From mboxrd@z Thu Jan 1 00:00:00 1970 From: Bjorn Andersson Subject: Re: [PATCH v6 8/9] soc: qcom: apr: Avoid string overflow Date: Mon, 3 Sep 2018 12:24:53 -0700 Message-ID: <20180903192453.GD3456@tuxbook-pro> References: <20180829075724.9095-1-niklas.cassel@linaro.org> <20180829075724.9095-9-niklas.cassel@linaro.org> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Return-path: Content-Disposition: inline In-Reply-To: <20180829075724.9095-9-niklas.cassel@linaro.org> Sender: linux-kernel-owner@vger.kernel.org To: Niklas Cassel Cc: Andy Gross , David Brown , linux-arm-msm@vger.kernel.org, linux-soc@vger.kernel.org, linux-kernel@vger.kernel.org List-Id: linux-arm-msm@vger.kernel.org On Wed 29 Aug 00:57 PDT 2018, Niklas Cassel wrote: > 'adev->name' is used as a NUL-terminated string, but using strncpy() with the > length equal to the buffer size may result in lack of the termination: > > In function 'apr_add_device', > inlined from 'of_register_apr_devices' at drivers//soc/qcom/apr.c:264:7, > inlined from 'apr_probe' at drivers//soc/qcom/apr.c:290:2: > drivers//soc/qcom/apr.c:222:3: warning: 'strncpy' specified bound 32 equals destination size [-Wstringop-truncation] > strncpy(adev->name, np->name, APR_NAME_SIZE); > ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > > This changes it to use the safer strscpy() instead. > > Signed-off-by: Niklas Cassel Reviewed-by: Bjorn Andersson Regards, Bjorn > --- > drivers/soc/qcom/apr.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/drivers/soc/qcom/apr.c b/drivers/soc/qcom/apr.c > index 57af8a537332..ee9197f5aae9 100644 > --- a/drivers/soc/qcom/apr.c > +++ b/drivers/soc/qcom/apr.c > @@ -219,9 +219,9 @@ static int apr_add_device(struct device *dev, struct device_node *np, > adev->domain_id = id->domain_id; > adev->version = id->svc_version; > if (np) > - strncpy(adev->name, np->name, APR_NAME_SIZE); > + strscpy(adev->name, np->name, APR_NAME_SIZE); > else > - strncpy(adev->name, id->name, APR_NAME_SIZE); > + strscpy(adev->name, id->name, APR_NAME_SIZE); > > dev_set_name(&adev->dev, "aprsvc:%s:%x:%x", adev->name, > id->domain_id, id->svc_id); > -- > 2.17.1 >