nfv/guest-agent/guest-scale-agent-2.0
Luis Botello be468f45a7 Improve security by avoiding buffer overflows
This patch adds compiler flags to improve the security of STX code.
Flags added:
Format string vulnerabilities:           CFLAGS="-Wformat -Wformat-security"
Compiler will treat string format warnings as errors,
so at compiling level, buffer overflow is avoided.

Story: 2004380
Task: 28808

Signed-off-by: Luis Botello  <luis.botello.ortega@intel.com>
Reviewed-by: Erich Cordoba <erich.cordoba.malibran@intel.com>
             Victor Rodriguez <vm.rod25@gmail.com>
Suggested-by: Victor Rodriguez <vm.rod25@gmail.com>
              Erich Cordoba <erich.cordoba.malibran@intel.com>

Change-Id: I7e844718e14b35893f9eeb725e32d9d7477f0d57
2019-01-09 05:46:04 -06:00
..
bin StarlingX open source release updates 2018-05-31 07:36:51 -07:00
docs Change compute node to worker node personality 2018-12-14 14:15:16 -05:00
obj StarlingX open source release updates 2018-05-31 07:36:51 -07:00
scripts StarlingX open source release updates 2018-05-31 07:36:51 -07:00
LICENSE StarlingX open source release updates 2018-05-31 07:36:51 -07:00
Makefile Improve security by avoiding buffer overflows 2019-01-09 05:46:04 -06:00
Makefile.sdk StarlingX open source release updates 2018-05-31 07:36:51 -07:00
guest_scale_agent.c free memory and file handle when it is no longer in use 2018-11-15 13:40:50 +08:00
guest_scale_helper.c StarlingX open source release updates 2018-05-31 07:36:51 -07:00
misc.h StarlingX open source release updates 2018-05-31 07:36:51 -07:00
parser.c free memory and file handle when it is no longer in use 2018-11-15 13:40:50 +08:00
parser_test.c StarlingX open source release updates 2018-05-31 07:36:51 -07:00