Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3839609pxv; Mon, 19 Jul 2021 09:59:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwePEVotQ5nU130l+y+Rx+NCnvtLsh6OWEo47rBVekJWZBNJLQse69Q/TmeAHJOgYmWzQJ+ X-Received: by 2002:a17:906:6814:: with SMTP id k20mr27976759ejr.381.1626713988690; Mon, 19 Jul 2021 09:59:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626713988; cv=none; d=google.com; s=arc-20160816; b=CK738tqO2hnuUbzrZ5/NrByCG8UWp6i0KYAXs4s7aDRvr+b18l1CbqKALB3tRi407F 8S1Z8FkVQsM3wrpjQZZ23CQElC0W9Gs7MVFoochSWz+uaLAcndcntLtZTYxU5CSTNVeL qzCguwiAzGUHZ0OIOcktEO6smlcNvz9Q1Tj6Ho1BGIKqOxHxBo00uGZZaONmkEcC8PQY E7b7M6z0zsb0E+GadfnyafF6CE0WSg5WPvGUDQ2jfW7o+qhIGH3yAfcyuN5shh1Be1KM 5M7GplQitemFJ+5lo9jNQanOcaacd134mJoZy8r/GXzBS74A6EBKUt8FhE5O7z75Zy/X hMhQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=aWiPFnBer3ARUOOjp9ztm+PpUnrMArd+DhnuQaX+iXs=; b=AAI6hZTZBpKcNKpN6mkrBL22A5I9ORNPSjwIlmgFCmdGqYLUN1zDkgqQIHrsmvmytP DuAq+jPgL6Oq56jJYX6tn009z35Wz8yjf+P/LIl36RMZuTHrhay7VuQgxg4az7ZvhLX1 d+miZ4eN4DjzDn/VNOtbqC9FudxdLF98KJET8GjXgGvDgQ2OcRs1AFOKgS9pxGswWA+G cel/aShywiseMqGU62ozcKbWE+wCeNdP+LzFDoXLsq1GWMOU5sVHwR8ogR/FPhVd7wjM 6PH1HmRHNp+gw2H2vZ2nFwVM59pd5CW34vNaR4ZvN2yM6V4nwbnqE3K+pcBnajGKmjsa xn9g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=eQUxhCKC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cy8si22161287edb.477.2021.07.19.09.59.26; Mon, 19 Jul 2021 09:59:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=eQUxhCKC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1352323AbhGSQQb (ORCPT + 99 others); Mon, 19 Jul 2021 12:16:31 -0400 Received: from mail.kernel.org ([198.145.29.99]:46568 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344482AbhGSPKS (ORCPT ); Mon, 19 Jul 2021 11:10:18 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 854DA61001; Mon, 19 Jul 2021 15:50:55 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626709856; bh=ALUg3I4EgJTJjOYjclxtb3GuqXylJMBR65DGoO+kQf4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=eQUxhCKC6hh0z9OxnvRDFMFbzeF5RMvPrthB+mtjoy6v1DQ059PICQkQGQVdpVMjW JlMD0iaHZj2xhZid7/U8r3sAssjy7yCW1RZ4uUXifHPbwCzJpMegwa93a0/IOGdNZg FYRckGwPWOGTn4xewX23Zwt7HUTKHTfPHG1bfOIM= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dan Carpenter , Alexandre Belloni , Sasha Levin Subject: [PATCH 5.4 124/149] rtc: fix snprintf() checking in is_rtc_hctosys() Date: Mon, 19 Jul 2021 16:53:52 +0200 Message-Id: <20210719144930.729828370@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210719144901.370365147@linuxfoundation.org> References: <20210719144901.370365147@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dan Carpenter [ Upstream commit 54b909436ede47e0ee07f1765da27ec2efa41e84 ] The scnprintf() function silently truncates the printf() and returns the number bytes that it was able to copy (not counting the NUL terminator). Thus, the highest value it can return here is "NAME_SIZE - 1" and the overflow check is dead code. Fix this by using the snprintf() function which returns the number of bytes that would have been copied if there was enough space and changing the condition from "> NAME_SIZE" to ">= NAME_SIZE". Fixes: 92589c986b33 ("rtc-proc: permit the /proc/driver/rtc device to use other devices") Signed-off-by: Dan Carpenter Signed-off-by: Alexandre Belloni Link: https://lore.kernel.org/r/YJov/pcGmhLi2pEl@mwanda Signed-off-by: Sasha Levin --- drivers/rtc/proc.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/rtc/proc.c b/drivers/rtc/proc.c index 73344598fc1b..cbcdbb19d848 100644 --- a/drivers/rtc/proc.c +++ b/drivers/rtc/proc.c @@ -23,8 +23,8 @@ static bool is_rtc_hctosys(struct rtc_device *rtc) int size; char name[NAME_SIZE]; - size = scnprintf(name, NAME_SIZE, "rtc%d", rtc->id); - if (size > NAME_SIZE) + size = snprintf(name, NAME_SIZE, "rtc%d", rtc->id); + if (size >= NAME_SIZE) return false; return !strncmp(name, CONFIG_RTC_HCTOSYS_DEVICE, NAME_SIZE); -- 2.30.2