Le 22/06/2018 à 16:43, Breno Leitao a écrit :
Hi Segher,

On 06/21/2018 08:18 PM, Segher Boessenkool wrote:
On Wed, Jun 20, 2018 at 07:51:11PM -0300, Breno Leitao wrote:
-       strncpy(prog, argv[0], strlen(argv[0]));
+       strncpy(prog, argv[0], sizeof(prog) - 1);

        strncpy(prog, argv[0], sizeof prog);
        if (prog[sizeof prog - 1])
                scream_bloody_murder();

Silently using the wrong data is a worse habit than not checking for
overflows ;-)

Completely agree! Thanks for bringing this up.

If you don't mind, I would solve this problem slightly different, as it seems
to be more readable.


-       strncpy(prog, argv[0], strlen(argv[0]));
+       if (strlen(argv[0]) >= LEN_MAX){

wouldn't it be better to use sizeof(prog) instead of LEN_MAX ?

+               fprintf(stderr, "Very big executable name: %s\n", argv[0]);
+               return 1;
+       }
+
+       strncpy(prog, argv[0], sizeof(prog) - 1);

You have checked before that argv[0] is not too long, so you should not need to use strncpy(), strcpy() would do it.

         return test_harness(dscr_inherit_exec, "dscr_inherit_exec_test");


Christophe

Reply via email to