From: Jouni Malinen Date: Sun, 7 Jul 2019 07:02:40 +0000 (+0300) Subject: Silence static analyzer warning about null termination of a string X-Git-Tag: hostap_2_9~92 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=4eab36595e180bd285229f5497cfc05c0fccc545;p=thirdparty%2Fhostap.git Silence static analyzer warning about null termination of a string The buf[] array is initialized to zeros, so it was already null terminated since the read() call did not allow the last character of the buffer to be overwritten. Since that was apparently not enough to make some static analyzers understand the design, use explicit null termination after a successful read() call. Signed-off-by: Jouni Malinen --- diff --git a/src/utils/wpa_debug.c b/src/utils/wpa_debug.c index c437000a7..c336e5389 100644 --- a/src/utils/wpa_debug.c +++ b/src/utils/wpa_debug.c @@ -144,6 +144,7 @@ int wpa_debug_open_linux_tracing(void) printf("failed to read /proc/mounts\n"); return -1; } + buf[buflen] = '\0'; line = strtok_r(buf, "\n", &tmp1); while (line) {