lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 17 Nov 2015 16:22:26 -0500 From: Tejun Heo <tj@...nel.org> To: David Miller <davem@...emloft.net> Cc: pablo@...filter.org, kaber@...sh.net, kadlec@...ckhole.kfki.hu, lizefan@...wei.com, hannes@...xchg.org, netdev@...r.kernel.org, netfilter-devel@...r.kernel.org, coreteam@...filter.org, cgroups@...r.kernel.org, linux-kernel@...r.kernel.org, kernel-team@...com, daniel@...earbox.net, daniel.wagner@...-carit.de, nhorman@...driver.com, gregkh@...uxfoundation.org Subject: Re: [PATCH 2/5] kernfs: implement kernfs_walk_and_get() On Tue, Nov 17, 2015 at 04:20:40PM -0500, David Miller wrote: > From: Tejun Heo <tj@...nel.org> > Date: Tue, 17 Nov 2015 14:40:37 -0500 > > > + static char path_buf[PATH_MAX]; /* protected by kernfs_mutex */ > > + int len = strlen(path); > ... > > + if (len >= PATH_MAX) > > + return NULL; > > + > > + memcpy(path_buf, path, len + 1); > > static char path_buf[PATH_MAX]; /* protected by kernfs_mutex */ > int len = strlcpy(path_buf, path, PATH_MAX); > ... > if (len >= PATH_MAX) > return NULL; That's a lot better. Will update. Thanks. -- tejun -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists