diff options
author | Waldemar Brodkorb <wbx@openadk.org> | 2017-06-15 09:26:48 +0200 |
---|---|---|
committer | Waldemar Brodkorb <wbx@openadk.org> | 2017-06-15 09:27:10 +0200 |
commit | b3c2831474cfe69a56a4562ab49aecb8224fe97e (patch) | |
tree | a143f025ab0b74b9b9d4e970b5d378f5a49efffa /target/linux/patches/4.9.32/0001-sparc64-make-string-buffers-large-enough.patch | |
parent | 36ec2163566b5bf69c8f4a0df8c8293b03f7ccad (diff) |
linux: update 4.4.x/4.9.x/4.11.x kernel
Diffstat (limited to 'target/linux/patches/4.9.32/0001-sparc64-make-string-buffers-large-enough.patch')
-rw-r--r-- | target/linux/patches/4.9.32/0001-sparc64-make-string-buffers-large-enough.patch | 41 |
1 files changed, 41 insertions, 0 deletions
diff --git a/target/linux/patches/4.9.32/0001-sparc64-make-string-buffers-large-enough.patch b/target/linux/patches/4.9.32/0001-sparc64-make-string-buffers-large-enough.patch new file mode 100644 index 000000000..2b1eaeedf --- /dev/null +++ b/target/linux/patches/4.9.32/0001-sparc64-make-string-buffers-large-enough.patch @@ -0,0 +1,41 @@ +From b5c3206190f1fddd100b3060eb15f0d775ffeab8 Mon Sep 17 00:00:00 2001 +From: Dan Carpenter <dan.carpenter@oracle.com> +Date: Fri, 25 Nov 2016 14:03:55 +0300 +Subject: [PATCH] sparc64: make string buffers large enough + +My static checker complains that if "lvl" is ULONG_MAX (this is 64 bit) +then some of the strings will overflow. I don't know if that's possible +but it seems simple enough to make the buffers slightly larger. + +Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> +Signed-off-by: David S. Miller <davem@davemloft.net> +Signed-off-by: Waldemar Brodkorb <wbx@openadk.org> +--- + arch/sparc/kernel/traps_64.c | 4 ++-- + 1 file changed, 2 insertions(+), 2 deletions(-) + +diff --git a/arch/sparc/kernel/traps_64.c b/arch/sparc/kernel/traps_64.c +index 4094a51..496fa92 100644 +--- a/arch/sparc/kernel/traps_64.c ++++ b/arch/sparc/kernel/traps_64.c +@@ -85,7 +85,7 @@ static void dump_tl1_traplog(struct tl1_traplog *p) + + void bad_trap(struct pt_regs *regs, long lvl) + { +- char buffer[32]; ++ char buffer[36]; + siginfo_t info; + + if (notify_die(DIE_TRAP, "bad trap", regs, +@@ -116,7 +116,7 @@ void bad_trap(struct pt_regs *regs, long lvl) + + void bad_trap_tl1(struct pt_regs *regs, long lvl) + { +- char buffer[32]; ++ char buffer[36]; + + if (notify_die(DIE_TRAP_TL1, "bad trap tl1", regs, + 0, lvl, SIGTRAP) == NOTIFY_STOP) +-- +2.1.4 + |