Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp5441131rdb; Wed, 13 Dec 2023 08:43:09 -0800 (PST) X-Google-Smtp-Source: AGHT+IFz57NhSDlbL2LJl9JwHAQQ/v4OtiOU8OKF6Ta+GPDzihiBQjJgYfuChNjxWTdHBWfqGmjO X-Received: by 2002:a17:90b:38c5:b0:286:6cc1:781e with SMTP id nn5-20020a17090b38c500b002866cc1781emr6521331pjb.97.1702485788798; Wed, 13 Dec 2023 08:43:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702485788; cv=none; d=google.com; s=arc-20160816; b=Mxfc71RN9pFidN3CpVNCr5gOQm3+ISq5qTCRt6w7sJDUlfXs4GiIsZgcu73pvlN6/M Z+/apZQ7Jcy43lAUW4CX9kA49FQ2kOPc4c15hvF+UEk82pfipVdPuSu/z6I0aJ5/HLbM xNBi/8zxrAsrpRB245n7kQFyiLMBH36XYyJKTYjXq0sc/hykX4PhwsVsR2UyRRsw9vzR dkWURpF0TYR3BeMf9vRZUrRUC6KnbDun7BetUr8PGJo/NmbNC23VJeLoeaMVE12gEu11 AfFv8S9bednvi46Xg5NeV4Pp0dn1bqn9wgRAOjLa7x01y8+FJ2XLxrd+ieNPis2us91E TaRA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=VTPQ52fzP9OwJ6Ii1O5cwMawol9ASzLI6+8KRrryCm8=; fh=FjQ41B97MbMv+sjH85/Gs82J1S6Q/Mx4/iITrJxwKN8=; b=zB0PlAC0JqqFOf5flGzXVdE6dRydCjqPL1WeacxRNcza/pq8Xd96sl1u1I8OtHyEg/ zBguNAmhBoPR3EurefJLt+V6qIlJR6tw3yeX7vynQASwmKMJrnNN1/KAyan7pk8d0ism X8UYkb1B3mcNNzsx0x1lOyBVMUAY6vcs7J7gZKVDuXnKq7G/GBckQYQs86fwhcNn0uCd YwqZDtdplfqcAQ7ayBlYWuIOwIzXSRCGb6adMba/didsJbbM2pPfkaxXW1GCdHftXorZ BClcHQnFIQ3wlFaJjleNxNnJ47N+O36U7SV6gzyXnZGQ45yukuovmoNRiBPn9m/0qNH+ 1g8g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=D6sduuO3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from snail.vger.email (snail.vger.email. [23.128.96.37]) by mx.google.com with ESMTPS id pf4-20020a17090b1d8400b00286f88ca29dsi10134280pjb.36.2023.12.13.08.43.08 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 13 Dec 2023 08:43:08 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) client-ip=23.128.96.37; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=D6sduuO3; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.37 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id A6EA18030285; Wed, 13 Dec 2023 08:43:07 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233644AbjLMQmz (ORCPT + 99 others); Wed, 13 Dec 2023 11:42:55 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40702 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229844AbjLMQmw (ORCPT ); Wed, 13 Dec 2023 11:42:52 -0500 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3C7A5AC for ; Wed, 13 Dec 2023 08:42:59 -0800 (PST) Received: by smtp.kernel.org (Postfix) with ESMTPSA id D5C8AC433C9; Wed, 13 Dec 2023 16:42:57 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1702485778; bh=9hIznFcw8DaH/AT2cUPzctof/XKOI1gZcHfpU8gxwaE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=D6sduuO3AhilOynckvUN791n2U8Y+YaO3mW522cT/m1JUmQEpDCLOCrW5Cbge2pzE wCeH4/KlBpDTS75d7/yK4zhfzS3jtlWJ/4nv2aRg+1voRfHkDtx9HoV55S1iI8CAn6 FYj0fOh+aYgp3wSNEDlKQ8IEkwLy1m5upNThpQqwLWHrORUGTzDLdQpG7pbcUvSl/X H3u8eXWfQSTY2LWM6oGkjZjJOnlF/R4zBoI4IO1k5aLy7RaKi8lGt5fPAl9yZMZpAB Ig+ngBEtwwDSiUsmbroyS6nTForV/Biy0aj/61+WxgtHuNBQqRQ/YtU4Cbgi9UIu47 cm2orOSHOmxcQ== From: Lee Jones To: lee@kernel.org, gregkh@linuxfoundation.org Cc: linux-kernel@vger.kernel.org, linux-usb@vger.kernel.org Subject: [PATCH 01/12] usb: gadget: configfs: Replace snprintf() with the safer scnprintf() variant Date: Wed, 13 Dec 2023 16:42:30 +0000 Message-ID: <20231213164246.1021885-2-lee@kernel.org> X-Mailer: git-send-email 2.43.0.472.g3155946c3a-goog In-Reply-To: <20231213164246.1021885-1-lee@kernel.org> References: <20231213164246.1021885-1-lee@kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.4 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_MED, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Wed, 13 Dec 2023 08:43:07 -0800 (PST) There is a general misunderstanding amongst engineers that {v}snprintf() returns the length of the data *actually* encoded into the destination array. However, as per the C99 standard {v}snprintf() really returns the length of the data that *would have been* written if there were enough space for it. This misunderstanding has led to buffer-overruns in the past. It's generally considered safer to use the {v}scnprintf() variants in their place (or even sprintf() in simple cases). So let's do that. Link: https://lwn.net/Articles/69419/ Link: https://github.com/KSPP/linux/issues/105 Signed-off-by: Lee Jones --- drivers/usb/gadget/configfs.c | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/drivers/usb/gadget/configfs.c b/drivers/usb/gadget/configfs.c index b7d2a1313a684..ce3cfa1f36f51 100644 --- a/drivers/usb/gadget/configfs.c +++ b/drivers/usb/gadget/configfs.c @@ -606,10 +606,11 @@ static struct config_group *function_make( char *instance_name; int ret; - ret = snprintf(buf, MAX_NAME_LEN, "%s", name); - if (ret >= MAX_NAME_LEN) + if (strlen(name) >= MAX_NAME_LEN) return ERR_PTR(-ENAMETOOLONG); + scnprintf(buf, MAX_NAME_LEN, "%s", name); + func_name = buf; instance_name = strchr(func_name, '.'); if (!instance_name) { @@ -701,10 +702,12 @@ static struct config_group *config_desc_make( int ret; gi = container_of(group, struct gadget_info, configs_group); - ret = snprintf(buf, MAX_NAME_LEN, "%s", name); - if (ret >= MAX_NAME_LEN) + + if (strlen(name) >= MAX_NAME_LEN) return ERR_PTR(-ENAMETOOLONG); + scnprintf(buf, MAX_NAME_LEN, "%s", name); + num_str = strchr(buf, '.'); if (!num_str) { pr_err("Unable to locate . in name.bConfigurationValue\n"); -- 2.43.0.472.g3155946c3a-goog