selftests/bpf: Fix invalid use of strncat in test_sockmap
strncat()'s third argument is how many bytes will be added *in addition* to
already existing bytes in destination. Plus extra zero byte will be added
after that. So existing use in test_sockmap has many opportunities to overflow
the string and cause memory corruptions. And in this case, GCC complains for
a good reason.
Fixes: 25017cdeb1ee ("bpf: sockmap, add selftests")
Fixes: c564869d651b ("selftests/bpf: test_sockmap, print additional test options")
Fixes: 7596f11edcdb ("bpf: test_sockmap, add options for msg_pop_data() helper")
Fixes: 70f234ad2aa2 ("bpf, selftests: Add test for ktls with skb bpf ingress policy")
Fixes: ea29ae6bc81e ("bpf: add tls support for testing in test_sockmap")
Fixes: 1f9ad0bbd60b ("bpf: sockmap, add msg_peek tests to test_sockmap")
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Link: https://lore.kernel.org/bpf/20201203235440.2302137-2-andrii@kernel.org