diff options
author | Yunhee Seo <yuni.seo@samsung.com> | 2024-07-16 16:21:32 +0900 |
---|---|---|
committer | Yunhee Seo <yuni.seo@samsung.com> | 2024-07-24 15:43:37 +0900 |
commit | 8f0ecda722e0602e36c690d742536e5a7f710046 (patch) | |
tree | de8a43177b4f70865368f85a650590e9485c236a | |
parent | c7475715135891be6e3854f3f13b3f6ea2cf2952 (diff) | |
download | device-rpi-8f0ecda722e0602e36c690d742536e5a7f710046.tar.gz device-rpi-8f0ecda722e0602e36c690d742536e5a7f710046.tar.bz2 device-rpi-8f0ecda722e0602e36c690d742536e5a7f710046.zip |
util: Add handling code to safely read and write arraystizen_9.0_m2_releaseaccepted/tizen/unified/x/asan/20240813.230430accepted/tizen/unified/x/20240726.013207accepted/tizen/unified/toolchain/20240812.132145accepted/tizen/unified/dev/20240729.000858accepted/tizen/unified/20240725.155024accepted/tizen/9.0/unified/20241031.000036tizen_9.0tizenaccepted/tizen_unified_x_asanaccepted/tizen_unified_xaccepted/tizen_unified_toolchainaccepted/tizen_unified_devaccepted/tizen_unifiedaccepted/tizen_9.0_unified
There was a missing code for handling the null character
so that it doesn't exceed the array size when reading and storing strings.
The code has been modified to handle the array safely.
To avoid overflow issue, this is necessary.
Change-Id: Ib75301a07906391c57fb739ef3399ff211cd1503
Signed-off-by: Yunhee Seo <yuni.seo@samsung.com>
-rw-r--r-- | src/util.c | 21 |
1 files changed, 10 insertions, 11 deletions
@@ -30,19 +30,18 @@ static int sysfs_read_buf(char *path, char *buf, int len) fd = open(path, O_RDONLY); if (fd == -1) - return -ENOENT; + return -errno; r = read(fd, buf, len); close(fd); - if ((r < 0) || (r > len)) + if ((r < 0) || (r >= len)) { + buf[0] = '\0'; return -EIO; + } - /* Replace '\n' with space (ascii code is 32) */ - buf[strcspn(buf, "\n")] = (char)32; buf[r] = '\0'; - - return 0; + return r; } int sysfs_write_buf(char *path, char *buf) @@ -54,7 +53,7 @@ int sysfs_write_buf(char *path, char *buf) fd = open(path, O_WRONLY); if (fd == -1) - return -ENOENT; + return -errno; w = write(fd, buf, strlen(buf)); close(fd); @@ -67,13 +66,13 @@ int sysfs_write_buf(char *path, char *buf) int sysfs_read_int(char *path, int *val) { - char buf[MAX_BUF_SIZE + 1]; + char buf[MAX_BUF_SIZE]; int r; if ((!path) || (!val)) return -EINVAL; - r = sysfs_read_buf(path, buf, MAX_BUF_SIZE); + r = sysfs_read_buf(path, buf, sizeof(buf)); if (r < 0) return r; @@ -97,13 +96,13 @@ int sysfs_read_str(char *path, char *str, int len) int sysfs_write_int(char *path, int val) { - char buf[MAX_BUF_SIZE + 1]; + char buf[MAX_BUF_SIZE]; int w; if (!path) return -EINVAL; - snprintf(buf, MAX_BUF_SIZE, "%d", val); + snprintf(buf, sizeof(buf), "%d", val); w = sysfs_write_buf(path, buf); if (w < 0) return w; |