Markus Armbruster b32a09db4f add match_strlcpy() us it to make v9fs make uname and remotename parsing more robust
match_strcpy() is a somewhat creepy function: the caller needs to make sure
that the destination buffer is big enough, and when he screws up or
forgets, match_strcpy() happily overruns the buffer.

There's exactly one customer: v9fs_parse_options().  I believe it currently
can't overflow its buffer, but that's not exactly obvious.

The source string is a substing of the mount options.  The kernel silently
truncates those to PAGE_SIZE bytes, including the terminating zero.  See
compat_sys_mount() and do_mount().

The destination buffer is obtained from __getname(), which allocates from
name_cachep, which is initialized by vfs_caches_init() for size PATH_MAX.

We're safe as long as PATH_MAX <= PAGE_SIZE.  PATH_MAX is 4096.  As far as
I know, the smallest PAGE_SIZE is also 4096.

Here's a patch that makes the code a bit more obviously correct.  It
doesn't depend on PATH_MAX <= PAGE_SIZE.

Signed-off-by: Markus Armbruster <armbru@redhat.com>
Cc: Latchesar Ionkov <lucho@ionkov.net>
Cc: Jim Meyering <meyering@redhat.com>
Cc: "Randy.Dunlap" <rdunlap@xenotime.net>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Eric Van Hensbergen <ericvh@gmail.com>
2008-05-14 19:23:25 -05:00
..
2008-04-10 15:34:05 -07:00
2008-02-03 17:48:52 +02:00
2007-05-11 05:38:25 -04:00
2007-07-16 09:05:50 -07:00
2007-07-17 10:23:04 -07:00
2008-02-03 17:48:52 +02:00
2007-05-10 18:24:13 +02:00
2008-05-01 08:03:58 -07:00
2008-04-29 08:11:16 -07:00
2007-10-19 11:53:41 -07:00
2008-05-01 08:04:00 -07:00
2006-10-06 08:53:40 -07:00
2008-01-24 20:40:05 -08:00
2007-10-19 11:53:41 -07:00
2008-04-28 08:58:17 -07:00
2008-01-30 13:33:00 +01:00
2007-10-17 08:42:52 -07:00