Received: by 2002:a17:90a:1609:0:0:0:0 with SMTP id n9csp853845pja; Wed, 1 Apr 2020 09:53:09 -0700 (PDT) X-Google-Smtp-Source: APiQypKnRd3/mXdcPAVd9tw5og089Rnk7r0QNQvVf46N3L1qSU9iNgMMwc2G8xF+4e5tJh2NRI3u X-Received: by 2002:aca:4142:: with SMTP id o63mr3384935oia.118.1585759989005; Wed, 01 Apr 2020 09:53:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585759988; cv=none; d=google.com; s=arc-20160816; b=wYPNVoXR+Kq/PJ9tQMDbtIUsIThnCfYiJshkJwOocqxs89arsXa0L0/yCsMqdSb4vi ur6PkkRHq3XXrnwGaj3SzsL2K3TMg347bg8tj53JDDRvBQlA3nBFVjcIOwWobrqvuSg6 hakvJNwjrlQpQ9RTo1LjBkpZGCWV1VQwpfA1cWEoIW++JukKVoVrZ1EsN4+FvH7Q8cNS CBp1f6ReMX7pz9KMXEWfsiZjjJM8bf+uYwUCyYRmtQpj/dzwVhgUSEqEAImkqdiZweNd 6cLry1ZnQgVcZwPmja5J3i/eGL2D3xgVvu6l20ppHzPitCwButTKB4Skl7HwF/yaTsOh pJIg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=dMqqnUCGU1+ZzE6mtER0jiNQTLx5EEdDJT3h+iZeMgo=; b=MdiK2o3rbXDGGt3JiBZwkZrN5vXrgPY2s0AiUWnb8sC8ZOwD9J8CX6uwE8zMoJJ98W olj5a58KXg6fTOVCk4uM2s7Pq5OJGlk8qTfc2YhU+zFb3uqwsUs3K1q7OLZi8vhjF6ML DmBWaJ7Fsne0/dnVsfF0DBbXVciJRvGCxEB75PXj4h966aW4Rb6tBIhelWznXqE13rwQ UJQ2aV6sfCfk4Xb/RZQ+OVwCPDbJC5/OI9WTqYm5hCFfOwHE/rQkkgvjEXhJjN2lJMWy YbA8piPKGlQWvxWcl7KaTEe3gt8Fqnl+Xc4o7vNOVWMrRzhPxJDwApKHFHNt0h+ddu2M gcNA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=t1HitwYa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w14si237676otl.175.2020.04.01.09.52.55; Wed, 01 Apr 2020 09:53:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=t1HitwYa; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388606AbgDAQgd (ORCPT + 99 others); Wed, 1 Apr 2020 12:36:33 -0400 Received: from mail.kernel.org ([198.145.29.99]:35128 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2388828AbgDAQgP (ORCPT ); Wed, 1 Apr 2020 12:36:15 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id DB6E3214DB; Wed, 1 Apr 2020 16:36:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1585758974; bh=0N+pkXtrzINXlBCXI3xKrfyPFVkEbV8bMiRWKBm2uaI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=t1HitwYaJezDkpEP2do2oqtqnB95iD0WGsarM30NmN6Gx7DiekVMydvH1x1olWfiG tI5CGfltcuNO+R4SbHt6dtsXstnP6iTOuTTjkDrekASnc+JilXGauULQZHL2t04mCb oiLYxMEzRjLD+johDKpaLlro+DqvXSHpA+rQ4dFY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Johan Hovold Subject: [PATCH 4.9 035/102] staging: greybus: loopback_test: fix potential path truncation Date: Wed, 1 Apr 2020 18:17:38 +0200 Message-Id: <20200401161539.367115980@linuxfoundation.org> X-Mailer: git-send-email 2.26.0 In-Reply-To: <20200401161530.451355388@linuxfoundation.org> References: <20200401161530.451355388@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Johan Hovold commit f16023834863932f95dfad13fac3fc47f77d2f29 upstream. Newer GCC warns about a possible truncation of a generated sysfs path name as we're concatenating a directory path with a file name and placing the result in a buffer that is half the size of the maximum length of the directory path (which is user controlled). loopback_test.c: In function 'open_poll_files': loopback_test.c:651:31: warning: '%s' directive output may be truncated writing up to 511 bytes into a region of size 255 [-Wformat-truncation=] 651 | snprintf(buf, sizeof(buf), "%s%s", dev->sysfs_entry, "iteration_count"); | ^~ loopback_test.c:651:3: note: 'snprintf' output between 16 and 527 bytes into a destination of size 255 651 | snprintf(buf, sizeof(buf), "%s%s", dev->sysfs_entry, "iteration_count"); | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Fix this by making sure the buffer is large enough the concatenated strings. Fixes: 6b0658f68786 ("greybus: tools: Add tools directory to greybus repo and add loopback") Fixes: 9250c0ee2626 ("greybus: Loopback_test: use poll instead of inotify") Signed-off-by: Johan Hovold Link: https://lore.kernel.org/r/20200312110151.22028-3-johan@kernel.org Signed-off-by: Greg Kroah-Hartman --- drivers/staging/greybus/tools/loopback_test.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) --- a/drivers/staging/greybus/tools/loopback_test.c +++ b/drivers/staging/greybus/tools/loopback_test.c @@ -646,7 +646,7 @@ baddir: static int open_poll_files(struct loopback_test *t) { struct loopback_device *dev; - char buf[MAX_STR_LEN]; + char buf[MAX_SYSFS_PATH + MAX_STR_LEN]; char dummy; int fds_idx = 0; int i;