Received: by 2002:a17:90a:1609:0:0:0:0 with SMTP id n9csp845522pja; Wed, 1 Apr 2020 09:44:29 -0700 (PDT) X-Google-Smtp-Source: ADFU+vuVcRJBPjGkAdWpFO6jbTaBovSSQrlJ7G0wuXDj0b4eNzzqwYuz8mZUUQiVMv0fV+vXIrWZ X-Received: by 2002:a9d:6c4c:: with SMTP id g12mr16474254otq.351.1585759469015; Wed, 01 Apr 2020 09:44:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585759469; cv=none; d=google.com; s=arc-20160816; b=a6CVjvsJVHCXAwGeBCAAwBsIcYy7YUhofgix5m+92kNnlAfcHpSng7OxqHnyhRuTD9 Jeg9hft3Br+bcGstlK3rPPfnHC691NDZmCfaApWQJeMmbQLGM8q3JF1tBQYnNnYVGSwu R1pdi1Gv8sqVbx5OJYT7cZYJt916XL8wbIIF/A+tLrpaHRua05ygw4H2hF8PP+nTconz Jfkzs2oVk6UGiiMWQkmxQG76I8HQLvrxvCyjrwKdV20KDlFn50RM50uUATyAGf9eLw5f AEoB7XQ1Tyf64j3Aj1t4OGg5xT/jxpjg+E/6HxGRuBYIAgfjAMxo9eAtOmqQajlj6RA0 YuTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=S+J16o789MeZDr9IsksO8Pl+i6EmnSlPYnL7eUWNXC4=; b=wrmZvcQ/SPb9Gkimhk8tQPJ9+F+BkySREnFLpCukfb4Li/Q489vKp7jeny69hLSUus Ln16L19qwWu3f3pdK6d/GqdAzpcIz9loTXvJ3bHLBVSctnJJE6YLTrP58TAF9OeugFXW fKQloU8kpRnfP8BdT4g5Lxm2RuUEkP4M694SouLIs/Ebv8qAQUvhaXfzCzBjG2tFxOB3 TlKCzq0PrfsmHWVanYFkNCghshjbHJ6HqeXGe6Y1hYDbPIwT/eBc55OxBFZDa7UdU7St Uk54xEBPHxHyibzQA8rYw1BIA67m+QRs3FEZMQ8qtTviS9sqecGKq4ZoK7EljswCEUHF akrQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YgC5V01o; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id u135si1036056oif.248.2020.04.01.09.44.16; Wed, 01 Apr 2020 09:44:29 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YgC5V01o; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389381AbgDAQmf (ORCPT + 99 others); Wed, 1 Apr 2020 12:42:35 -0400 Received: from mail.kernel.org ([198.145.29.99]:43148 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388970AbgDAQmd (ORCPT ); Wed, 1 Apr 2020 12:42:33 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 2AF3320658; Wed, 1 Apr 2020 16:42:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1585759352; bh=0G8P3DF8fKF5Qx0/mGMaQWMIsrrbrBX05uMTHgQb3/Y=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=YgC5V01o7dA5DSLKbnff9nJkQY7GZ8+n4cH5YPponGHDsARG1A4rsjhoyCD9D95mM O8052qvfCDL6dZQvZj3GgC3me83umfcy9/2Rp6kGdnf28DFHybHF8wmkZJhsqBCMlv zVmvTM2VWf9TGxhlhhTv8jBFc5gsWw7NVrZUBmF0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold Subject: [PATCH 4.14 053/148] staging: greybus: loopback_test: fix potential path truncation Date: Wed, 1 Apr 2020 18:17:25 +0200 Message-Id: <20200401161558.110327495@linuxfoundation.org> X-Mailer: git-send-email 2.26.0 In-Reply-To: <20200401161552.245876366@linuxfoundation.org> References: <20200401161552.245876366@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit f16023834863932f95dfad13fac3fc47f77d2f29 upstream. Newer GCC warns about a possible truncation of a generated sysfs path name as we're concatenating a directory path with a file name and placing the result in a buffer that is half the size of the maximum length of the directory path (which is user controlled). loopback_test.c: In function 'open_poll_files': loopback_test.c:651:31: warning: '%s' directive output may be truncated writing up to 511 bytes into a region of size 255 [-Wformat-truncation=] 651 | snprintf(buf, sizeof(buf), "%s%s", dev->sysfs_entry, "iteration_count"); | ^~ loopback_test.c:651:3: note: 'snprintf' output between 16 and 527 bytes into a destination of size 255 651 | snprintf(buf, sizeof(buf), "%s%s", dev->sysfs_entry, "iteration_count"); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Fix this by making sure the buffer is large enough the concatenated strings. Fixes: 6b0658f68786 ("greybus: tools: Add tools directory to greybus repo and add loopback") Fixes: 9250c0ee2626 ("greybus: Loopback_test: use poll instead of inotify") Signed-off-by: Johan Hovold Link: https://lore.kernel.org/r/20200312110151.22028-3-johan@kernel.org Signed-off-by: Greg Kroah-Hartman --- drivers/staging/greybus/tools/loopback_test.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/staging/greybus/tools/loopback_test.c +++ b/drivers/staging/greybus/tools/loopback_test.c @@ -644,7 +644,7 @@ baddir: static int open_poll_files(struct loopback_test *t) { struct loopback_device *dev; - char buf[MAX_STR_LEN]; + char buf[MAX_SYSFS_PATH + MAX_STR_LEN]; char dummy; int fds_idx = 0; int i;