Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp4456782ybz; Tue, 28 Apr 2020 11:36:29 -0700 (PDT) X-Google-Smtp-Source: APiQypJM1dpIEVuw1pCQy4pGcq/UvpbXqNRgqvL4tWG/SPO4yPG8HUfsYaZjm6NfYAGOiRGhTswf X-Received: by 2002:aa7:df8d:: with SMTP id b13mr19058738edy.145.1588098989279; Tue, 28 Apr 2020 11:36:29 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588098989; cv=none; d=google.com; s=arc-20160816; b=ivED04fooXG4neiSuG9hVEoUWFS/xZKXOKo8S4c/L11v+qHYpbpnmm/PP1FwWUlxBk qogokb2VmoB4cWkZPKSABCetKQNXHQ4cBoyw6KTzcqK21xXkRbMY/XWn/1+zU67G7ITU YBN7lpdBhDQBWinwDG4T4wa/AzJgF0n+R/Ylsdb+sZ8Y57lc05frcnMsdFvGin/j+fLl UxreL0+QkeGSTj6gZ5H3CxPy3GlcHYSkWZj0Ar/cKVI4k/5kS9nPe0fhMy66a/BIdPds 6CgCXRUKR8EMylFiW2hJz9+lObM2lTiLUlRBUrSrnjPjW8+EVXowK2oS7E/zpoAFZ6EG KAGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ECGpErzcJbqfPX29oJYG+PODruYSIW8/0Ndr1ZPKAJE=; b=EeVSVghBVFMpdnbW+ejVutUoEGTiQ2dWo2UWHn1qCE+YfzcGPvWSiFu9uviTtUzQvP 4U47N+NUFiaw36LcuRsclLji5mjkCSyx81oBdEEhP+37QXRlQli2n1KpH897XaREx9fm 0/yGJWmWcGeCP3kGVB3Vrk/5bJCxKkWHVoNDpKPsoVpSsuzLqD/s/iKUSdVJpAXrjmcf lIYxWaIvpy0bDJikIIefhgtDUf6gFrK+VcRVY5Uxn43mNPLZPTek7jx9KWn2RHijF7PS DOQ3clr+B4ZPHqTcn1RAlk+f7My57oz2kX3/AxldDJCX6Vccn/nKP1vCL7nIdum0pYiJ 9P2g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=a8J4jPwM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id q24si2310510ejz.458.2020.04.28.11.36.03; Tue, 28 Apr 2020 11:36:29 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=a8J4jPwM; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728821AbgD1Sba (ORCPT + 99 others); Tue, 28 Apr 2020 14:31:30 -0400 Received: from mail.kernel.org ([198.145.29.99]:46880 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729667AbgD1SbX (ORCPT ); Tue, 28 Apr 2020 14:31:23 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 6F3B220B80; Tue, 28 Apr 2020 18:31:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588098682; bh=BHS3e/jKJugNA1/jaut3g7kvGJk+OFVAbUw+Z9klqcM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=a8J4jPwMVIOdXgj4OJHACComnNsVPPSuzJZPKBhIap7wzbC+74aeYqqttmwdeGqPL L6DqC1edXcXUZer/CjVpl1nNp9rLfaAwGzlmW/bjRjHjKTxmf72V5iu2nUAd7/uIWM 2Jp7J8KgQJMiEf5n4pQ5IeFh1Mdxv8h/W7Ruolm4= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Luis Mendes Subject: [PATCH 5.6 098/167] staging: gasket: Fix incongruency in handling of sysfs entries creation Date: Tue, 28 Apr 2020 20:24:34 +0200 Message-Id: <20200428182237.551378595@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200428182225.451225420@linuxfoundation.org> References: <20200428182225.451225420@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Luis Mendes commit 9195d762042b0e5e4ded63606b4b30a93cba4400 upstream. Fix incongruency in handling of sysfs entries creation. This issue could cause invalid memory accesses, by not properly detecting the end of the sysfs attributes array. Fixes: 84c45d5f3bf1 ("staging: gasket: Replace macro __ATTR with __ATTR_NULL") Signed-off-by: Luis Mendes Cc: stable Link: https://lore.kernel.org/r/20200403151534.20753-1-luis.p.mendes@gmail.com Signed-off-by: Greg Kroah-Hartman --- drivers/staging/gasket/gasket_sysfs.c | 3 +-- drivers/staging/gasket/gasket_sysfs.h | 4 ---- 2 files changed, 1 insertion(+), 6 deletions(-) --- a/drivers/staging/gasket/gasket_sysfs.c +++ b/drivers/staging/gasket/gasket_sysfs.c @@ -228,8 +228,7 @@ int gasket_sysfs_create_entries(struct d } mutex_lock(&mapping->mutex); - for (i = 0; strcmp(attrs[i].attr.attr.name, GASKET_ARRAY_END_MARKER); - i++) { + for (i = 0; attrs[i].attr.attr.name != NULL; i++) { if (mapping->attribute_count == GASKET_SYSFS_MAX_NODES) { dev_err(device, "Maximum number of sysfs nodes reached for device\n"); --- a/drivers/staging/gasket/gasket_sysfs.h +++ b/drivers/staging/gasket/gasket_sysfs.h @@ -30,10 +30,6 @@ */ #define GASKET_SYSFS_MAX_NODES 196 -/* End markers for sysfs struct arrays. */ -#define GASKET_ARRAY_END_TOKEN GASKET_RESERVED_ARRAY_END -#define GASKET_ARRAY_END_MARKER __stringify(GASKET_ARRAY_END_TOKEN) - /* * Terminator struct for a gasket_sysfs_attr array. Must be at the end of * all gasket_sysfs_attribute arrays.