Fix ASan check __strcpy_chk-param-overlap fail sandbox/y.yamshchiko/asan accepted/tizen/base/x/asan/20241010.231911
authorYaroslav Yamshchikov <y.yamshchiko@samsung.com>
Tue, 24 Sep 2024 16:18:55 +0000 (19:18 +0300)
committerDongkyun Son <dongkyun.s@samsung.com>
Thu, 10 Oct 2024 01:40:20 +0000 (10:40 +0900)
commit07c8b4f5d65201a86948d089101d9e6806bae1aa
tree6457aa404e5a22f01a1d56f3ced7e58748510027
parent44d0acde20ef5106a20b616128156465eb86ce28
Fix ASan check __strcpy_chk-param-overlap fail

The check fail caused by using of undocumented abilities of strcpy.
ASan complains when strcpy-family functions used
with overlapping memory regions. strcpy specification does
not allow overlapping. This change makes strcpy wrapper
called strcpy_safe across whole parse.y, the wrapper detects
overlapping and redirects to memmove in such case.

Change-Id: I8c1c2d2195ade6bd2cd1c33690d656d0ceac33d8
Signed-off-by: Yaroslav Yamshchikov <y.yamshchiko@samsung.com>
parse.y