From mboxrd@z Thu Jan 1 00:00:00 1970 From: Ferruh Yigit Subject: Re: [PATCH v4] net/tap: fix coverity warning on strncpy Date: Fri, 17 Feb 2017 16:21:53 +0000 Message-ID: <37245ce5-de84-27fb-14a7-36ad8934a8d6@intel.com> References: <20170217154304.50214-1-keith.wiles@intel.com> Mime-Version: 1.0 Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 8bit Cc: dpdk stable To: Keith Wiles , dev@dpdk.org Return-path: In-Reply-To: <20170217154304.50214-1-keith.wiles@intel.com> List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" On 2/17/2017 3:43 PM, Keith Wiles wrote: > Calling strncpy with a maximum size argument of 16 bytes on destination > array "ifr.ifr_ifrn.ifrn_name" of size 16 bytes might leave the > destination string unterminated. > > Signed-off-by: Keith Wiles net/tap: fix possibly unterminated string Coverity issue: 1407499 Fixes: 6b38b2725cdb ("net/tap: fix multi-queue support") Cc: stable@dpdk.org Applied to dpdk-next-net/master, thanks. (Updates: - patch title: It is preferred to mention from problem solved instead of the tool that found it. - Added coverity tag: This helps to trace coverity issues, defined syntax is: Coverity issue: xxx Fixes: yyyy - Added Cc: tag for stable tree: In case stable tree wants get this patch, to make patch visible. )