[PATCH 06/11] acpi: avoid warning for truncated string copy

From: Arnd Bergmann
Date: Thu Mar 28 2024 - 10:07:12 EST


From: Arnd Bergmann <arnd@xxxxxxxx>

gcc -Wstringop-truncation warns about copying a string that results in a
missing nul termination:

drivers/acpi/acpica/tbfind.c: In function 'acpi_tb_find_table':
drivers/acpi/acpica/tbfind.c:60:9: error: 'strncpy' specified bound 6 equals destination size [-Werror=stringop-truncation]
60 | strncpy(header.oem_id, oem_id, ACPI_OEM_ID_SIZE);
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/acpi/acpica/tbfind.c:61:9: error: 'strncpy' specified bound 8 equals destination size [-Werror=stringop-truncation]
61 | strncpy(header.oem_table_id, oem_table_id, ACPI_OEM_TABLE_ID_SIZE);
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

This one is intentional, so rewrite the code in a way that avoids the
warning. Since there is already an extra strlen() and an overflow check,
the actual size to be copied is already known here.

Fixes: 47c08729bf1c ("ACPICA: Fix for LoadTable operator, input strings")
Signed-off-by: Arnd Bergmann <arnd@xxxxxxxx>
---
drivers/acpi/acpica/tbfind.c | 19 +++++++++----------
1 file changed, 9 insertions(+), 10 deletions(-)

diff --git a/drivers/acpi/acpica/tbfind.c b/drivers/acpi/acpica/tbfind.c
index 1c1b2e284bd9..472ce2a6624b 100644
--- a/drivers/acpi/acpica/tbfind.c
+++ b/drivers/acpi/acpica/tbfind.c
@@ -36,7 +36,7 @@ acpi_tb_find_table(char *signature,
{
acpi_status status = AE_OK;
struct acpi_table_header header;
- u32 i;
+ u32 len, i;

ACPI_FUNCTION_TRACE(tb_find_table);

@@ -46,19 +46,18 @@ acpi_tb_find_table(char *signature,
return_ACPI_STATUS(AE_BAD_SIGNATURE);
}

- /* Don't allow the OEM strings to be too long */
-
- if ((strlen(oem_id) > ACPI_OEM_ID_SIZE) ||
- (strlen(oem_table_id) > ACPI_OEM_TABLE_ID_SIZE)) {
- return_ACPI_STATUS(AE_AML_STRING_LIMIT);
- }
-
/* Normalize the input strings */

memset(&header, 0, sizeof(struct acpi_table_header));
ACPI_COPY_NAMESEG(header.signature, signature);
- strncpy(header.oem_id, oem_id, ACPI_OEM_ID_SIZE);
- strncpy(header.oem_table_id, oem_table_id, ACPI_OEM_TABLE_ID_SIZE);
+ len = strlen(oem_id);
+ if (len > ACPI_OEM_ID_SIZE)
+ return_ACPI_STATUS(AE_AML_STRING_LIMIT);
+ memcpy(header.oem_id, oem_id, len);
+ len = strlen(oem_table_id);
+ if (len > ACPI_OEM_TABLE_ID_SIZE)
+ return_ACPI_STATUS(AE_AML_STRING_LIMIT);
+ memcpy(header.oem_table_id, oem_table_id, len);

/* Search for the table */

--
2.39.2