original_kernel/drivers/infiniband/core
Roland Dreier eabc77935d IB/umad: make sure write()s have sufficient data
Make sure that userspace passes in enough data when sending a MAD.  We
always copy at least sizeof (struct ib_user_mad) + IB_MGMT_RMPP_HDR
bytes from userspace, so anything less is definitely invalid.  Also,
if the length is less than this limit, it's possible for the second
copy_from_user() to get a negative length and trigger a BUG().

Signed-off-by: Roland Dreier <rolandd@cisco.com>
2005-11-18 14:18:26 -08:00
..
Makefile
agent.c [PATCH] fix remaining missing includes 2005-11-07 07:53:41 -08:00
agent.h
cache.c
cm.c
cm_msgs.h
core_priv.h
device.c
fmr_pool.c
mad.c [PATCH] kfree cleanup: misc remaining drivers 2005-11-07 07:54:05 -08:00
mad_priv.h
mad_rmpp.c
mad_rmpp.h
packer.c [PATCH] fix remaining missing includes 2005-11-07 07:53:41 -08:00
sa_query.c
smi.c
smi.h
sysfs.c [PATCH] fix remaining missing includes 2005-11-07 07:53:41 -08:00
ucm.c
ud_header.c [PATCH] fix remaining missing includes 2005-11-07 07:53:41 -08:00
user_mad.c IB/umad: make sure write()s have sufficient data 2005-11-18 14:18:26 -08:00
uverbs.h
uverbs_cmd.c [IB] uverbs: have kernel return QP capabilities 2005-11-10 10:22:50 -08:00
uverbs_main.c
uverbs_mem.c
verbs.c Merge branch 'for-linus' of master.kernel.org:/pub/scm/linux/kernel/git/roland/infiniband 2005-11-10 13:27:06 -08:00