drivers/net/wireless/marvell/mwifiex/pcie.c | 40 ++++++++++++++------- 1 file changed, 28 insertions(+), 12 deletions(-)
strcpy() is deprecated for NUL-terminated strings because it may overflow
the destination buffer and does not guarantee termination. strscpy()
avoids these issues.
adapter->fw_name is a fixed-size char array (64 bytes). All source
strings copied here are bounded literals or validated inputs, so no
return-value handling is required.
Signed-off-by: Miguel García <miguelgarciaroman8@gmail.com>
---
drivers/net/wireless/marvell/mwifiex/pcie.c | 40 ++++++++++++++-------
1 file changed, 28 insertions(+), 12 deletions(-)
diff --git a/drivers/net/wireless/marvell/mwifiex/pcie.c b/drivers/net/wireless/marvell/mwifiex/pcie.c
index a760de191fce..2aad9ab210e0 100644
--- a/drivers/net/wireless/marvell/mwifiex/pcie.c
+++ b/drivers/net/wireless/marvell/mwifiex/pcie.c
@@ -3098,9 +3098,8 @@ static int mwifiex_pcie_request_irq(struct mwifiex_adapter *adapter)
}
/*
- * This function gets the firmware name for downloading by revision id
- *
- * Read revision id register to get revision id
+ * Get firmware name for download by revision id
+ * Uses strscpy() to ensure NUL-termination and avoid overflow.
*/
static void mwifiex_pcie_get_fw_name(struct mwifiex_adapter *adapter)
{
@@ -3110,39 +3109,56 @@ static void mwifiex_pcie_get_fw_name(struct mwifiex_adapter *adapter)
switch (card->dev->device) {
case PCIE_DEVICE_ID_MARVELL_88W8766P:
- strcpy(adapter->fw_name, PCIE8766_DEFAULT_FW_NAME);
+ strscpy(adapter->fw_name,
+ PCIE8766_DEFAULT_FW_NAME,
+ sizeof(adapter->fw_name));
break;
+
case PCIE_DEVICE_ID_MARVELL_88W8897:
mwifiex_write_reg(adapter, 0x0c58, 0x80c00000);
mwifiex_read_reg(adapter, 0x0c58, &revision_id);
revision_id &= 0xff00;
+
switch (revision_id) {
case PCIE8897_A0:
- strcpy(adapter->fw_name, PCIE8897_A0_FW_NAME);
+ strscpy(adapter->fw_name,
+ PCIE8897_A0_FW_NAME,
+ sizeof(adapter->fw_name));
break;
case PCIE8897_B0:
- strcpy(adapter->fw_name, PCIE8897_B0_FW_NAME);
+ strscpy(adapter->fw_name,
+ PCIE8897_B0_FW_NAME,
+ sizeof(adapter->fw_name));
break;
default:
- strcpy(adapter->fw_name, PCIE8897_DEFAULT_FW_NAME);
-
+ strscpy(adapter->fw_name,
+ PCIE8897_DEFAULT_FW_NAME,
+ sizeof(adapter->fw_name));
break;
}
break;
+
case PCIE_DEVICE_ID_MARVELL_88W8997:
mwifiex_read_reg(adapter, 0x8, &revision_id);
mwifiex_read_reg(adapter, 0x0cd0, &version);
mwifiex_read_reg(adapter, 0x0cd4, &magic);
+
revision_id &= 0xff;
- version &= 0x7;
- magic &= 0xff;
+ version &= 0x7;
+ magic &= 0xff;
+
if (revision_id == PCIE8997_A1 &&
magic == CHIP_MAGIC_VALUE &&
version == CHIP_VER_PCIEUART)
- strcpy(adapter->fw_name, PCIEUART8997_FW_NAME_V4);
+ strscpy(adapter->fw_name,
+ PCIEUART8997_FW_NAME_V4,
+ sizeof(adapter->fw_name));
else
- strcpy(adapter->fw_name, PCIEUSB8997_FW_NAME_V4);
+ strscpy(adapter->fw_name,
+ PCIEUSB8997_FW_NAME_V4,
+ sizeof(adapter->fw_name));
break;
+
default:
break;
}
--
2.34.1
Hi Miguel,
On Sat, Jul 05, 2025 at 03:36:00PM +0200, Miguel García wrote:
> strcpy() is deprecated for NUL-terminated strings because it may overflow
> the destination buffer and does not guarantee termination. strscpy()
> avoids these issues.
