Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp2287425pxp; Mon, 21 Mar 2022 15:58:06 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx3RUhV6Be2gdx2+nIEvBSeWMBpO+M+kW8Nt9R9470V3TZRdAzGb1fKO3wannOFThgxHC6v X-Received: by 2002:a17:90b:4b42:b0:1c7:3f6a:5d97 with SMTP id mi2-20020a17090b4b4200b001c73f6a5d97mr1494598pjb.27.1647903486555; Mon, 21 Mar 2022 15:58:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1647903486; cv=none; d=google.com; s=arc-20160816; b=EnLhNGSSF6Oo+I2PDzxi5zYJOfYRTbYlx+vEXpoT3Qa5yWLPG9A5QgoA9muc0EdPKP Ldh4ejwOaltJrcIgpz1qzoF5AaUtgaDdZSc8+86ozKvnLo31MkF+oWjbhAoBCmR3pjTh Tnc0yJOS2h+tXoDOjvsfReQeKIPLJB8nfUY1jmoOFdH5g8WZhx6RL+5IKB1avlxzirYt tGaA1RTwtah6o2uwZk4LxpxtcPcBwoSDmdj61eBN4UWqudEo4VuiVWMxYQNwrl2CUmzv kf+7qLnaCHETOEYTYOiHlirvNJIC5MCpdlSPmu8rDlLVvNCccd3UEJdkCudxbc+/OEJ7 x53g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=DhP6so4FVu1wFumZ17zahw8bgwLS+CH64phktZ+f0Z8=; b=r7+vE6chxdPpaNISM6YZRQXvRpNkvEU7QF6YzK2LFfPxHYc7tB6az/CCE8Hk9N4IrG G2B4QCkKpmNQ7THE6okTp28Z1+Ye5ZVWAqctp/zOK7/XY8DZTuAvSgMzPWmeHw7NgauL HZhOK9iT7bHTL0JS+APnQgTU3RZhzZ/Efv6Vg0CjYQl9cE15oySOodvafl+4//AbYMzd T2MkKhZmggN/jebgEyheEBZzCdXjMHhqVfEqmvExnI5BcxH8AMaybFEbCej88W3AdUat MCamvuT6aXd7X1dp2vxh3Z+bEa5h9YnJUz84hC4Irxb9ATRWvKEEgQsjhVFs43ksjhZc Evcw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id np7-20020a17090b4c4700b001c6e2da4524si613047pjb.183.2022.03.21.15.58.06 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 21 Mar 2022 15:58:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (out1.vger.email [IPv6:2620:137:e000::1:20]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id B6D04436B70; Mon, 21 Mar 2022 15:10:30 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345477AbiCUIwp (ORCPT + 99 others); Mon, 21 Mar 2022 04:52:45 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57788 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240765AbiCUIwm (ORCPT ); Mon, 21 Mar 2022 04:52:42 -0400 Received: from 1wt.eu (wtarreau.pck.nerim.net [62.212.114.60]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 78D647891F for ; Mon, 21 Mar 2022 01:51:16 -0700 (PDT) Received: (from willy@localhost) by pcw.home.local (8.15.2/8.15.2/Submit) id 22L8p0aG005720; Mon, 21 Mar 2022 09:51:00 +0100 Date: Mon, 21 Mar 2022 09:51:00 +0100 From: Willy Tarreau To: Alviro Iskandar Setiawan Cc: Ammar Faizi , "Paul E. McKenney" , Nugraha , Linux Kernel Mailing List , GNU/Weeb Mailing List Subject: Re: [RFC PATCH v1 6/6] tools/include/string: Implement `strdup()` and `strndup()` Message-ID: <20220321085100.GB5676@1wt.eu> References: <20220320093750.159991-1-ammarfaizi2@gnuweeb.org> <20220320093750.159991-7-ammarfaizi2@gnuweeb.org> <20220321075308.GD29580@1wt.eu> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.10.1 (2018-07-13) X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RDNS_NONE, SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Mar 21, 2022 at 03:16:54PM +0700, Alviro Iskandar Setiawan wrote: > On Mon, Mar 21, 2022 at 2:53 PM Willy Tarreau wrote: > > Here it can cost quite a lot for large values of maxlen. Please just use > > a variant of the proposal above like this one: > > > > size_t len; > > char *ret; > > > > len = strlen(str); > > if (len > maxlen) > > len = maxlen; > > ret = malloc(len + 1); > > if (ret) > > memcpy(ret, str, len); > > return ret; > > Maybe better to use strnlen(), see the detail at man 3 strnlen. > > size_t strnlen(const char *s, size_t maxlen); > > The strnlen() function returns the number of bytes in the string > pointed to by s, excluding the terminating null byte ('\0'), but at > most maxlen. In doing this, strnlen() looks only at the first maxlen > characters in the string pointed to by s and never beyond s[maxlen-1]. > > Should be trivial to add strnlen() with a separate patch before this patch. > > So it can be: > > size_t len; > char *ret; > > len = strnlen(str, maxlen); > ret = malloc(len + 1); > if (__builtin_expect(ret != NULL, 1)) { > memcpy(ret, str, len); > ret[len] = '\0'; > } > return ret; > > Thoughts? I thought about it as well and while I was seeking the simplest route, I agree it would indeed be cleaner. Willy