::1]) by AcuMS.aculab.com ([::1]) with mapi id 15.00.1497.048; Fri, 28 Jul 2023 16:23:25 +0100 From: David Laight To: 'Oleksandr Natalenko' , "linux-kernel@vger.kernel.org" CC: "linux-scsi@vger.kernel.org" , Saurav Kashyap , Johannes Thumshirn , "GR-QLogic-Storage-Upstream@marvell.com" , "James E.J. Bottomley" , "Martin K. Petersen" , Jozef Bacik , Laurence Oberman , "Rob Evers" Subject: RE: [PATCH 1/3] scsi: qedf: do not touch __user pointer in qedf_dbg_stop_io_on_error_cmd_read() directly Thread-Topic: [PATCH 1/3] scsi: qedf: do not touch __user pointer in qedf_dbg_stop_io_on_error_cmd_read() directly Thread-Index: AQHZwSEI7kbXXpGPc0ikqDMKVqIzOK/PS6TQ Date: Fri, 28 Jul 2023 15:23:25 +0000 Message-ID: <314512939ebd44508b767d799e7c30af@AcuMS.aculab.com> References: <20230728065819.139694-1-oleksandr@redhat.com> <20230728065819.139694-2-oleksandr@redhat.com> In-Reply-To: <20230728065819.139694-2-oleksandr@redhat.com> Accept-Language: en-GB, en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-exchange-transport-fromentityheader: Hosted x-originating-ip: [10.202.205.107] MIME-Version: 1.0 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: aculab.com Content-Language: en-US Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8BIT X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_PASS, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Oleksandr Natalenko > Sent: 28 July 2023 07:58 > > The qedf_dbg_stop_io_on_error_cmd_read() function invokes sprintf() > directly on a __user pointer, which may crash the kernel. > > Avoid doing that by using a small on-stack buffer for sprintf() > and then calling simple_read_from_buffer() which does a proper > copy_to_user() call. > > Fixes: 61d8658b4a ("scsi: qedf: Add QLogic FastLinQ offload FCoE driver framework.") ... > diff --git a/drivers/scsi/qedf/qedf_debugfs.c b/drivers/scsi/qedf/qedf_debugfs.c > index a3ed681c8ce3f..4d1b99569d490 100644 > --- a/drivers/scsi/qedf/qedf_debugfs.c > +++ b/drivers/scsi/qedf/qedf_debugfs.c > @@ -185,18 +185,17 @@ qedf_dbg_stop_io_on_error_cmd_read(struct file *filp, char __user *buffer, > size_t count, loff_t *ppos) > { > int cnt; > + char cbuf[7]; > struct qedf_dbg_ctx *qedf_dbg = > (struct qedf_dbg_ctx *)filp->private_data; > struct qedf_ctx *qedf = container_of(qedf_dbg, > struct qedf_ctx, dbg_ctx); > > QEDF_INFO(qedf_dbg, QEDF_LOG_DEBUGFS, "entered\n"); > - cnt = sprintf(buffer, "%s\n", > + cnt = sprintf(cbuf, "%s\n", > qedf->stop_io_on_error ? "true" : "false"); You've made cbuf[] exactly just big enough. If anyone breathes on this code it could overflow. You really should use scnprintf() for safety. > > - cnt = min_t(int, count, cnt - *ppos); > - *ppos += cnt; > - return cnt; > + return simple_read_from_buffer(buffer, count, ppos, cbuf, cnt); Or just: if (gedf->stop_on_error) return simple_read_from_buffer(buffer, count, ppos, "true\n", 5); return simple_read_from_buffer(buffer, count, ppos, "false\n", 6); David > } > > static ssize_t > -- > 2.41.0 - Registered Address Lakeside, Bramley Road, Mount Farm, Milton Keynes, MK1 1PT, UK Registration No: 1397386 (Wales)