Received: by 2002:a05:7412:e79e:b0:f3:1519:9f41 with SMTP id o30csp230932rdd; Wed, 22 Nov 2023 14:21:28 -0800 (PST) X-Google-Smtp-Source: AGHT+IGhcFN9Gu97ankN35084M480PWZrgrFBXrsjgkNE+c+bifq+x7VeCtwrynCeEFfjtFZ/1Xv X-Received: by 2002:a17:902:7e88:b0:1cf:87f7:5dd1 with SMTP id z8-20020a1709027e8800b001cf87f75dd1mr750683pla.1.1700691687894; Wed, 22 Nov 2023 14:21:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700691687; cv=none; d=google.com; s=arc-20160816; b=MmeI9k7Wglu39G0givgQPdKFg6fxIn16IzKA41ydMbJZRb6JZRdBmrkY5Xwkqh/pih ovF7BBMiW6Rgi1Sv4kbOXFf6MvAG3AqnQ3cmWTPOhPVpj1m7GszwmV9Zhw3lMB4IuBOr WNAoY8611l7D7jRRBo3mQCGb2Ya9Ng07PpcdLg0Hb7GVQbhomhqfYQzmW4c86TtfKpbu MOwtGkAcZrh4ot43SWQp+3MQO9TLaNJ1hYxhg3Y8GMyOMr2BTXbcaAQokjNDA6d5RXLT NFGGir2EmEoij7DLPSA3yIUxxdnkF58Qy5r8xmxGDESsh9nfCIX7TsgZrlXJ+k3cBJBz qPxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=C1GtsC7xDrHnpIPw4k1kL4HUdcJblhABM+bosFGCHqs=; fh=fPEHmelfzJYNy5dEeHKkBwuZlB4QsXbqqeP9RCx6BQc=; b=wjacc285aBWQH8/UpdVyUazg3vsnRvQi7BIOXjP/VRxdikUMulIWvXhEZveL9NJF6v pw0cK0r8i0x42qw5QnMpWSX1RMNTxHPBuHa9LfCgRZOZDutb1x+Ym0xIOZV7FNezhIDx iVHCyJkB1R5HtQmH2dHChgdUe1T+3T38cp0OwswOzrktP9nrcILkQxutKeE+Ff2MnYwM Uh/nruUjimh86RJyuREZDpYkSWB0TEdFDr+7PvunRSbpT3acx6i+a984cCHmxSQ6LUJv x5hcTxL8rOIfy5A07kIX3/b1MpmPOrHj6nrgkrIkgJq6XRLGSzHXj6muQuRkcfWfmQP8 AnqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ooPGsOvL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id h3-20020a170902f54300b001b9c3498526si335110plf.433.2023.11.22.14.21.25 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 22 Nov 2023 14:21:27 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=ooPGsOvL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 354CA82F568C; Wed, 22 Nov 2023 14:21:04 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344685AbjKVWUY (ORCPT + 99 others); Wed, 22 Nov 2023 17:20:24 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59412 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235249AbjKVWUU (ORCPT ); Wed, 22 Nov 2023 17:20:20 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3DBAD1B5 for ; Wed, 22 Nov 2023 14:20:16 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 42B4DC433C7; Wed, 22 Nov 2023 22:20:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1700691615; bh=u13b0z+tp/dZxRqpZv9t59kmK5DC5BMUsS/pUkeI2qs=; h=From:To:Cc:Subject:Date:From; b=ooPGsOvLIdQyfEAMzxU5AUDDT2dgbuOSg46vaCSzFAnxa36wUIPVF3WtkoXNnAeaN YdoU6LZdkYxhfbvjtcuLhNyWwoXytZde9SwDNdY1Tl4jmbeB43qZphfgSByJsUxg6F P42dILUa3xainFiGGpmMZiLsPLcEDJtYXJ/ilM2uH10l75uTYay6fTgHXEInAIBAG4 xl/J2Gkfb9/Y4GskeTffJXv++AReoFw1IqyLIHEbuV3K3MIzH0TePiOljvcS0wZRrY uZ5v8zD7ziuBZelAzr6Xo3tqZ+1c5uFG/k5FHGSkkUSoF0lVfVgTQYw4reqGMKmeoV vdRr0+LrX7NVA== From: Arnd Bergmann To: Robert Richter , Borislav Petkov , Tony Luck , Sergey Temerkhanov Cc: Arnd Bergmann , "Gustavo A. R. Silva" , Kees Cook , James Morse , Mauro Carvalho Chehab , Yeqi Fu , linux-edac@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] EDAC, thunderx: fix possible out-of-bounds string access. Date: Wed, 22 Nov 2023 23:19:53 +0100 Message-Id: <20231122222007.3199885-1-arnd@kernel.org> X-Mailer: git-send-email 2.39.