PING: [PATCH] Don't overflow when writing a key
Jan-Benedict Glaw
jbglaw at lug-owl.de
Thu Oct 7 10:45:10 PDT 2021
On Thu, 2021-10-07 17:20:47 +0200, Richard Weinberger <richard at nod.at> wrote:
> > So ... The code does _not_ overflow, that's good first of all. It's
> > just a bit confusing how the key bytes are written to the buffer. At
> > least I was easily distracted by the two different sizes.
>
> If you find a better way to write the function, I'm all open for a patch.
> But please make sure the generated code is sane.
That wouldn't be terribly complicated, but I have no way to actually
*test* that. It's just an issue I found while doing mass-builds for
all of Linux's defconfigs. If there's anybody around helping with
testing, I'd happily work on that.
Thanks,
Jan-Benedict
--
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 195 bytes
Desc: not available
URL: <http://lists.infradead.org/pipermail/linux-mtd/attachments/20211007/973626ea/attachment.sig>
More information about the linux-mtd
mailing list