>
> adapter->fw_name is a fixed-size char array (64 bytes). All source
It's actually 32 bytes. Not sure where 64 came from.
> strings copied here are bounded literals or validated inputs, so no
> return-value handling is required.
>
> Signed-off-by: Miguel García <miguelgarciaroman8@gmail.com>
> ---
> drivers/net/wireless/marvell/mwifiex/pcie.c | 40 ++++++++++++++-------
> 1 file changed, 28 insertions(+), 12 deletions(-)
>
> diff --git a/drivers/net/wireless/marvell/mwifiex/pcie.c b/drivers/net/wireless/marvell/mwifiex/pcie.c
> index a760de191fce..2aad9ab210e0 100644
> --- a/drivers/net/wireless/marvell/mwifiex/pcie.c
> +++ b/drivers/net/wireless/marvell/mwifiex/pcie.c
> @@ -3098,9 +3098,8 @@ static int mwifiex_pcie_request_irq(struct mwifiex_adapter *adapter)
> }
>
> /*
> - * This function gets the firmware name for downloading by revision id
> - *
> - * Read revision id register to get revision id
> + * Get firmware name for download by revision id
> + * Uses strscpy() to ensure NUL-termination and avoid overflow.
The original comments are strange here (as are many of the comments in
this driver), so you probably have a good idea to tweak them. But IMO,
their main problem is that they repeat themselves, and don't really add
much value over simply having well-named functions. And particularly, we
don't need to write out full sentences to describe every step that we
do.
So, please drop the "Use strscpy() [...]" sentence. It doesn't need to
be here. If it's not obvious what str*() APIs are doing, then we have
bigger problems.
This seems fine:
/*
* Get firmware name for download by revision ID
*/
> */
> static void mwifiex_pcie_get_fw_name(struct mwifiex_adapter *adapter)
> {
> @@ -3110,39 +3109,56 @@ static void mwifiex_pcie_get_fw_name(struct mwifiex_adapter *adapter)
...
> case PCIE_DEVICE_ID_MARVELL_88W8997:
> mwifiex_read_reg(adapter, 0x8, &revision_id);
> mwifiex_read_reg(adapter, 0x0cd0, &version);
> mwifiex_read_reg(adapter, 0x0cd4, &magic);
> +
> revision_id &= 0xff;
> - version &= 0x7;
> - magic &= 0xff;
> + version &= 0x7;
> + magic &= 0xff;
Don't make arbitrary whitespace changes. The whitespace was fine as-is.
Thanks,
Brian
> +
> if (revision_id == PCIE8997_A1 &&
> magic == CHIP_MAGIC_VALUE &&
> version == CHIP_VER_PCIEUART)
> - strcpy(adapter->fw_name, PCIEUART8997_FW_NAME_V4);
> + strscpy(adapter->fw_name,
> + PCIEUART8997_FW_NAME_V4,
> + sizeof(adapter->fw_name));
> else
> - strcpy(adapter->fw_name, PCIEUSB8997_FW_NAME_V4);
> + strscpy(adapter->fw_name,
> + PCIEUSB8997_FW_NAME_V4,
> + sizeof(adapter->fw_name));
> break;
> +
> default:
> break;
> }
> --
> 2.34.1
>
Please use the correct "wifi: " prefix for all your patches. And I'm not sure how you arrived at the CC list, but it seems excessive, for a trivial cleanup in particular. johannes
On Sat, Jul 05, 2025 at 03:36:00 PM +0200, Miguel García wrote: > strcpy() is deprecated for NUL-terminated strings because it may overflow > the destination buffer and does not guarantee termination. strscpy() > avoids these issues. > > adapter->fw_name is a fixed-size char array (64 bytes). All source > strings copied here are bounded literals or validated inputs, so no > return-value handling is required. > > Signed-off-by: Miguel García <miguelgarciaroman8@gmail.com> Reviewed-by: Jeff Chen <jeff.chen_1@nxp.con>
© 2016 - 2026 Red Hat, Inc.