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-1.3 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Wed, 22 Nov 2023 14:21:04 -0800 (PST) From: Arnd Bergmann Commit 1b56c90018f0 ("Makefile: Enable -Wstringop-overflow globally") exposes a warning for a common bug in the usage of strncat(): drivers/edac/thunderx_edac.c: In function 'thunderx_ocx_com_threaded_isr': drivers/edac/thunderx_edac.c:1136:17: error: 'strncat' specified bound 1024 equals destination size [-Werror=stringop-overflow=] 1136 | strncat(msg, other, OCX_MESSAGE_SIZE); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/edac/thunderx_edac.c:1145:33: error: 'strncat' specified bound 1024 equals destination size [-Werror=stringop-overflow=] 1145 | strncat(msg, other, OCX_MESSAGE_SIZE); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/edac/thunderx_edac.c:1150:33: error: 'strncat' specified bound 1024 equals destination size [-Werror=stringop-overflow=] 1150 | strncat(msg, other, OCX_MESSAGE_SIZE); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/edac/thunderx_edac.c: In function 'thunderx_l2c_threaded_isr': drivers/edac/thunderx_edac.c:1899:17: error: 'strncat' specified bound 1024 equals destination size [-Werror=stringop-overflow=] 1899 | strncat(msg, other, L2C_MESSAGE_SIZE); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ drivers/edac/thunderx_edac.c: In function 'thunderx_ocx_lnk_threaded_isr': drivers/edac/thunderx_edac.c:1220:17: error: 'strncat' specified bound 1024 equals destination size [-Werror=stringop-overflow=] 1220 | strncat(msg, other, OCX_MESSAGE_SIZE); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Apparently the author of this driver expected strncat() to behave the way that strlcat() does, which uses the size of the destination buffer as its third argument rather than the length of the source buffer. The result is that there is no check on the size of the allocated buffer. Change it to use strncat(). Fixes: 41003396f932 ("EDAC, thunderx: Add Cavium ThunderX EDAC driver") Cc: "Gustavo A. R. Silva" Cc: Kees Cook Signed-off-by: Arnd Bergmann --- drivers/edac/thunderx_edac.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/drivers/edac/thunderx_edac.c b/drivers/edac/thunderx_edac.c index b9c5772da959..90d46e5c4ff0 100644 --- a/drivers/edac/thunderx_edac.c +++ b/drivers/edac/thunderx_edac.c @@ -1133,7 +1133,7 @@ static irqreturn_t thunderx_ocx_com_threaded_isr(int irq, void *irq_id) decode_register(other, OCX_OTHER_SIZE, ocx_com_errors, ctx->reg_com_int); - strncat(msg, other, OCX_MESSAGE_SIZE); + strlcat(msg, other, OCX_MESSAGE_SIZE); for (lane = 0; lane < OCX_RX_LANES; lane++) if (ctx->reg_com_int & BIT(lane)) { @@ -1142,12 +1142,12 @@ static irqreturn_t thunderx_ocx_com_threaded_isr(int irq, void *irq_id) lane, ctx->reg_lane_int[lane], lane, ctx->reg_lane_stat11[lane]); - strncat(msg, other, OCX_MESSAGE_SIZE); + strlcat(msg, other, OCX_MESSAGE_SIZE); decode_register(other, OCX_OTHER_SIZE, ocx_lane_errors, ctx->reg_lane_int[lane]); - strncat(msg, other, OCX_MESSAGE_SIZE); + strlcat(msg, other, OCX_MESSAGE_SIZE); } if (ctx->reg_com_int & OCX_COM_INT_CE) @@ -1217,7 +1217,7 @@ static irqreturn_t thunderx_ocx_lnk_threaded_isr(int irq, void *irq_id) decode_register(other, OCX_OTHER_SIZE, ocx_com_link_errors, ctx->reg_com_link_int); - strncat(msg, other, OCX_MESSAGE_SIZE); + strlcat(msg, other, OCX_MESSAGE_SIZE); if (ctx->reg_com_link_int & OCX_COM_LINK_INT_UE) edac_device_handle_ue(ocx->edac_dev, 0, 0, msg); @@ -1896,7 +1896,7 @@ static irqreturn_t thunderx_l2c_threaded_isr(int irq, void *irq_id) decode_register(other, L2C_OTHER_SIZE, l2_errors, ctx->reg_int); - strncat(msg, other, L2C_MESSAGE_SIZE); + strlcat(msg, other, L2C_MESSAGE_SIZE); if (ctx->reg_int & mask_ue) edac_device_handle_ue(l2c->edac_dev, 0, 0, msg); -- 2.39.2