summaryrefslogtreecommitdiff
path: root/fs/orangefs/protocol.h
diff options
context:
space:
mode:
authorMartin Brandenburg <martin@omnibond.com>2016-04-08 20:33:21 +0300
committerMike Marshall <hubcap@omnibond.com>2016-04-08 21:10:34 +0300
commit2eacea74cc465edc23ce5a4dd5c2213008ac3a05 (patch)
tree6c937fb77a9ccae02a99c9c3fb80db83040d577a /fs/orangefs/protocol.h
parentf83140c1467e22ba9ee9389bc4e6c3e117f2296e (diff)
downloadlinux-2eacea74cc465edc23ce5a4dd5c2213008ac3a05.tar.xz
orangefs: strncpy -> strscpy
It would have been possible for a rogue client-core to send in a symlink target which is not NUL terminated. This returns EIO if the client-core gives us corrupt data. Leave debugfs and superblock code as is for now. Other dcache.c and namei.c strncpy instances are safe because ORANGEFS_NAME_MAX = NAME_MAX + 1; there is always enough space for a name plus a NUL byte. Signed-off-by: Martin Brandenburg <martin@omnibond.com> Signed-off-by: Mike Marshall <hubcap@omnibond.com>
Diffstat (limited to 'fs/orangefs/protocol.h')
0 files changed, 0 insertions, 0 deletions