Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp2000985imu; Fri, 14 Dec 2018 04:18:37 -0800 (PST) X-Google-Smtp-Source: AFSGD/VtGhb7uhWQ4+0PYYEkdscKQ9Ya3XxmE30oKG5LsXvbR3nbI+6CZ/OmXo3RyKRFliG7uMey X-Received: by 2002:a17:902:5a4d:: with SMTP id f13mr2752467plm.49.1544789917492; Fri, 14 Dec 2018 04:18:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544789917; cv=none; d=google.com; s=arc-20160816; b=SNaTw2Skz/TGKq4F2EGF3tvJvLbbfe4j1rJWN2XT1VuSk+XIr7xSUV0Pi2FYV9sjHL Hi8Q7hU/cEpfxZjMZ3PsXBdQfeQh774UvBE0ZqjHhEC500Keyqdbf6KAC0wy6RtlVOwF shIvCC6xYqjQSt4T6UmcF/7XudqiUCYn5IUuyP3nG4V8UxNMGHj8/nMAlc4eCdHZ3jF4 C72g4hiL6KXtNgCU0m1pLh0pHnbUIaf6A18jcqboJfxuB7JG9MC/hgjFi2W8BZCVbI+s ssQtYsxKlaumRi8ybudo1k/QLWuF/itXoafUWyihKvR3syCa+SKP6W9GReT/YNFxNFE5 btwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=n4oP1DXy1AB/HLWxHSTcP8Eu4ZvIF8wkFFfep5+oSQw=; b=mfW+ku+MfKYUCIHsUW1T+f/hQw60cDMes2KqvyjeWrhXvrfPLuM0omYF9F/OlfjRuU /84zLrnHBBBMT4dWjUASBrWSh26PtdlBqrj1zYRKU5zT2Goitb3QMUgZ5jg/nUNNyapv UcMSWFhCmVVi1IdYYy5WhsX25S3p/nf9vBpOzP7aFiO+nGqv8iSIUvlDb0uid6Jolryg 5uXFsEE4b9L4r5/XMv0ZYCQvns82khQ4PC/KfYNbr0MGyE/yGJdn4qTAH7VwrvgKHgqg e4BygLo06Fx9v3viTfFeLPjQVpc+mdqk/s0UMl4/dESCNKweH8Lu/jYcGdW91rwr+G+5 1kcA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="A7ZuOH/8"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id a2si3914158pgd.461.2018.12.14.04.18.22; Fri, 14 Dec 2018 04:18:37 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="A7ZuOH/8"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732460AbeLNMRd (ORCPT + 99 others); Fri, 14 Dec 2018 07:17:33 -0500 Received: from mail.kernel.org ([198.145.29.99]:37548 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1732045AbeLNMRN (ORCPT ); Fri, 14 Dec 2018 07:17:13 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id E37362148E; Fri, 14 Dec 2018 12:17:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1544789832; bh=SdV9NNZS/m+XbuYDw5ETSaaa7EmM82UzFlVTH+NeHns=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=A7ZuOH/8aLMHvVaRo7NuQLaY3akmzNBiJb7BNFn4+w+wh6f4vkHJ+Spdazo5FOC7q tgza184V9UgOq5HKUlUbpC4QuAvauJlh7EUQfy89XdjKlE3tjcCkXd/1er8XXDq8cV +wgj11gRvWfqwQ1x+IZarM9NiT8/ESrnRs7dxnMs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Guenter Roeck , Samuel Thibault Subject: [PATCH 4.4 86/88] staging: speakup: Replace strncpy with memcpy Date: Fri, 14 Dec 2018 13:01:00 +0100 Message-Id: <20181214115709.412770798@linuxfoundation.org> X-Mailer: git-send-email 2.20.0 In-Reply-To: <20181214115702.151309521@linuxfoundation.org> References: <20181214115702.151309521@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.4-stable review patch. If anyone has any objections, please let me know. ------------------ From: Guenter Roeck commit fd29edc7232bc19f969e8f463138afc5472b3d5f upstream. gcc 8.1.0 generates the following warnings. drivers/staging/speakup/kobjects.c: In function 'punc_store': drivers/staging/speakup/kobjects.c:522:2: warning: 'strncpy' output truncated before terminating nul copying as many bytes from a string as its length drivers/staging/speakup/kobjects.c:504:6: note: length computed here drivers/staging/speakup/kobjects.c: In function 'synth_store': drivers/staging/speakup/kobjects.c:391:2: warning: 'strncpy' output truncated before terminating nul copying as many bytes from a string as its length drivers/staging/speakup/kobjects.c:388:8: note: length computed here Using strncpy() is indeed less than perfect since the length of data to be copied has already been determined with strlen(). Replace strncpy() with memcpy() to address the warning and optimize the code a little. Signed-off-by: Guenter Roeck Reviewed-by: Samuel Thibault Signed-off-by: Greg Kroah-Hartman Signed-off-by: Greg Kroah-Hartman --- drivers/staging/speakup/kobjects.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/drivers/staging/speakup/kobjects.c +++ b/drivers/staging/speakup/kobjects.c @@ -387,7 +387,7 @@ static ssize_t synth_store(struct kobjec len = strlen(buf); if (len < 2 || len > 9) return -EINVAL; - strncpy(new_synth_name, buf, len); + memcpy(new_synth_name, buf, len); if (new_synth_name[len - 1] == '\n') len--; new_synth_name[len] = '\0'; @@ -514,7 +514,7 @@ static ssize_t punc_store(struct kobject return -EINVAL; } - strncpy(punc_buf, buf, x); + memcpy(punc_buf, buf, x); while (x && punc_buf[x - 1] == '\n') x--;