1. 02 3月, 2018 2 次提交
  2. 17 2月, 2018 3 次提交
  3. 15 2月, 2018 2 次提交
  4. 08 2月, 2018 1 次提交
  5. 03 2月, 2018 1 次提交
    • A
      net: cxgb4: avoid memcpy beyond end of source buffer · 1a91649f
      Arnd Bergmann 提交于
      Building with link-time-optimizations revealed that the cxgb4 driver does
      a fixed-size memcpy() from a variable-length constant string into the
      network interface name:
      
      In function 'memcpy',
          inlined from 'cfg_queues_uld.constprop' at drivers/net/ethernet/chelsio/cxgb4/cxgb4_uld.c:335:2,
          inlined from 'cxgb4_register_uld.constprop' at drivers/net/ethernet/chelsio/cxgb4/cxgb4_uld.c:719:9:
      include/linux/string.h:350:3: error: call to '__read_overflow2' declared with attribute error: detected read beyond size of object passed as 2nd parameter
         __read_overflow2();
         ^
      
      I can see two equally workable solutions: either we use a strncpy() instead
      of the memcpy() to stop at the end of the input, or we make the source buffer
      fixed length as well. This implements the latter.
      Signed-off-by: NArnd Bergmann <arnd@arndb.de>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      1a91649f
  6. 27 1月, 2018 3 次提交
  7. 26 1月, 2018 2 次提交
  8. 25 1月, 2018 1 次提交
  9. 24 1月, 2018 3 次提交
  10. 23 1月, 2018 2 次提交
  11. 22 1月, 2018 1 次提交
  12. 20 1月, 2018 3 次提交
  13. 18 1月, 2018 1 次提交
  14. 11 1月, 2018 4 次提交
  15. 04 1月, 2018 1 次提交
  16. 03 1月, 2018 3 次提交
  17. 29 12月, 2017 2 次提交
  18. 22 12月, 2017 1 次提交
  19. 20 12月, 2017 2 次提交
  20. 19 12月, 2017 1 次提交
  21. 14 12月, 2017 1 次提交