diff options
author | Martin Brandenburg <martin@omnibond.com> | 2016-04-08 13:33:21 -0400 |
---|---|---|
committer | Mike Marshall <hubcap@omnibond.com> | 2016-04-08 14:10:34 -0400 |
commit | 2eacea74cc465edc23ce5a4dd5c2213008ac3a05 (patch) | |
tree | 6c937fb77a9ccae02a99c9c3fb80db83040d577a /lib/lz4 | |
parent | f83140c1467e22ba9ee9389bc4e6c3e117f2296e (diff) |
orangefs: strncpy -> strscpy
It would have been possible for a rogue client-core to send in a symlink
target which is not NUL terminated. This returns EIO if the client-core
gives us corrupt data.
Leave debugfs and superblock code as is for now.
Other dcache.c and namei.c strncpy instances are safe because
ORANGEFS_NAME_MAX = NAME_MAX + 1; there is always enough space for a
name plus a NUL byte.
Signed-off-by: Martin Brandenburg <martin@omnibond.com>
Signed-off-by: Mike Marshall <hubcap@omnibond.com>
Diffstat (limited to 'lib/lz4')
0 files changed, 0 insertions, 0 deletions