Revision 66cb3a2d7ad0d0e9af4d3430a4f2a32ffb9ac098 authored by David Arcari on 26 May 2022, 20:31:40 UTC, committed by Hans de Goede on 10 June 2022, 19:59:08 UTC
The probe function pmt_crashlog_probe() may incorrectly reference
the 'priv->entry array' as it uses 'i' to reference the array instead
of 'priv->num_entries' as it should.  This is similar to the problem
that was addressed in pmt_telemetry_probe via commit 2cdfa0c20d58
("platform/x86/intel: Fix 'rmmod pmt_telemetry' panic").

Cc: "David E. Box" <david.e.box@linux.intel.com>
Cc: Hans de Goede <hdegoede@redhat.com>
Cc: Mark Gross <markgross@kernel.org>
Cc: linux-kernel@vger.kernel.org
Signed-off-by: David Arcari <darcari@redhat.com>
Reviewed-by: David E. Box <david.e.box@linux.intel.com>
Link: https://lore.kernel.org/r/20220526203140.339120-1-darcari@redhat.com
Signed-off-by: Hans de Goede <hdegoede@redhat.com>
1 parent b9c29f3
History
File Mode Size
read_overflow-memchr.c -rw-r--r-- 123 bytes
read_overflow-memchr_inv.c -rw-r--r-- 127 bytes
read_overflow-memcmp.c -rw-r--r-- 124 bytes
read_overflow-memscan.c -rw-r--r-- 124 bytes
read_overflow2-memcmp.c -rw-r--r-- 124 bytes
read_overflow2-memcpy.c -rw-r--r-- 127 bytes
read_overflow2-memmove.c -rw-r--r-- 128 bytes
read_overflow2_field-memcpy.c -rw-r--r-- 138 bytes
read_overflow2_field-memmove.c -rw-r--r-- 139 bytes
test_fortify.h -rw-r--r-- 775 bytes
write_overflow-memcpy.c -rw-r--r-- 135 bytes
write_overflow-memmove.c -rw-r--r-- 136 bytes
write_overflow-memset.c -rw-r--r-- 130 bytes
write_overflow-strcpy-lit.c -rw-r--r-- 113 bytes
write_overflow-strcpy.c -rw-r--r-- 109 bytes
write_overflow-strlcpy-src.c -rw-r--r-- 129 bytes
write_overflow-strlcpy.c -rw-r--r-- 143 bytes
write_overflow-strncpy-src.c -rw-r--r-- 129 bytes
write_overflow-strncpy.c -rw-r--r-- 143 bytes
write_overflow-strscpy.c -rw-r--r-- 143 bytes
write_overflow_field-memcpy.c -rw-r--r-- 138 bytes
write_overflow_field-memmove.c -rw-r--r-- 139 bytes
write_overflow_field-memset.c -rw-r--r-- 137 bytes

back to top