Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp3891124pxv; Mon, 19 Jul 2021 11:14:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwIHdMsGHZOcKy4vSMZcz1dGiBGP7yXRUxa1+vUSy3MCKY5Ahcc2dswW70GG0z4SmCXR/Bi X-Received: by 2002:a05:6602:38d:: with SMTP id f13mr18404495iov.153.1626718479495; Mon, 19 Jul 2021 11:14:39 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626718479; cv=none; d=google.com; s=arc-20160816; b=VwALRDYnTHHdqrGVHfEuqCfbkoTPMnTCPor2BlJGW63rSfS+VesFKckGzFddeixOCm 63+9eqEZHfOhlN+bezEyiJcmxquoFucUmRgEP+eb8DHWVFDFP4reF1sbeKCj3UTd7VVK /QtfmfzQK5yTGAaMBEpQJ1NSyzZ+/WMJ9CciMtU5skX5Sz5CK6JE0FvsynYI5qRgJMmE zJtZmnm0+1ch6bnLOIGeMFmfis5et7j7dBiomLBKCYHAGdpDC6v8Kb8gWhi3eE0Rn5KD J/40TMXh202E3NXaOd3TMEkmgq/y1I3kfMzJPKB/+RPO/J/aQaNhLUDHw0nU8Hg7RGzq thjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=aWiPFnBer3ARUOOjp9ztm+PpUnrMArd+DhnuQaX+iXs=; b=NndMwVlZMd4KWn0brWSChY7LQWqyalutCjsyBK32+H5rpSu7r7k6ZybU9gsR78i4NY MfVIwRzEtos2Lafe5LIHG6kd2CDBKReHFwk/4IxFtrEvfjwA1LOxEhAQMQzgwkwDflCR XMsWa6r9MIj3u+DcIFRyfFcIWNSZ+R5NV9NfPIyS3RnJxH3Q2Nd9fWqTOSP3Mhy0iyfO 8RcH12QMCb3KzgA6lrbLlIjn/94f0/7dSBAFovLlMjqzSeZpHF4UhlAuov710oekAWMD AunHM0gR+SnWULR2WxAmd+JlMgRf4bgK9EVt+JJsGQaggTEPIZmGCpi7yQOIw76kOF8N TtpA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=KnA8vOIL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id j23si9750526iok.60.2021.07.19.11.14.28; Mon, 19 Jul 2021 11:14:39 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=KnA8vOIL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1356544AbhGSRbi (ORCPT + 99 others); Mon, 19 Jul 2021 13:31:38 -0400 Received: from mail.kernel.org ([198.145.29.99]:48102 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1346666AbhGSPrt (ORCPT ); Mon, 19 Jul 2021 11:47:49 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 9B0A561483; Mon, 19 Jul 2021 16:27:46 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1626712067; bh=ALUg3I4EgJTJjOYjclxtb3GuqXylJMBR65DGoO+kQf4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=KnA8vOILNfkvpg1YeyYk5a5jEsmpxgLrqjp7Na9zAbpP3iQcbdRptp/IyJnFOhhwT ESU/04N/N0vHHy4uTAGjvXtqoBzVLSFQlzIUcmK9ALstHemS8NiHwFdr6pbpDVw6vf cZMvvTBYoyLuvtbZhuLFwRyH1TcQqJuade7LU7e0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Dan Carpenter , Alexandre Belloni , Sasha Levin Subject: [PATCH 5.12 238/292] rtc: fix snprintf() checking in is_rtc_hctosys() Date: Mon, 19 Jul 2021 16:55:00 +0200 Message-Id: <20210719144950.780043184@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210719144942.514164272@linuxfoundation.org> References: <20210719144942.514164272@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Dan Carpenter [ Upstream commit 54b909436ede47e0ee07f1765da27ec2efa41e84 ] The scnprintf() function silently truncates the printf() and returns the number bytes that it was able to copy (not counting the NUL terminator). Thus, the highest value it can return here is "NAME_SIZE - 1" and the overflow check is dead code. Fix this by using the snprintf() function which returns the number of bytes that would have been copied if there was enough space and changing the condition from "> NAME_SIZE" to ">= NAME_SIZE". Fixes: 92589c986b33 ("rtc-proc: permit the /proc/driver/rtc device to use other devices") Signed-off-by: Dan Carpenter Signed-off-by: Alexandre Belloni Link: https://lore.kernel.org/r/YJov/pcGmhLi2pEl@mwanda Signed-off-by: Sasha Levin --- drivers/rtc/proc.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/drivers/rtc/proc.c b/drivers/rtc/proc.c index 73344598fc1b..cbcdbb19d848 100644 --- a/drivers/rtc/proc.c +++ b/drivers/rtc/proc.c @@ -23,8 +23,8 @@ static bool is_rtc_hctosys(struct rtc_device *rtc) int size; char name[NAME_SIZE]; - size = scnprintf(name, NAME_SIZE, "rtc%d", rtc->id); - if (size > NAME_SIZE) + size = snprintf(name, NAME_SIZE, "rtc%d", rtc->id); + if (size >= NAME_SIZE) return false; return !strncmp(name, CONFIG_RTC_HCTOSYS_DEVICE, NAME_SIZE); -- 2.30.2