Skip to content

Commit

Permalink
Fix: illegal memory access in test_create_ust_event_exclusion
Browse files Browse the repository at this point in the history
Found by Coverity:
CID 1243019 (#1 of 1): Buffer not null terminated
(BUFFER_SIZE_WARNING)1. buffer_size_warning: Calling strncpy with a
maximum size argument of 256 bytes on destination array ev.name of size
256 bytes might leave the destination string unterminated.

Signed-off-by: Mathieu Desnoyers <[email protected]>
Signed-off-by: Jérémie Galarneau <[email protected]>
  • Loading branch information
compudj authored and jgalar committed May 17, 2016
1 parent a84aca5 commit 61a046d
Showing 1 changed file with 3 additions and 2 deletions.
5 changes: 3 additions & 2 deletions tests/unit/test_ust_data.c
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@
#define RANDOM_STRING_LEN 11

/* Number of TAP tests in this file */
#define NUM_TESTS 14
#define NUM_TESTS 15

/* For error.h */
int lttng_opt_quiet = 1;
Expand Down Expand Up @@ -156,7 +156,8 @@ static void test_create_ust_event_exclusion(void)
/* make a wildcarded event name */
name = get_random_string();
name[strlen(name) - 1] = '*';
strncpy(ev.name, name, LTTNG_SYMBOL_NAME_LEN);
ok(lttng_strncpy(ev.name, name, LTTNG_SYMBOL_NAME_LEN) == 0,
"Validate string length");

ev.type = LTTNG_EVENT_TRACEPOINT;
ev.loglevel_type = LTTNG_EVENT_LOGLEVEL_ALL;
Expand Down

0 comments on commit 61a046d

Please sign in to comment.