summaryrefslogtreecommitdiffstats
path: root/recipes-extended/dpdk/dpdk/dpdk-17.11-Fix-strncpy-error-for-GCC8.patch
diff options
context:
space:
mode:
Diffstat (limited to 'recipes-extended/dpdk/dpdk/dpdk-17.11-Fix-strncpy-error-for-GCC8.patch')
-rw-r--r--recipes-extended/dpdk/dpdk/dpdk-17.11-Fix-strncpy-error-for-GCC8.patch82
1 files changed, 0 insertions, 82 deletions
diff --git a/recipes-extended/dpdk/dpdk/dpdk-17.11-Fix-strncpy-error-for-GCC8.patch b/recipes-extended/dpdk/dpdk/dpdk-17.11-Fix-strncpy-error-for-GCC8.patch
deleted file mode 100644
index 2014b3e..0000000
--- a/recipes-extended/dpdk/dpdk/dpdk-17.11-Fix-strncpy-error-for-GCC8.patch
+++ /dev/null
@@ -1,82 +0,0 @@
1From 30234e8bf0a8c0fe348aaa147307488f59b3265a Mon Sep 17 00:00:00 2001
2From: He Zhe <zhe.he@windriver.com>
3Date: Mon, 13 Aug 2018 20:06:31 +0800
4Subject: [PATCH] dpdk 17.11: Fix strncpy error for GCC8
5
6GCC 8 adds -Wstringop-truncation. If -Werror=stringop-truncation is
7enabled. We will meet errors like the following:
8
9examples/vhost_scsi/scsi.c:213:4: error: 'strncpy' output may be truncated
10copying 32 bytes from a string of length 63 [-Werror=stringop-truncation]
11| strncpy((char *)vpage->params, bdev->name, 32);
12| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
13
14Upstream-Status: Submitted [stable@dpdk.org]
15
16Signed-off-by: He Zhe <zhe.he@windriver.com>
17---
18 examples/ip_pipeline/config_parse_tm.c | 2 +-
19 examples/ipsec-secgw/parser.c | 2 +-
20 examples/vhost_scsi/scsi.c | 6 +++---
21 3 files changed, 5 insertions(+), 5 deletions(-)
22
23diff --git a/examples/ip_pipeline/config_parse_tm.c b/examples/ip_pipeline/config_parse_tm.c
24index e75eed7..1c945c9 100644
25--- a/examples/ip_pipeline/config_parse_tm.c
26+++ b/examples/ip_pipeline/config_parse_tm.c
27@@ -352,7 +352,7 @@ tm_cfgfile_load_sched_subport(
28 char name[CFG_NAME_LEN + 1];
29
30 profile = atoi(entries[j].value);
31- strncpy(name,
32+ memcpy(name,
33 entries[j].name,
34 sizeof(name));
35 n_tokens = rte_strsplit(
36diff --git a/examples/ipsec-secgw/parser.c b/examples/ipsec-secgw/parser.c
37index 9d0ea46..e0881b7 100644
38--- a/examples/ipsec-secgw/parser.c
39+++ b/examples/ipsec-secgw/parser.c
40@@ -544,7 +544,7 @@ parse_cfg_file(const char *cfg_filename)
41 goto error_exit;
42 }
43
44- strncpy(str + strlen(str), oneline,
45+ memcpy(str + strlen(str), oneline,
46 strlen(oneline));
47
48 continue;
49diff --git a/examples/vhost_scsi/scsi.c b/examples/vhost_scsi/scsi.c
50index fd430ec..47c5c83 100644
51--- a/examples/vhost_scsi/scsi.c
52+++ b/examples/vhost_scsi/scsi.c
53@@ -210,7 +210,7 @@ vhost_bdev_scsi_inquiry_command(struct vhost_block_dev *bdev,
54 break;
55 case SPC_VPD_UNIT_SERIAL_NUMBER:
56 hlen = 4;
57- strncpy((char *)vpage->params, bdev->name, 32);
58+ memcpy((char *)vpage->params, bdev->name, 32);
59 vpage->alloc_len = rte_cpu_to_be_16(32);
60 break;
61 case SPC_VPD_DEVICE_IDENTIFICATION:
62@@ -247,7 +247,7 @@ vhost_bdev_scsi_inquiry_command(struct vhost_block_dev *bdev,
63 strncpy((char *)desig->desig, "INTEL", 8);
64 vhost_strcpy_pad((char *)&desig->desig[8],
65 bdev->product_name, 16, ' ');
66- strncpy((char *)&desig->desig[24], bdev->name, 32);
67+ memcpy((char *)&desig->desig[24], bdev->name, 32);
68 len += sizeof(struct scsi_desig_desc) + 8 + 16 + 32;
69
70 buf += sizeof(struct scsi_desig_desc) + desig->len;
71@@ -312,7 +312,7 @@ vhost_bdev_scsi_inquiry_command(struct vhost_block_dev *bdev,
72 bdev->product_name);
73
74 /* PRODUCT REVISION LEVEL */
75- strncpy((char *)inqdata->product_rev, "0001", 4);
76+ memcpy((char *)inqdata->product_rev, "0001", 4);
77
78 /* Standard inquiry data ends here. Only populate
79 * remaining fields if alloc_len indicates enough
80--
812.7.4
82