From 61a046d9171d0c59a27588191eaa807c32737b5d Mon Sep 17 00:00:00 2001 From: Mathieu Desnoyers Date: Mon, 16 May 2016 21:43:03 -0400 Subject: [PATCH] Fix: illegal memory access in test_create_ust_event_exclusion MIME-Version: 1.0 Content-Type: text/plain; charset=utf8 Content-Transfer-Encoding: 8bit Found by Coverity: CID 1243019 (#1 of 1): Buffer not null terminated (BUFFER_SIZE_WARNING)1. buffer_size_warning: Calling strncpy with a maximum size argument of 256 bytes on destination array ev.name of size 256 bytes might leave the destination string unterminated. Signed-off-by: Mathieu Desnoyers Signed-off-by: Jérémie Galarneau --- tests/unit/test_ust_data.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/tests/unit/test_ust_data.c b/tests/unit/test_ust_data.c index 58f76435e..d81169572 100644 --- a/tests/unit/test_ust_data.c +++ b/tests/unit/test_ust_data.c @@ -38,7 +38,7 @@ #define RANDOM_STRING_LEN 11 /* Number of TAP tests in this file */ -#define NUM_TESTS 14 +#define NUM_TESTS 15 /* For error.h */ int lttng_opt_quiet = 1; @@ -156,7 +156,8 @@ static void test_create_ust_event_exclusion(void) /* make a wildcarded event name */ name = get_random_string(); name[strlen(name) - 1] = '*'; - strncpy(ev.name, name, LTTNG_SYMBOL_NAME_LEN); + ok(lttng_strncpy(ev.name, name, LTTNG_SYMBOL_NAME_LEN) == 0, + "Validate string length"); ev.type = LTTNG_EVENT_TRACEPOINT; ev.loglevel_type = LTTNG_EVENT_LOGLEVEL_ALL; -- 2.34.1