Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752093AbaJTPh2 (ORCPT ); Mon, 20 Oct 2014 11:37:28 -0400 Received: from userp1040.oracle.com ([156.151.31.81]:36897 "EHLO userp1040.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752008AbaJTPhZ (ORCPT ); Mon, 20 Oct 2014 11:37:25 -0400 Date: Mon, 20 Oct 2014 18:37:07 +0300 From: Dan Carpenter To: Rickard Strandqvist Cc: Anil Gurumurthy , Sudarsana Kalluru , "James E.J. Bottomley" , Andi Kleen , Andrew Morton , Grant Likely , linux-kernel@vger.kernel.org, linux-scsi@vger.kernel.org Subject: Re: [PATCH 2/5] scsi: bfa: bfa_fcs_lport.c: Cleaning up missing null-terminate by switching from strncpy to strzcpy Message-ID: <20141020153707.GX26918@mwanda> References: <1413670390-6259-1-git-send-email-rickard_strandqvist@spectrumdigital.se> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1413670390-6259-1-git-send-email-rickard_strandqvist@spectrumdigital.se> User-Agent: Mutt/1.5.21 (2010-09-15) X-Source-IP: ucsinet21.oracle.com [156.151.31.93] Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Oct 19, 2014 at 12:13:10AM +0200, Rickard Strandqvist wrote: > Ensures that the string is null-terminate in connection with the > use of strncpy, by switching from strncpy to strzcpy. > I wish the changelogs were more clear that we have no reason to think this is a real issue. > Signed-off-by: Rickard Strandqvist > --- > drivers/scsi/bfa/bfa_fcs_lport.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/drivers/scsi/bfa/bfa_fcs_lport.c b/drivers/scsi/bfa/bfa_fcs_lport.c > index ff75ef8..78af89e 100644 > --- a/drivers/scsi/bfa/bfa_fcs_lport.c > +++ b/drivers/scsi/bfa/bfa_fcs_lport.c > @@ -2633,7 +2633,7 @@ bfa_fcs_fdmi_get_hbaattr(struct bfa_fcs_lport_fdmi_s *fdmi, > strncpy(hba_attr->driver_version, (char *)driver_info->version, > sizeof(hba_attr->driver_version)); Why do we not change this one? > > - strncpy(hba_attr->os_name, driver_info->host_os_name, > + strzcpy(hba_attr->os_name, driver_info->host_os_name, > sizeof(hba_attr->os_name)); strlcpy() would also be totally safe here. It's also safe for patch patch 3 and patch 4. Patch 5 is trickier to audit so I don't know if strlcpy() is safe. regards, dan carpenter -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/