Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp2283003imc; Tue, 12 Mar 2019 10:32:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqzlfEgcrbLUegtHOKl0BCpEZeRzD/3wKfrU1iO1I14xkpI68ZIdpPm8dTBRvDyyG9pnOw+C X-Received: by 2002:a17:902:728a:: with SMTP id d10mr13687030pll.293.1552411947694; Tue, 12 Mar 2019 10:32:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552411947; cv=none; d=google.com; s=arc-20160816; b=dzShKEASGCtwEAhk2WBmjUk5QOgEdzBQfpxPmKMBHlJVQrLlbvc8voEnbyE6QpYyiT rW4xFLKWwYC1LdGbIX0+mfd+TrFQousslkNrlJXnxypdwh4lplosqx2DmW5HAXsPWTip SsWWXWpQYxb8yIIoT2xeScrnZwxLrES5lh23S+EKosR3NHUzubzQMJEwKJF7u8f/q/9s eDbiHYcf6ZbMWuKkWANUo2wYOpX+//r4A+rFTw4YJtuZbCF2vQ/em6fBtBfEn7wk2pye elrn3csXeAJcgpz8mtqtjeT5dUUW5DoEDdMOF7x93xcPEJ6AWr0piJiiF4v5Xuh6q9F9 Y/Cw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=S+gaaMETDq926xk/ED4ShwERwN9zTNeH+AGUxFSbfUs=; b=sxYrm+sKkBPYTJijQtGlDGdOaH5pzA1ObMYqfy9EZroG5SHeuHfwk3SsOg1pL0/ruM z6zeUtQkNmwYgkslG+rKximsNq9NHbO6RFJSli/CmANHegeRZuWjEY77A/DzH2E35DjV rOECYugJBZnWQxzeSWkIuQfdFXQsskkQh3K/xyRPLQXvMQyYTETfXG+Du5x2bEMoopa5 bdd033gFpcluCroXn0CcOx8KKoFzo5h+ynFN9aX/tifDloE+I3O6B/73dyayXmkMlRdA r32Y2KoxE5gMRLBLZDf/6wdrCzGd6S/JO8H8Us9Ij7GIANP7Xu0QiyUV1lMamucxE0ST Oh/w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Q7U7ATc5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r27si8089129pgl.316.2019.03.12.10.32.11; Tue, 12 Mar 2019 10:32:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=Q7U7ATc5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729173AbfCLR3w (ORCPT + 99 others); Tue, 12 Mar 2019 13:29:52 -0400 Received: from mail.kernel.org ([198.145.29.99]:32898 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729557AbfCLRRW (ORCPT ); Tue, 12 Mar 2019 13:17:22 -0400 Received: from localhost (unknown [104.133.8.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id BCF6521741; Tue, 12 Mar 2019 17:17:21 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1552411041; bh=iqZ9kfmD4a3nQPkkXW2HeSkEZb0fLWKVoSwyY0pxtDg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Q7U7ATc5Qnb5b1gcjOUCz252SOn6tacDj8x1PVy3ZZ97j3+kjiDqS6sSFzEBDz4eX WgXEmFVY4KNtYkBoUeiQQztXWtMqXA5WjnGaUbf5L6nuDdLAqoKRDFhJH8txg2c7QU eZ/3dL/OWUADuFzOIKpjElM68WCPE0nsfRFceYLw= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org Subject: [PATCH 4.9 05/96] ncpfs: fix build warning of strncpy Date: Tue, 12 Mar 2019 10:09:23 -0700 Message-Id: <20190312171034.966419467@linuxfoundation.org> X-Mailer: git-send-email 2.21.0 In-Reply-To: <20190312171034.530434962@linuxfoundation.org> References: <20190312171034.530434962@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Greg Kroah-Hartman Not upstream as ncpfs is long deleted. Fix up two strncpy build warnings in ncp_get_charsets() by using strscpy and the max size of the array. It's not like anyone uses this code anyway, and this gets rid of two build warnings so that we can see real warnings as they pop up over time. Signed-off-by: Greg Kroah-Hartman diff --git a/fs/ncpfs/ioctl.c b/fs/ncpfs/ioctl.c index 0a3f9b594602..37779ed3f790 100644 --- a/fs/ncpfs/ioctl.c +++ b/fs/ncpfs/ioctl.c @@ -233,7 +233,7 @@ ncp_get_charsets(struct ncp_server* server, struct ncp_nls_ioctl __user *arg) len = strlen(server->nls_vol->charset); if (len > NCP_IOCSNAME_LEN) len = NCP_IOCSNAME_LEN; - strncpy(user.codepage, server->nls_vol->charset, len); + strscpy(user.codepage, server->nls_vol->charset, NCP_IOCSNAME_LEN); user.codepage[len] = 0; } @@ -243,7 +243,7 @@ ncp_get_charsets(struct ncp_server* server, struct ncp_nls_ioctl __user *arg) len = strlen(server->nls_io->charset); if (len > NCP_IOCSNAME_LEN) len = NCP_IOCSNAME_LEN; - strncpy(user.iocharset, server->nls_io->charset, len); + strscpy(user.iocharset, server->nls_io->charset, NCP_IOCSNAME_LEN); user.iocharset[len] = 0; } mutex_unlock(&server->root_setup_lock);