|
@@ -1,41 +0,0 @@
|
|
|
-From b5c3206190f1fddd100b3060eb15f0d775ffeab8 Mon Sep 17 00:00:00 2001
|
|
|
-From: Dan Carpenter <dan.carpenter@oracle.com>
|
|
|
-Date: Fri, 25 Nov 2016 14:03:55 +0300
|
|
|
-Subject: [PATCH] sparc64: make string buffers large enough
|
|
|
-
|
|
|
-My static checker complains that if "lvl" is ULONG_MAX (this is 64 bit)
|
|
|
-then some of the strings will overflow. I don't know if that's possible
|
|
|
-but it seems simple enough to make the buffers slightly larger.
|
|
|
-
|
|
|
-Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
|
|
|
-Signed-off-by: David S. Miller <davem@davemloft.net>
|
|
|
-Signed-off-by: Waldemar Brodkorb <wbx@openadk.org>
|
|
|
----
|
|
|
- arch/sparc/kernel/traps_64.c | 4 ++--
|
|
|
- 1 file changed, 2 insertions(+), 2 deletions(-)
|
|
|
-
|
|
|
-diff --git a/arch/sparc/kernel/traps_64.c b/arch/sparc/kernel/traps_64.c
|
|
|
-index 4094a51..496fa92 100644
|
|
|
---- a/arch/sparc/kernel/traps_64.c
|
|
|
-+++ b/arch/sparc/kernel/traps_64.c
|
|
|
-@@ -85,7 +85,7 @@ static void dump_tl1_traplog(struct tl1_traplog *p)
|
|
|
-
|
|
|
- void bad_trap(struct pt_regs *regs, long lvl)
|
|
|
- {
|
|
|
-- char buffer[32];
|
|
|
-+ char buffer[36];
|
|
|
- siginfo_t info;
|
|
|
-
|
|
|
- if (notify_die(DIE_TRAP, "bad trap", regs,
|
|
|
-@@ -116,7 +116,7 @@ void bad_trap(struct pt_regs *regs, long lvl)
|
|
|
-
|
|
|
- void bad_trap_tl1(struct pt_regs *regs, long lvl)
|
|
|
- {
|
|
|
-- char buffer[32];
|
|
|
-+ char buffer[36];
|
|
|
-
|
|
|
- if (notify_die(DIE_TRAP_TL1, "bad trap tl1", regs,
|
|
|
- 0, lvl, SIGTRAP) == NOTIFY_STOP)
|
|
|
---
|
|
|
-2.1.4
|
|
|
-
|