diff options
| author | Vladimir Oltean <[email protected]> | 2021-09-27 14:22:03 +0300 |
|---|---|---|
| committer | Ramon Fried <[email protected]> | 2021-09-28 18:50:57 +0300 |
| commit | 4fdc7e3530eb49dfe0aca79746b1cda30e94c591 (patch) | |
| tree | 3446154950a73906fc33aace8270315fdabc4001 /scripts | |
| parent | c9131fc72b618ce24959447aa55f66f583c49e8a (diff) | |
net: dsa: ensure port names are NULL-terminated after DSA_PORT_NAME_LENGTH truncation
strncpy() simply bails out when copying a source string whose size
exceeds the destination string size, potentially leaving the destination
string unterminated.
One possible way to address is to pass DSA_PORT_NAME_LENGTH - 1 and a
previously zero-initialized destination string, but this is more
difficult to maintain.
The chosen alternative is to use strlcpy(), which properly limits the
copy len in the (srclen >= size) case to "size - 1", and which is also
more efficient than the strncpy() byte-by-byte implementation by using
memcpy. The destination string returned by strlcpy() is always NULL
terminated.
Signed-off-by: Vladimir Oltean <[email protected]>
Reviewed-by: Ramon Fried <[email protected]>
Diffstat (limited to 'scripts')
0 files changed, 0 insertions, 0 deletions
