diff options
author | Martin Brandenburg <martin@omnibond.com> | 2016-04-08 19:33:21 +0200 |
---|---|---|
committer | Mike Marshall <hubcap@omnibond.com> | 2016-04-08 20:10:34 +0200 |
commit | 2eacea74cc465edc23ce5a4dd5c2213008ac3a05 (patch) | |
tree | 6c937fb77a9ccae02a99c9c3fb80db83040d577a /CREDITS | |
parent | orangefs: clean up truncate ctime and mtime setting (diff) | |
download | linux-2eacea74cc465edc23ce5a4dd5c2213008ac3a05.tar.xz linux-2eacea74cc465edc23ce5a4dd5c2213008ac3a05.zip |
orangefs: strncpy -> strscpy
It would have been possible for a rogue client-core to send in a symlink
target which is not NUL terminated. This returns EIO if the client-core
gives us corrupt data.
Leave debugfs and superblock code as is for now.
Other dcache.c and namei.c strncpy instances are safe because
ORANGEFS_NAME_MAX = NAME_MAX + 1; there is always enough space for a
name plus a NUL byte.
Signed-off-by: Martin Brandenburg <martin@omnibond.com>
Signed-off-by: Mike Marshall <hubcap@omnibond.com>
Diffstat (limited to 'CREDITS')
0 files changed, 0 insertions, 0 deletions