scsi: ibmvscsi: Avoid multi-field memset() overflow by aiming at srp
authorKees Cook <keescook@chromium.org>
Mon, 21 Jun 2021 19:07:10 +0000 (12:07 -0700)
committerKees Cook <keescook@chromium.org>
Sat, 25 Sep 2021 15:20:47 +0000 (08:20 -0700)
In preparation for FORTIFY_SOURCE performing compile-time and run-time
field bounds checking for memset(), avoid intentionally writing across
neighboring fields.

Instead of writing beyond the end of evt_struct->iu.srp.cmd, target the
upper union (evt_struct->iu.srp) instead, as that's what is being wiped.

Cc: Tyrel Datwyler <tyreld@linux.ibm.com>
Cc: Michael Ellerman <mpe@ellerman.id.au>
Cc: Benjamin Herrenschmidt <benh@kernel.crashing.org>
Cc: Paul Mackerras <paulus@samba.org>
Cc: "James E.J. Bottomley" <jejb@linux.ibm.com>
Cc: "Martin K. Petersen" <martin.petersen@oracle.com>
Cc: linux-scsi@vger.kernel.org
Cc: linuxppc-dev@lists.ozlabs.org
Signed-off-by: Kees Cook <keescook@chromium.org>
Acked-by: Martin K. Petersen <martin.petersen@oracle.com>
Link: https://lore.kernel.org/lkml/yq135rzp79c.fsf@ca-mkp.ca.oracle.com
Acked-by: Tyrel Datwyler <tyreld@linux.ibm.com>
Link: https://lore.kernel.org/lkml/6eae8434-e9a7-aa74-628b-b515b3695359@linux.ibm.com
drivers/scsi/ibmvscsi/ibmvscsi.c

index 50df7dd9cb9185aafb161886db0ec02a485aaba0..ea8e01f49cba12ed2589685f14003bd18b6baf5f 100644 (file)
@@ -1055,8 +1055,9 @@ static int ibmvscsi_queuecommand_lck(struct scsi_cmnd *cmnd,
                return SCSI_MLQUEUE_HOST_BUSY;
 
        /* Set up the actual SRP IU */
+       BUILD_BUG_ON(sizeof(evt_struct->iu.srp) != SRP_MAX_IU_LEN);
+       memset(&evt_struct->iu.srp, 0x00, sizeof(evt_struct->iu.srp));
        srp_cmd = &evt_struct->iu.srp.cmd;
-       memset(srp_cmd, 0x00, SRP_MAX_IU_LEN);
        srp_cmd->opcode = SRP_CMD;
        memcpy(srp_cmd->cdb, cmnd->cmnd, sizeof(srp_cmd->cdb));
        int_to_scsilun(lun, &srp_cmd->lun);