diff options
author | Wang Xiayang <xywang.sjtu@sjtu.edu.cn> | 2019-07-31 16:15:42 +0800 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2019-08-02 17:57:18 -0700 |
commit | 3690c8c9a8edff0db077a38783112d8fe12a7dd2 (patch) | |
tree | c8f99e8488c5ebf0032bd458e87dde01ccf5fc4e /drivers/net/ethernet/freescale/enetc | |
parent | atm: iphase: Fix Spectre v1 vulnerability (diff) | |
download | linux-dev-3690c8c9a8edff0db077a38783112d8fe12a7dd2.tar.xz linux-dev-3690c8c9a8edff0db077a38783112d8fe12a7dd2.zip |
net/ethernet/qlogic/qed: force the string buffer NULL-terminated
strncpy() does not ensure NULL-termination when the input string
size equals to the destination buffer size 30.
The output string is passed to qed_int_deassertion_aeu_bit()
which calls DP_INFO() and relies NULL-termination.
Use strlcpy instead. The other conditional branch above strncpy()
needs no fix as snprintf() ensures NULL-termination.
This issue is identified by a Coccinelle script.
Signed-off-by: Wang Xiayang <xywang.sjtu@sjtu.edu.cn>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'drivers/net/ethernet/freescale/enetc')
0 files changed, 0 insertions, 0 deletions