From 4eab36595e180bd285229f5497cfc05c0fccc545 Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Sun, 7 Jul 2019 10:02:40 +0300 Subject: [PATCH] Silence static analyzer warning about null termination of a string The buf[] array is initialized to zeros, so it was already null terminated since the read() call did not allow the last character of the buffer to be overwritten. Since that was apparently not enough to make some static analyzers understand the design, use explicit null termination after a successful read() call. Signed-off-by: Jouni Malinen --- src/utils/wpa_debug.c | 1 + 1 file changed, 1 insertion(+) diff --git a/src/utils/wpa_debug.c b/src/utils/wpa_debug.c index c437000a7..c336e5389 100644 --- a/src/utils/wpa_debug.c +++ b/src/utils/wpa_debug.c @@ -144,6 +144,7 @@ int wpa_debug_open_linux_tracing(void) printf("failed to read /proc/mounts\n"); return -1; } + buf[buflen] = '\0'; line = strtok_r(buf, "\n", &tmp1); while (line) {