ACPICA: Add safe versions of common string functions.
authorBob Moore <robert.moore@intel.com>
Tue, 29 Oct 2013 01:29:21 +0000 (09:29 +0800)
committerRafael J. Wysocki <rafael.j.wysocki@intel.com>
Wed, 30 Oct 2013 11:24:21 +0000 (12:24 +0100)
commit73424473d0801f7079258897901ba1edc660dbd3
treea1a84628fe0799dda1fa12471ff8592bd5fff73d
parentc26f3c908091294e5909f5459b6682e10922c824
ACPICA: Add safe versions of common string functions.

This change adds and deploys "safe" versions of strcpy and strcat that
ensure that the target buffer does not overflow. These safe functions
are only helpful for processing user input and command lines. For most
ACPICA code however, the required buffer length is precisely calculated
before buffer allocation, so the use of these functions is unnecessary.
ACPICA BZ 1043.

This change only applies to the ACPICA utilities and the debugger, none
of which are not shipped with the kernel yet, so the kernel's behavior
remains unchanged after it.

References: https://bugs.acpica.org/show_bug.cgi?id=1043
Signed-off-by: Bob Moore <robert.moore@intel.com>
Signed-off-by: Lv Zheng <lv.zheng@intel.com>
Signed-off-by: Rafael J. Wysocki <rafael.j.wysocki@intel.com>
drivers/acpi/acpica/aclocal.h
drivers/acpi/acpica/acutils.h
drivers/acpi/acpica/utstring.c