Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3778525pxv; Mon, 19 Jul 2021 08:32:10 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxcMWqQvm+3f9oEGHYLJ7AZntoJupYcNgDG0H1L4QsRof/AkW6jmcEFRGdqz9tcYHXxLJVO X-Received: by 2002:a05:6402:19a:: with SMTP id r26mr34626700edv.230.1626708730506; Mon, 19 Jul 2021 08:32:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626708730; cv=none; d=google.com; s=arc-20160816; b=YyhoeNms9CbDfqPC2pT11MTUznMp1Xt5i4HScHmeV093qaLlu8GEcpIWttw/IEwplp LSZ354GIPakmlDbT4JlLdkqKZql+hmPGTff3ImWoXM0EmNcZ1qh4LYCSX5mEzAGp35D+ D3kWKz9FUpvO8PVjaoBmsvVg9c0MR0rPwPRpLQSpxWyrcSwfKenjTueFd+rITG1v+nZu UuV+ICfEIUIVIobPktzVl/j3pycjjvpOvCg7Y0/VI90XEgI6b58cBAaShxoeYKpykrcS /vxyHa2fHniROlAprDP8fn6w7pzESwyZwmEb1bS83MproO/8zB+pi/xC6TXsyQECIi6I yk1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=8vqrrAkK7seQfFD8UeUtVsIpRk+WEnrZhzdVa61FX68=; b=fTQZ3iOkeNx4hWru/7TNfrC0fSIufbyuZhLFDYHyK1n5OsDhpg5i2tOBA1o4FCjuw4 nb4aCO7oCJGIuBU6YnoAflyOqjej10nhbOoxgfVM3lectZzReBKqReN5IvOISDu0XrsA Cef5P/5nWMwgo5m/biVElp49tfq140yT+cf61KnkEI49ZJkPNstenXgZoSYKGegLHA7k gsqhNGjfgbHzgFWPVDNnAQVEAhtamWyciaxF9OrRA78+kEQKNYdC5cyBIp0QIJexX2TK 77qOwgScwV6t6wK6kJjNwX6oSVLgbzu0Hx/TgjUrPkdtODxh4DAnd2cAr2vqCgLE2mOP sdLQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=s3JjtvQJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w5si22156065edd.90.2021.07.19.08.31.47; Mon, 19 Jul 2021 08:32:10 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=s3JjtvQJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238365AbhGSOtl (ORCPT + 99 others); Mon, 19 Jul 2021 10:49:41 -0400 Received: from mail.kernel.org ([198.145.29.99]:46154 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S244741AbhGSOeV (ORCPT ); Mon, 19 Jul 2021 10:34:21 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 6D33561287; Mon, 19 Jul 2021 15:13:38 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626707619; bh=alClgonaliYo7bbQrEoXPOwyF03/KVXnqZEw2BqJkKM=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=s3JjtvQJt6PIBOtMhc/YzGQXwUGLKBanmoyjc9Msb7u0+dqeGINsCBAs838IOSnIA xFOUCMK3S9JI5y3dWwSNGWGyBaxQrMIDeVC88xsz8ugfWvS2Os7BiXvVQPGr+wTNRB So5CypuaThhb6Ffl6ULnWM0WzGEjtl5tXmeKGIZE= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dan Carpenter , Alexandre Belloni , Sasha Levin Subject: [PATCH 4.9 236/245] rtc: fix snprintf() checking in is_rtc_hctosys() Date: Mon, 19 Jul 2021 16:52:58 +0200 Message-Id: <20210719144948.006237058@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210719144940.288257948@linuxfoundation.org> References: <20210719144940.288257948@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dan Carpenter [ Upstream commit 54b909436ede47e0ee07f1765da27ec2efa41e84 ] The scnprintf() function silently truncates the printf() and returns the number bytes that it was able to copy (not counting the NUL terminator). Thus, the highest value it can return here is "NAME_SIZE - 1" and the overflow check is dead code. Fix this by using the snprintf() function which returns the number of bytes that would have been copied if there was enough space and changing the condition from "> NAME_SIZE" to ">= NAME_SIZE". Fixes: 92589c986b33 ("rtc-proc: permit the /proc/driver/rtc device to use other devices") Signed-off-by: Dan Carpenter Signed-off-by: Alexandre Belloni Link: https://lore.kernel.org/r/YJov/pcGmhLi2pEl@mwanda Signed-off-by: Sasha Levin --- drivers/rtc/rtc-proc.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/rtc/rtc-proc.c b/drivers/rtc/rtc-proc.c index 31e7e23cc5be..9396b69f75e8 100644 --- a/drivers/rtc/rtc-proc.c +++ b/drivers/rtc/rtc-proc.c @@ -26,8 +26,8 @@ static bool is_rtc_hctosys(struct rtc_device *rtc) int size; char name[NAME_SIZE]; - size = scnprintf(name, NAME_SIZE, "rtc%d", rtc->id); - if (size > NAME_SIZE) + size = snprintf(name, NAME_SIZE, "rtc%d", rtc->id); + if (size >= NAME_SIZE) return false; return !strncmp(name, CONFIG_RTC_HCTOSYS_DEVICE, NAME_SIZE); -- 2.30.2