Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp3959403imm; Mon, 8 Oct 2018 12:20:07 -0700 (PDT) X-Google-Smtp-Source: ACcGV63b7wDkDpttqAeQOIfeggcTxzbTJ+qgXoizDyCq0JbprE6l6tdv5hF15SaK4H7HYjzW1h9M X-Received: by 2002:a17:902:6a8b:: with SMTP id n11-v6mr24800384plk.16.1539026407841; Mon, 08 Oct 2018 12:20:07 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539026407; cv=none; d=google.com; s=arc-20160816; b=ZyHFKuv4Xagud3YXiEIlHdcCnGXEJRkOoyI5H6lxplTR+HbB29GhJrTY5WgtQ41yTt LphXlLrdcBn+bUL0iX8Z8FI2MFEzMXc36Ji4LI5RpC8LErE/9DGpeNc+sLtzV/Trmekt 85TdYoRx2T8jyUdQpkGNusJavlMj/NXwKVFxroYBRJN2En7jeUu7Y9JFFUosro9HSeui jtOJ4RlYdlkaDkvwLhQo1yDZuCKjNSFmbwv45IgX/SUhNPp0qWmJNfLJfav1u/6cgxFw V89CMlx5zC2r49OwODxQlNOGQ6RcNOeeucvy0qLRavCrehD0skhawklbF0Km6pjqzrej UYqQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=u2nI3y6f0NROc7K8U6i1BZiwlVryy77CV7xxVfYt8Q0=; b=vynQF7PbVg4BJHuAgeb45Tex99jNcf0suudRE2BqT4U2TLifo7bUpQ23z5kORqeGbN c5C3+wtVrQeRjN0wN81OkSbpdg22grD5wACM7QUxwBeNFK+orJWu+UjAnHGTPYcRcPtf n2yZSnUs4Fu53LLKqN+qL09zwF7+wVfHwC7Ap95XpP9uWK2RxdPLcHyYpITsMG8Bs+xP qzeSl49/S0XX07IZTBJEVVerpB3Q2jVmNc3dDu986U9aaQeLl/wuglTo+ny1hyCarcsB xpeS1vhHNCCQZDWz0Rb32lNmcFJHNf9fP6G3rvofYDpxbHi69Duv+HFUlXeJskR9gMQy Fm5g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NfbBNbTV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w18-v6si19021538plq.104.2018.10.08.12.19.52; Mon, 08 Oct 2018 12:20:07 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=NfbBNbTV; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727758AbeJIBrZ (ORCPT + 99 others); Mon, 8 Oct 2018 21:47:25 -0400 Received: from mail.kernel.org ([198.145.29.99]:58534 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726427AbeJIBrY (ORCPT ); Mon, 8 Oct 2018 21:47:24 -0400 Received: from localhost (ip-213-127-77-176.ip.prioritytelecom.net [213.127.77.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 70F072089D; Mon, 8 Oct 2018 18:34:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1539023662; bh=UBPI6s8LG7vK85asKoTUiY5qt0GvWGZ5vni8CE3P/qE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=NfbBNbTVhO7DCpdR9Q2rtkYowzwHmegqqIEB3x5vC6Zm+1blea5kTLjiYRzkoo+l/ MsNHTCAKiuYaqoTK50fau6rkbWoS6idJfkseassbWBtdd1xL1vQPluwDzIWrjdYfpx 47zHZ6eyu3T4yU9j3oANa3QUPBUKSVaulsqfxM+Q= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Heiko Carstens , Vasily Gorbik , Martin Schwidefsky , Sasha Levin Subject: [PATCH 4.4 023/113] s390/extmem: fix gcc 8 stringop-overflow warning Date: Mon, 8 Oct 2018 20:30:24 +0200 Message-Id: <20181008175531.962429893@linuxfoundation.org> X-Mailer: git-send-email 2.19.0 In-Reply-To: <20181008175530.864641368@linuxfoundation.org> References: <20181008175530.864641368@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Vasily Gorbik [ Upstream commit 6b2ddf33baec23dace85bd647e3fc4ac070963e8 ] arch/s390/mm/extmem.c: In function '__segment_load': arch/s390/mm/extmem.c:436:2: warning: 'strncat' specified bound 7 equals source length [-Wstringop-overflow=] strncat(seg->res_name, " (DCSS)", 7); What gcc complains about here is the misuse of strncat function, which in this case does not limit a number of bytes taken from "src", so it is in the end the same as strcat(seg->res_name, " (DCSS)"); Keeping in mind that a res_name is 15 bytes, strncat in this case would overflow the buffer and write 0 into alignment byte between the fields in the struct. To avoid that increasing res_name size to 16, and reusing strlcat. Reviewed-by: Heiko Carstens Signed-off-by: Vasily Gorbik Signed-off-by: Martin Schwidefsky Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- arch/s390/mm/extmem.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/arch/s390/mm/extmem.c +++ b/arch/s390/mm/extmem.c @@ -79,7 +79,7 @@ struct qin64 { struct dcss_segment { struct list_head list; char dcss_name[8]; - char res_name[15]; + char res_name[16]; unsigned long start_addr; unsigned long end; atomic_t ref_count; @@ -434,7 +434,7 @@ __segment_load (char *name, int do_nonsh memcpy(&seg->res_name, seg->dcss_name, 8); EBCASC(seg->res_name, 8); seg->res_name[8] = '\0'; - strncat(seg->res_name, " (DCSS)", 7); + strlcat(seg->res_name, " (DCSS)", sizeof(seg->res_name)); seg->res->name = seg->res_name; rc = seg->vm_segtype; if (rc == SEG_TYPE_SC ||