[patch 6/8] slram: fix read buffer overflow
akpm at linux-foundation.org
akpm at linux-foundation.org
Thu Aug 6 19:05:36 EDT 2009
From: Roel Kluin <roel.kluin at gmail.com>
map[count] is checked before count < SLRAM_MAX_DEVICES_PARAMS
declared on drivers/mtd/devices/slram.c:66:
static char *map[SLRAM_MAX_DEVICES_PARAMS];
[akpm at linux-foundation.org: cleanups]
Signed-off-by: Roel Kluin <roel.kluin at gmail.com>
Cc: David Woodhouse <dwmw2 at infradead.org>
Signed-off-by: Andrew Morton <akpm at linux-foundation.org>
---
drivers/mtd/devices/slram.c | 5 ++---
1 file changed, 2 insertions(+), 3 deletions(-)
diff -puN drivers/mtd/devices/slram.c~slram-read-buffer-overflow drivers/mtd/devices/slram.c
--- a/drivers/mtd/devices/slram.c~slram-read-buffer-overflow
+++ a/drivers/mtd/devices/slram.c
@@ -341,9 +341,8 @@ static int __init init_slram(void)
#else
int count;
- for (count = 0; (map[count]) && (count < SLRAM_MAX_DEVICES_PARAMS);
- count++) {
- }
+ for (count = 0; count < SLRAM_MAX_DEVICES_PARAMS && map[count]; count++)
+ ;
if ((count % 3 != 0) || (count == 0)) {
E("slram: not enough parameters.\n");
_
More information about the linux-mtd
mailing list