Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp3536584rwi; Fri, 21 Oct 2022 18:27:55 -0700 (PDT) X-Google-Smtp-Source: AMsMyM6kgDqOpXQpZTVackUivlp1HBBm5OPKXAKSNB8w/d2z9QYC3lFL+8zaZ6DpB2zSdKgOGXGa X-Received: by 2002:a17:907:1b24:b0:76d:7b9d:2f8b with SMTP id mp36-20020a1709071b2400b0076d7b9d2f8bmr17160977ejc.414.1666402075018; Fri, 21 Oct 2022 18:27:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1666402075; cv=none; d=google.com; s=arc-20160816; b=cw+Qtd/G3rHy1kfipQEbTlla4bsqQ9Xi6R0F5vwPca3L2MWKOG2CQ8R4lUh/L4chkr GGpJZlfPAoodEdoNNpeDZ+q0eZlyRfR4mFypgd1rvcMzdjoKcirKEy4EGoJpfIeCeDow RWFHGLb0fu2bNRkuqQC0bYqAYrR+pKeoOEebtrfqodQx6NuZnve+MkBKxKLAVQWqwGms C+BRyDHVs0t9srcSpOA24kuH9BDTmHvWWkG+IFR9EKftFFtxQ9wR5TjtlDXIcemtXbLc NuYko3wbtsJ/550CVrMnFHeVDtvK17KrGoKejvdqV04IrnkSg/H18JpB4XDb3v3X7KTQ KHjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=tZefhSa6h6/2FyZRC24yBQDBKDQ8PvrvDoOubmvzYns=; b=nhubJy7WM0DMV4cAq5e34FuBkR7xRlKrHsBbaAg/PE7+NE4WzOF+bKToF8T2P6pbhW Gqn5mBrt5F790zUHLU1p/ZZxBhTfHugKYsrArNrbOVwcP85Brk4Tof7zqk+sPf8e7ssc 2pzBscO0CgxNAQLYrGj9U9MQ/f9vmQkehmpauLub8bqB+wbG2mwygknXjkil/xNY9R9h qur8BN4P5kyfsCtycweKljgSXyrAusD8SSXwPcBjQoSJj1GFmSgbAQ9C3IBFQpFx2RrW mXRglxwmy7+RP2OdyD4V/fbpHnRZbJMtmNKocaUVyK3W+WuUMNOsfAGQFbPNtTo7btHn es5g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id qk10-20020a1709077f8a00b0078d112eaf80si22487382ejc.86.2022.10.21.18.27.29; Fri, 21 Oct 2022 18:27:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-crypto-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-crypto-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229803AbiJVBXm (ORCPT + 99 others); Fri, 21 Oct 2022 21:23:42 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35494 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229608AbiJVBXj (ORCPT ); Fri, 21 Oct 2022 21:23:39 -0400 Received: from szxga03-in.huawei.com (szxga03-in.huawei.com [45.249.212.189]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 809152B2E3D; Fri, 21 Oct 2022 18:23:38 -0700 (PDT) Received: from dggpeml500026.china.huawei.com (unknown [172.30.72.53]) by szxga03-in.huawei.com (SkyGuard) with ESMTP id 4MvNnd2YPdzJn6v; Sat, 22 Oct 2022 09:20:53 +0800 (CST) Received: from dggpeml100012.china.huawei.com (7.185.36.121) by dggpeml500026.china.huawei.com (7.185.36.106) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Sat, 22 Oct 2022 09:23:35 +0800 Received: from huawei.com (10.67.165.24) by dggpeml100012.china.huawei.com (7.185.36.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Sat, 22 Oct 2022 09:23:35 +0800 From: Kai Ye To: CC: , , Subject: [PATCH v3 1/3] crypto: hisilicon/qm - increase the memory of local variables Date: Sat, 22 Oct 2022 01:17:44 +0000 Message-ID: <20221022011746.27197-2-yekai13@huawei.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20221022011746.27197-1-yekai13@huawei.com> References: <20221022011746.27197-1-yekai13@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.67.165.24] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To dggpeml100012.china.huawei.com (7.185.36.121) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-crypto@vger.kernel.org Increase the buffer to prevent stack overflow by fuzz test. The maximum length of the qos configuration buffer is 256 bytes. Currently, the value of the 'val buffer' is only 32 bytes. The sscanf does not check the dest memory length. So the 'val buffer' may stack overflow. Signed-off-by: Kai Ye --- drivers/crypto/hisilicon/qm.c | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/drivers/crypto/hisilicon/qm.c b/drivers/crypto/hisilicon/qm.c index e3edb176d976..5d79e9f0e7e1 100644 --- a/drivers/crypto/hisilicon/qm.c +++ b/drivers/crypto/hisilicon/qm.c @@ -250,7 +250,6 @@ #define QM_QOS_MIN_CIR_B 100 #define QM_QOS_MAX_CIR_U 6 #define QM_QOS_MAX_CIR_S 11 -#define QM_QOS_VAL_MAX_LEN 32 #define QM_DFX_BASE 0x0100000 #define QM_DFX_STATE1 0x0104000 #define QM_DFX_STATE2 0x01040C8 @@ -4612,7 +4611,7 @@ static ssize_t qm_get_qos_value(struct hisi_qm *qm, const char *buf, unsigned int *fun_index) { char tbuf_bdf[QM_DBG_READ_LEN] = {0}; - char val_buf[QM_QOS_VAL_MAX_LEN] = {0}; + char val_buf[QM_DBG_READ_LEN] = {0}; u32 tmp1, device, function; int ret, bus; -- 2.17.1