return values were used, so direct replacement is safe.
[1] https://www.kernel.org/doc/html/latest/process/deprecated.html#strlcpy
[2] https://github.com/KSPP/linux/issues/89
Signed-off-by: Azeem Shaikh
---
arch/um/include/shared/user.h |1 -
arch/um/os-Linux/umid.c |6 +++---
2
return values were used, so direct replacement is safe.
[1] https://www.kernel.org/doc/html/latest/process/deprecated.html#strlcpy
[2] https://github.com/KSPP/linux/issues/89
Signed-off-by: Azeem Shaikh
---
v1: https://lore.kernel.org/all/20230530164004.986750-1-azeemshaik...@gmail.com/
v2:
https
On Tue, Jun 6, 2023 at 4:51 PM Richard Weinberger wrote:
>
> - Ursprüngliche Mail -
> > Von: "Azeem Shaikh"
> > strlcpy() reads the entire source buffer first.
> > This read may exceed the destination size limit.
> > This is both inefficient and ca
return values were used, so direct replacement is safe.
[1] https://www.kernel.org/doc/html/latest/process/deprecated.html#strlcpy
[2] https://github.com/KSPP/linux/issues/89
Signed-off-by: Azeem Shaikh
Reported-by: kernel test robot
Closes:
https://lore.kernel.org/oe-kbuild-all/202305311135
Thanks Geert and Richard for the review.
On Wed, May 31, 2023 at 4:05 AM Geert Uytterhoeven wrote:
>
> On Wed, May 31, 2023 at 8:23 AM Richard Weinberger wrote:
> > - Ursprüngliche Mail -
> > arch/um/os-Linux/drivers/tuntap_user.c:149:17: error: implicit
> > declaration of
> >
return values were used, so direct replacement is safe.
[1] https://www.kernel.org/doc/html/latest/process/deprecated.html#strlcpy
[2] https://github.com/KSPP/linux/issues/89
Signed-off-by: Azeem Shaikh
---
arch/um/os-Linux/drivers/tuntap_user.c |2 +-
1 file changed, 1 insertion(+), 1