[<prev] [next>] [day] [month] [year] [list]
Message-Id: <20220922013231.232933-1-ye.xingchen@zte.com.cn>
Date: Thu, 22 Sep 2022 01:32:31 +0000
From: cgel.zte@...il.com
To: acme@...nel.org
Cc: mingo@...hat.com, mark.rutland@....com,
alexander.shishkin@...ux.intel.com, jolsa@...nel.org,
namhyung@...nel.org, linux-perf-users@...r.kernel.org,
linux-kernel@...r.kernel.org, ye xingchen <ye.xingchen@....com.cn>,
Zeal Robot <zealci@....com.cn>
Subject: [PATCH linux-next] perf lock: use strscpy() is more robust and safer
From: ye xingchen <ye.xingchen@....com.cn>
The implementation of strscpy() is more robust and safer.
That's now the recommended way to copy NUL terminated strings.
Reported-by: Zeal Robot <zealci@....com.cn>
Signed-off-by: ye xingchen <ye.xingchen@....com.cn>
---
tools/perf/builtin-lock.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/tools/perf/builtin-lock.c b/tools/perf/builtin-lock.c
index 52a6a10a610c..b6837b7df110 100644
--- a/tools/perf/builtin-lock.c
+++ b/tools/perf/builtin-lock.c
@@ -949,7 +949,7 @@ static int lock_contention_caller(struct evsel *evsel, struct perf_sample *sampl
if (offset)
scnprintf(buf, size, "%s+%#lx", sym->name, offset);
else
- strlcpy(buf, sym->name, size);
+ strscpy(buf, sym->name, size);
return 0;
}
--
2.25.1
Powered by blists - more mailing lists