Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp4468903ybz; Tue, 28 Apr 2020 11:49:11 -0700 (PDT) X-Google-Smtp-Source: APiQypK6GQkc5P9zHGlXfV/j4p2nmFCD2jogoN2qGHHCJFY8rzFfkHPZ1NKmeRS3tKdDFpxvtsln X-Received: by 2002:a17:907:2168:: with SMTP id rl8mr24844644ejb.360.1588099751145; Tue, 28 Apr 2020 11:49:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588099751; cv=none; d=google.com; s=arc-20160816; b=IG0kdv6dq+AUZqwfgUBvGqu+lItS8fU/qvjTF4pVellizK0O//fLhNO9rAcyi7Smqt 7ShRuDYnf1vgdp6YyVhJSKniQD8AmYqEN2kljUAqcoz3YOLfo+QJ/W6MT4jmWhJjmJRT Ln9ZDBHx5CU2w4cbL6DGAIXs/a3FUBgF61XE1iFlPDZ4cf6wNYYRy6t67+lhg1qoIYSR +2vcx1wJJOnZLai6z22jbA712x2aEMytKHkcx964wL4Ttm2rE5a0z1gkhE7BSms3MVwN uKhKFKE9SFzrlYjDNeoKdDt+TzWGRzEw/Pz8N5UV6b8k5KQNromfjmtMPlCU5/OIDaRC R6GQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=ECGpErzcJbqfPX29oJYG+PODruYSIW8/0Ndr1ZPKAJE=; b=UhIa1EcNTgO21+AkCmTbrpWjivY11QkBqZvBAtuGpExD7sPJoj29EXLuL8jJRqOujl 0HJLJXvM1XNcuiiMInGels94AFHRpQ4KsR+BmSFvWkfynOWtP8AB7hT3u5G0sh7ilcfZ 6i0ag+yHK2NXVKX41tWC+iWjjvIDR1O6x/3tKWXqzbYjmvfst+crB1l5AKqzwXIa6b15 RbVl+x2dbwM4s17A3sSwTUsYKA+BUup44zMmI0BlzvWpr0WJoLaSZo3dABNbNmMNIPKs f10Sl99Z5A5EGaBepsktC8YJziIvFe6AzTUwlzisbJ2t/BPrIB3QZIFxE/QsDSdspRSq BQLw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=pvHwQHdN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z6si1429096ejb.147.2020.04.28.11.48.47; Tue, 28 Apr 2020 11:49:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=pvHwQHdN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730875AbgD1SmF (ORCPT + 99 others); Tue, 28 Apr 2020 14:42:05 -0400 Received: from mail.kernel.org ([198.145.29.99]:33696 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731058AbgD1SmA (ORCPT ); Tue, 28 Apr 2020 14:42:00 -0400 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8769420730; Tue, 28 Apr 2020 18:41:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1588099320; bh=BHS3e/jKJugNA1/jaut3g7kvGJk+OFVAbUw+Z9klqcM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=pvHwQHdNrlVszqJ1uyHw8a9HfT6dd8XcRb8A5+TPT4oS3kaGf9xp+EUu8obInSJLG bpxbK5RY+1WyNe1+V32AvN6NYCgPlD+owSo+VhmOSKhwfkAC3D6a1JpKOOoS7xNqo1 NLJM8lUHZlMvmRGgrV/t/SeAhNsisO9ad7jMRBNI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Luis Mendes Subject: [PATCH 5.4 103/168] staging: gasket: Fix incongruency in handling of sysfs entries creation Date: Tue, 28 Apr 2020 20:24:37 +0200 Message-Id: <20200428182245.401671082@linuxfoundation.org> X-Mailer: git-send-email 2.26.2 In-Reply-To: <20200428182231.704304409@linuxfoundation.org> References: <20200428182231.704304409@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Luis Mendes commit 9195d762042b0e5e4ded63606b4b30a93cba4400 upstream. Fix incongruency in handling of sysfs entries creation. This issue could cause invalid memory accesses, by not properly detecting the end of the sysfs attributes array. Fixes: 84c45d5f3bf1 ("staging: gasket: Replace macro __ATTR with __ATTR_NULL") Signed-off-by: Luis Mendes Cc: stable Link: https://lore.kernel.org/r/20200403151534.20753-1-luis.p.mendes@gmail.com Signed-off-by: Greg Kroah-Hartman --- drivers/staging/gasket/gasket_sysfs.c | 3 +-- drivers/staging/gasket/gasket_sysfs.h | 4 ---- 2 files changed, 1 insertion(+), 6 deletions(-) --- a/drivers/staging/gasket/gasket_sysfs.c +++ b/drivers/staging/gasket/gasket_sysfs.c @@ -228,8 +228,7 @@ int gasket_sysfs_create_entries(struct d } mutex_lock(&mapping->mutex); - for (i = 0; strcmp(attrs[i].attr.attr.name, GASKET_ARRAY_END_MARKER); - i++) { + for (i = 0; attrs[i].attr.attr.name != NULL; i++) { if (mapping->attribute_count == GASKET_SYSFS_MAX_NODES) { dev_err(device, "Maximum number of sysfs nodes reached for device\n"); --- a/drivers/staging/gasket/gasket_sysfs.h +++ b/drivers/staging/gasket/gasket_sysfs.h @@ -30,10 +30,6 @@ */ #define GASKET_SYSFS_MAX_NODES 196 -/* End markers for sysfs struct arrays. */ -#define GASKET_ARRAY_END_TOKEN GASKET_RESERVED_ARRAY_END -#define GASKET_ARRAY_END_MARKER __stringify(GASKET_ARRAY_END_TOKEN) - /* * Terminator struct for a gasket_sysfs_attr array. Must be at the end of * all gasket_sysfs_attribute arrays.