mirror_zfs/module/icp/algs
Richard Yao 303678350a
Convert some sprintf() calls to kmem_scnprintf()
These `sprintf()` calls are used repeatedly to write to a buffer. There
is no protection against overflow other than reviewers explicitly
checking to see if the buffers are big enough. However, such issues are
easily missed during review and when they are missed, we would rather
stop printing rather than have a buffer overflow, so we convert these
functions to use `kmem_scnprintf()`. The Linux kernel provides an entire
page for module parameters, so we are safe to write up to PAGE_SIZE.

Removing `sprintf()` from these functions removes the last instances of
`sprintf()` usage in our platform-independent kernel code. This improves
XNU kernel compatibility because the XNU kernel does not support
(removed support for?) `sprintf()`.

Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov>
Reviewed-by: Jorgen Lundman <lundman@lundman.net>
Signed-off-by: Richard Yao <richard.yao@alumni.stonybrook.edu>
Closes #14209
2022-11-28 13:49:58 -08:00
..
aes Convert some sprintf() calls to kmem_scnprintf() 2022-11-28 13:49:58 -08:00
blake3 Convert some sprintf() calls to kmem_scnprintf() 2022-11-28 13:49:58 -08:00
edonr Fix -Wattribute-warning in edonr 2022-06-27 14:19:04 -07:00
modes Convert some sprintf() calls to kmem_scnprintf() 2022-11-28 13:49:58 -08:00
sha2 Remove bcopy(), bzero(), bcmp() 2022-03-15 15:13:42 -07:00
skein Forbid b{copy,zero,cmp}(). Don't include <strings.h> for <string.h> 2022-03-15 15:13:48 -07:00