summaryrefslogtreecommitdiff
path: root/scripts/bootgraph.pl
diff options
context:
space:
mode:
authorJustin Stitt <justinstitt@google.com>2023-08-04 00:33:44 +0300
committerTetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>2023-08-05 13:55:10 +0300
commit7b9ef666f27afde43c047de2be2985b68ad9febe (patch)
tree49ac8418ca57c382016e79917c4a1f53987c1a25 /scripts/bootgraph.pl
parenta959dbd98d1aeb51dec1cc7e5ada5d84ce16cbbc (diff)
downloadlinux-7b9ef666f27afde43c047de2be2985b68ad9febe.tar.xz
tomoyo: refactor deprecated strncpy
`strncpy` is deprecated for use on NUL-terminated destination strings [1]. A suitable replacement is `strscpy` [2] due to the fact that it guarantees NUL-termination on its destination buffer argument which is _not_ the case for `strncpy`! It should be noted that the destination buffer is zero-initialized and had a max length of `sizeof(dest) - 1`. There is likely _not_ a bug present in the current implementation. However, by switching to `strscpy` we get the benefit of no longer needing the `- 1`'s from the string copy invocations on top of `strscpy` being a safer interface all together. [1]: www.kernel.org/doc/html/latest/process/deprecated.html#strncpy-on-nul-terminated-strings [2]: https://manpages.debian.org/testing/linux-manual-4.8/strscpy.9.en.html Link: https://github.com/KSPP/linux/issues/90 Cc: linux-hardening@vger.kernel.org Signed-off-by: Justin Stitt <justinstitt@google.com> Reviewed-by: Kees Cook <keescook@chromium.org> Signed-off-by: Tetsuo Handa <penguin-kernel@I-love.SAKURA.ne.jp>
Diffstat (limited to 'scripts/bootgraph.pl')
0 files changed, 0 insertions, 0 deletions