diff options
author | Bart Van Assche <[email protected]> | 2018-10-08 14:28:51 -0700 |
---|---|---|
committer | Christoph Hellwig <[email protected]> | 2018-10-17 08:58:26 +0200 |
commit | 5eadc9cce17100caef88e972abeeeca7ef6d8a92 (patch) | |
tree | b1a5db932cce38dae81a9ba074d640b3c2525657 /lib/memory-notifier-error-inject.c | |
parent | 40581d1a91a1527e1e15350e479156810a389a96 (diff) |
nvmet: use strlcpy() instead of strcpy()
Although the code modified by this patch looks fine to me, this patch avoids
that Coverity reports the following complaint (ID 1364971 and ID 1364973):
"You might overrun the 256-character fixed-size string id->subnqn".
Signed-off-by: Bart Van Assche <[email protected]>
Reviewed-by: Chaitanya Kulkarni <[email protected]>
Signed-off-by: Christoph Hellwig <[email protected]>
Diffstat (limited to 'lib/memory-notifier-error-inject.c')
0 files changed, 0 insertions, 0 deletions