Print this page
*** 503,513 ****
event->ine_event.mask = (uint32_t)mask;
event->ine_event.cookie = cookie;
event->ine_event.len = len;
if (name != NULL)
! strcpy(event->ine_event.name, name);
if (tail != NULL) {
tail->ine_next = event;
} else {
VERIFY(state->ins_head == NULL);
--- 503,513 ----
event->ine_event.mask = (uint32_t)mask;
event->ine_event.cookie = cookie;
event->ine_event.len = len;
if (name != NULL)
! (void) strcpy(event->ine_event.name, name);
if (tail != NULL) {
tail->ine_next = event;
} else {
VERIFY(state->ins_head == NULL);
*** 627,637 ****
VERIFY(name != NULL);
inotify_watch_hold(parent);
watch->inw_mask &= IN_CHILD_EVENTS;
watch->inw_parent = parent;
watch->inw_name = kmem_alloc(strlen(name) + 1, KM_SLEEP);
! strcpy(watch->inw_name, name);
avl_add(&parent->inw_children, watch);
}
/*
--- 627,638 ----
VERIFY(name != NULL);
inotify_watch_hold(parent);
watch->inw_mask &= IN_CHILD_EVENTS;
watch->inw_parent = parent;
watch->inw_name = kmem_alloc(strlen(name) + 1, KM_SLEEP);
! /* strcpy() is safe, because strlen(name) bounds us. */
! (void) strcpy(watch->inw_name, name);
avl_add(&parent->inw_children, watch);
}
/*