Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3757367pxk; Tue, 29 Sep 2020 05:39:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzDzgummgCfwLbhcHLD6iFLmNLKfgrJvLmCqu3P9wE3A6ci0zb36jyQFzO0rYpgFgFZ3NgN X-Received: by 2002:a17:906:b146:: with SMTP id bt6mr3566590ejb.287.1601383165951; Tue, 29 Sep 2020 05:39:25 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601383165; cv=none; d=google.com; s=arc-20160816; b=eRTeauLwO28vmNREZS9x5qQVODm+LO8zwxMyDPby/OqZQp55p5MYuAYGkl9854KQNj 05ldpGs1koV9Hl1V1tmxFY8uE1bmQHcJBcPv1Ny/0lT8hg9FGwslflI1G2/0YI7LdY0Y I6GJStGtxnbkwV4DgTguu05CZFHhN1XzdgZavbHhP5yH75ZK6ndMJso8jVUbKrYUGvLv d0tuWE5pAq4m7v2RhaaPhRUYuJsLkAti5XlBX6suYOc76YFqlS/7Rl1Qtd3+6gHpujCp R1eMWcqNNGaqZkQJGVsDL6O31sP9TRoDYIAE1yYjeHp+oAMXqF1HcmBo5D+1c0O6li1H hcZQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=mb7v/Mh3WEtwJiVPimnZWE/ROMEwFXaC1ijom2TdZgg=; b=dGHQjILuO9Pz4OaePA4ezJBTBccCGDBuCxaGW7ozWO7GADUL6MUJoSojnz+RM0hWwT ZK10mDGmmmbsgzQtT8nE92CgH1L1rV4MQAsVqe/MwP+8Bqg4+kpqwRNcoqMsCbO3IGIg 5AtU6JAwdIzueRI9DMRAVGiT5AVu3YF6YBETfQg21s2nuTHIuqjGGHXn/ZfJwpT3CPgy Iakat7ukO3h09a1HnBW+4v0a7SaZdVrnFg9O2HH54dJ1MdwaYqkh7ti+tApPmKpCRWCy eA7SQ7vKmODGhRzKLccav4xANYhPVu8mPU7maM0+JBxqIFKK4UyW5MOgXkgmV0u4uM2C Pwhg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=i0KhnUuS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r2si2680827edc.25.2020.09.29.05.39.03; Tue, 29 Sep 2020 05:39:25 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=i0KhnUuS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1732864AbgI2MiD (ORCPT + 99 others); Tue, 29 Sep 2020 08:38:03 -0400 Received: from mail.kernel.org ([198.145.29.99]:35518 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729261AbgI2LR5 (ORCPT ); Tue, 29 Sep 2020 07:17:57 -0400 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 7F084208FE; Tue, 29 Sep 2020 11:17:45 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1601378266; bh=uKyd+P7uYdEygJarxNMMYG2W0SFX+OF/GFn1NYnMTTc=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=i0KhnUuSjCO3Q0h4zImKLP/w0uf1SjeUBIcXRcqiiDgTozlQnM8If6suTMuXH4DCg zGLMLHGZvmtbmffiIkZAxLDRZeNmANr2LTVcB7cvGHdFKtOolF+md9prIeiLKUyWkn ORC1S0DVAgqqzl38HXxd8A6BQgmBnFn0hTpn/Jk0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Christophe JAILLET , David Laight , Alexander Shishkin , Don Zickus , He Zhe , Jan Stancek , Jiri Olsa , Kan Liang , Mark Rutland , Namhyung Kim , Peter Zijlstra , kernel-janitors@vger.kernel.org, Arnaldo Carvalho de Melo , Sasha Levin Subject: [PATCH 4.14 089/166] perf cpumap: Fix snprintf overflow check Date: Tue, 29 Sep 2020 13:00:01 +0200 Message-Id: <20200929105939.657828029@linuxfoundation.org> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200929105935.184737111@linuxfoundation.org> References: <20200929105935.184737111@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Christophe JAILLET [ Upstream commit d74b181a028bb5a468f0c609553eff6a8fdf4887 ] 'snprintf' returns the number of characters which would be generated for the given input. If the returned value is *greater than* or equal to the buffer size, it means that the output has been truncated. Fix the overflow test accordingly. Fixes: 7780c25bae59f ("perf tools: Allow ability to map cpus to nodes easily") Fixes: 92a7e1278005b ("perf cpumap: Add cpu__max_present_cpu()") Signed-off-by: Christophe JAILLET Suggested-by: David Laight Cc: Alexander Shishkin Cc: Don Zickus Cc: He Zhe Cc: Jan Stancek Cc: Jiri Olsa Cc: Kan Liang Cc: Mark Rutland Cc: Namhyung Kim Cc: Peter Zijlstra Cc: kernel-janitors@vger.kernel.org Link: http://lore.kernel.org/lkml/20200324070319.10901-1-christophe.jaillet@wanadoo.fr Signed-off-by: Arnaldo Carvalho de Melo Signed-off-by: Sasha Levin --- tools/perf/util/cpumap.c | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/tools/perf/util/cpumap.c b/tools/perf/util/cpumap.c index f93846edc1e0d..827d844f4efb1 100644 --- a/tools/perf/util/cpumap.c +++ b/tools/perf/util/cpumap.c @@ -462,7 +462,7 @@ static void set_max_cpu_num(void) /* get the highest possible cpu number for a sparse allocation */ ret = snprintf(path, PATH_MAX, "%s/devices/system/cpu/possible", mnt); - if (ret == PATH_MAX) { + if (ret >= PATH_MAX) { pr_err("sysfs path crossed PATH_MAX(%d) size\n", PATH_MAX); goto out; } @@ -473,7 +473,7 @@ static void set_max_cpu_num(void) /* get the highest present cpu number for a sparse allocation */ ret = snprintf(path, PATH_MAX, "%s/devices/system/cpu/present", mnt); - if (ret == PATH_MAX) { + if (ret >= PATH_MAX) { pr_err("sysfs path crossed PATH_MAX(%d) size\n", PATH_MAX); goto out; } @@ -501,7 +501,7 @@ static void set_max_node_num(void) /* get the highest possible cpu number for a sparse allocation */ ret = snprintf(path, PATH_MAX, "%s/devices/system/node/possible", mnt); - if (ret == PATH_MAX) { + if (ret >= PATH_MAX) { pr_err("sysfs path crossed PATH_MAX(%d) size\n", PATH_MAX); goto out; } @@ -586,7 +586,7 @@ int cpu__setup_cpunode_map(void) return 0; n = snprintf(path, PATH_MAX, "%s/devices/system/node", mnt); - if (n == PATH_MAX) { + if (n >= PATH_MAX) { pr_err("sysfs path crossed PATH_MAX(%d) size\n", PATH_MAX); return -1; } @@ -601,7 +601,7 @@ int cpu__setup_cpunode_map(void) continue; n = snprintf(buf, PATH_MAX, "%s/%s", path, dent1->d_name); - if (n == PATH_MAX) { + if (n >= PATH_MAX) { pr_err("sysfs path crossed PATH_MAX(%d) size\n", PATH_MAX); continue; } -- 2.25.1