diff options
Diffstat (limited to 'target/linux/patches/4.9.32/0001-sparc64-make-string-buffers-large-enough.patch')
-rw-r--r-- | target/linux/patches/4.9.32/0001-sparc64-make-string-buffers-large-enough.patch | 41 |
1 files changed, 0 insertions, 41 deletions
diff --git a/target/linux/patches/4.9.32/0001-sparc64-make-string-buffers-large-enough.patch b/target/linux/patches/4.9.32/0001-sparc64-make-string-buffers-large-enough.patch deleted file mode 100644 index 2b1eaeedf..000000000 --- a/target/linux/patches/4.9.32/0001-sparc64-make-string-buffers-large-enough.patch +++ /dev/null @@ -1,41 +0,0 @@ -From b5c3206190f1fddd100b3060eb15f0d775ffeab8 Mon Sep 17 00:00:00 2001 -From: Dan Carpenter <dan.carpenter@oracle.com> -Date: Fri, 25 Nov 2016 14:03:55 +0300 -Subject: [PATCH] sparc64: make string buffers large enough - -My static checker complains that if "lvl" is ULONG_MAX (this is 64 bit) -then some of the strings will overflow. I don't know if that's possible -but it seems simple enough to make the buffers slightly larger. - -Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> -Signed-off-by: David S. Miller <davem@davemloft.net> -Signed-off-by: Waldemar Brodkorb <wbx@openadk.org> ---- - arch/sparc/kernel/traps_64.c | 4 ++-- - 1 file changed, 2 insertions(+), 2 deletions(-) - -diff --git a/arch/sparc/kernel/traps_64.c b/arch/sparc/kernel/traps_64.c -index 4094a51..496fa92 100644 ---- a/arch/sparc/kernel/traps_64.c -+++ b/arch/sparc/kernel/traps_64.c -@@ -85,7 +85,7 @@ static void dump_tl1_traplog(struct tl1_traplog *p) - - void bad_trap(struct pt_regs *regs, long lvl) - { -- char buffer[32]; -+ char buffer[36]; - siginfo_t info; - - if (notify_die(DIE_TRAP, "bad trap", regs, -@@ -116,7 +116,7 @@ void bad_trap(struct pt_regs *regs, long lvl) - - void bad_trap_tl1(struct pt_regs *regs, long lvl) - { -- char buffer[32]; -+ char buffer[36]; - - if (notify_die(DIE_TRAP_TL1, "bad trap tl1", regs, - 0, lvl, SIGTRAP) == NOTIFY_STOP) --- -2.1.4 - |