Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp327101pxb; Fri, 15 Jan 2021 14:17:21 -0800 (PST) X-Google-Smtp-Source: ABdhPJwMqwPxoYVIEoDgmqbd/OSMg0PAm23KFNQXz2mDWZXxcT8WgZsIrHPZon7hF1e2cbzKpyc6 X-Received: by 2002:a50:d552:: with SMTP id f18mr11264915edj.168.1610749040894; Fri, 15 Jan 2021 14:17:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610749040; cv=none; d=google.com; s=arc-20160816; b=jTe4X+NSkJ7C872lc95pCPgqlhWwoFDTaA4TCKxlG1gefFYYoPkEj17ujlJiyyztFP 8A97fWt4WDVRMMnJ4nbgFko5Ovy+UXWdgQFfP5WvmSjoRWcL7WNWOzJ5Ors4tzWm8NcO FEIUkwWa/b5BEhfHrZeZ60GA9xtmrxhTu0c7Zh4B10/S1wnyfuMc9/KRAOri8Hq5Z11q /lD+LEr+kF2bcs8hwrm9asrtTwSfa5DjC9GXEfEJ/c1BSg4DUEa41jg/szML/RAeyD6q 7BxPeT5gFTCWPPXsgfIvUY2tt07tDZNmUxpPFLIQGNOhFR5S9XtEtR1gEsNe4CbJlEgs PMuw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:date:cc:to:from:subject :message-id:dkim-signature:dkim-signature; bh=9S6qv6cEmB6Q/r6lbvgIF+Qa+k+GYA7O/ny0/oZ79kg=; b=jL7anE59Gxe/oAnLM5Z3ev1q9iDgI/1/wexxMotz0z3FNTn9DggLhRwDsrhyYRQVb1 +1te4yvC00ooZg6gWL9Y0CVKFWAnA2cxmzFJs4j2xIM3rNUs1VUO30tAuj55gpmRrpZa NgQWjMhq9yx8wq2g7Rytq202shXMD1K1QVv+OGJ2SlyTGYsWDLAOtduyPOs5rxRyz5+P qWTc/KogHkyZeLFCs3Rp19ggYDiXLyo9lr2G98+x3fwQlGTJlXK/SS/L9uv6zLHZcUh9 aV8GlK30bvMH0ewvnegnWoXlpcc6JTZFCqcdhdQ35oB6UNfZGVaozuA1iciXo76PtEK6 bAmQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@hansenpartnership.com header.s=20151216 header.b=bth6Hy2S; dkim=pass header.i=@hansenpartnership.com header.s=20151216 header.b="HP7YN7h/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 20si1309603edw.131.2021.01.15.14.16.56; Fri, 15 Jan 2021 14:17:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@hansenpartnership.com header.s=20151216 header.b=bth6Hy2S; dkim=pass header.i=@hansenpartnership.com header.s=20151216 header.b="HP7YN7h/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=hansenpartnership.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726417AbhAOWQD (ORCPT + 99 others); Fri, 15 Jan 2021 17:16:03 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52140 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725863AbhAOWQC (ORCPT ); Fri, 15 Jan 2021 17:16:02 -0500 Received: from bedivere.hansenpartnership.com (bedivere.hansenpartnership.com [IPv6:2607:fcd0:100:8a00::2]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 82E32C061757; Fri, 15 Jan 2021 14:15:22 -0800 (PST) Received: from localhost (localhost [127.0.0.1]) by bedivere.hansenpartnership.com (Postfix) with ESMTP id 052EB12800EE; Fri, 15 Jan 2021 14:15:22 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hansenpartnership.com; s=20151216; t=1610748922; bh=EWGEw8x+FOSSNemAJ6DiY4riPR8TwPs1wmu9Dlci8Tw=; h=Message-ID:Subject:From:To:Date:In-Reply-To:References:From; b=bth6Hy2SisPPp9a3aHqmIE/o+PdFuGoLtHsUgQokc7dBeY/j7r3ZZSXex3/meKCFa fkML+tHoj8LlkeF9Lsfk6JHvdLIri8OMqXukcYv2thKpjIt1ak4hl5cBYcPHSZrNj1 OdSOfMaprO8U5ccd8e2CpFK1VLIXJGM2OsZxb+hc= Received: from bedivere.hansenpartnership.com ([127.0.0.1]) by localhost (bedivere.hansenpartnership.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F4OdWvEKknWk; Fri, 15 Jan 2021 14:15:21 -0800 (PST) Received: from jarvis.int.hansenpartnership.com (unknown [IPv6:2601:600:8280:66d1::c447]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by bedivere.hansenpartnership.com (Postfix) with ESMTPSA id 7218212800AE; Fri, 15 Jan 2021 14:15:21 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=hansenpartnership.com; s=20151216; t=1610748921; bh=EWGEw8x+FOSSNemAJ6DiY4riPR8TwPs1wmu9Dlci8Tw=; h=Message-ID:Subject:From:To:Date:In-Reply-To:References:From; b=HP7YN7h/DbA9+2Do19aQCaa6e35W3sxRw5Vp9air06NjYLboYqK5u0maijYsUiFIv ptstxfajK/rZHSxMUk/K+zsG5IcFzlW7iBGgl4GqHn7vvUBrKEoe4GU/wzDQuT6ABI ql0f7hpJIWTg1O63p4AE7q15Ly0qAfUccPET+AXk= Message-ID: <6af0a6562b67a24e6233ed360189ba8071243035.camel@HansenPartnership.com> Subject: Re: [PATCH] RDMA: usnic: Fix misuse of sysfs_emit_at From: James Bottomley To: Joe Perches , Christian Benvenuti , Nelson Escobar , Doug Ledford , Jason Gunthorpe Cc: linux-rdma@vger.kernel.org, LKML , Greg KH Date: Fri, 15 Jan 2021 14:15:20 -0800 In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" User-Agent: Evolution 3.34.4 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 2021-01-15 at 13:23 -0800, Joe Perches wrote: > In commit e28bf1f03b01 ("RDMA: Convert various random sprintf sysfs > _show > uses to sysfs_emit") I mistakenly used len = sysfs_emit_at to > overwrite > the last trailing space of potentially multiple entry output. > > The length of the last sysfs_emit_at call is 1 and it should instead > be > ignored. Do so. > > Fixes: e28bf1f03b01 ("RDMA: Convert various random sprintf sysfs > _show uses to sysfs_emit") > > Reported-by: James Bottomley > Signed-off-by: Joe Perches > --- > drivers/infiniband/hw/usnic/usnic_ib_sysfs.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/drivers/infiniband/hw/usnic/usnic_ib_sysfs.c > b/drivers/infiniband/hw/usnic/usnic_ib_sysfs.c > index e59615a4c9d9..fc077855b46c 100644 > --- a/drivers/infiniband/hw/usnic/usnic_ib_sysfs.c > +++ b/drivers/infiniband/hw/usnic/usnic_ib_sysfs.c > @@ -231,7 +231,7 @@ static ssize_t summary_show(struct > usnic_ib_qp_grp *qp_grp, char *buf) > } > } > > - len = sysfs_emit_at(buf, len, "\n"); > + sysfs_emit_at(buf, len, "\n"); /* Overwrite the last > trailing space */ len is the offset of where the next character gets written, isn't it? so if you're overwriting the last character emitted into buf, shouldn't the offset point at that character rather than one beyond it? So sysfs_emit_at(buf, len - 1, "\n"); /* Overwrite the last trailing space */ ? James