aboutsummaryrefslogtreecommitdiff
path: root/tools/perf/scripts/python/net_dropmonitor.py
diff options
context:
space:
mode:
authorJason Gerecke <[email protected]>2023-04-14 11:22:10 -0700
committerJiri Kosina <[email protected]>2023-05-23 15:06:36 +0200
commitd9eef346b601afb0bd74b49e0db06f6a5cebd030 (patch)
treead8e6988dc35dc91dd4e0eee4c4db0a6e1948b4a /tools/perf/scripts/python/net_dropmonitor.py
parent34da76dca4673ab1819830b4924bb5b436325b26 (diff)
HID: wacom: Check for string overflow from strscpy calls
The strscpy function is able to return an error code when a copy would overflow the size of the destination. The copy is stopped and the buffer terminated before overflow actually occurs so it is safe to continue execution, but we should still produce a warning should this occur. Signed-off-by: Jason Gerecke <[email protected]> Reviewed-by: Ping Cheng <[email protected]> Reviewed-by: Peter Hutterer <[email protected]> Signed-off-by: Jiri Kosina <[email protected]>
Diffstat (limited to 'tools/perf/scripts/python/net_dropmonitor.py')
0 files changed, 0 insertions, 0 deletions