lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <cover.1731404695.git.u.kleine-koenig@baylibre.com>
Date: Mon, 18 Nov 2024 12:19:54 +0100
From: Uwe Kleine-König <u.kleine-koenig@...libre.com>
To: Lars-Peter Clausen <lars@...afoo.de>,
	Michael Hennerich <Michael.Hennerich@...log.com>,
	Jonathan Cameron <jic23@...nel.org>
Cc: linux-iio@...r.kernel.org,
	linux-kernel@...r.kernel.org
Subject: [PATCH v2 0/2] iio: adc: ad7124: Implement input validation

Hello,

(implicit) v1 of the series can be found at
https://lore.kernel.org/linux-iio/20241108181813.272593-4-u.kleine-koenig@baylibre.com.
This v2 bases on v6.12-rc1 + commit 64612ec9b909 ("iio: adc: ad7124:
Disable all channels at probe time") which is already in next.

Changes since v1:

 - reword commit log of patch #1 to honestly tell that the maximal
   number of logical channels is a limitation of the current driver
   implementation (and not one imposed by hardware).

 - Make the driver explicitly fail to load if > 16 channels are defined.
   v1 only limited the maximal channel address which then later yielded
   a probe failure on the first channel exeeding that maximum.

 - in patch #2 fix "passing zero to 'dev_err_probe'" as reported by
   smatch + Dan Carpenter.

 - Fix my address in patch #2's S-o-b trailer.

Uwe Kleine-König (2):
  iio: adc: ad7124: Don't create more channels than the driver can
    handle
  iio: adc: ad7124: Refuse invalid input specifiers

 drivers/iio/adc/ad7124.c | 28 ++++++++++++++++++++++++++++
 1 file changed, 28 insertions(+)

base-commit: 9852d85ec9d492ebef56dc5f229416c925758edc
prerequisite-patch-id: 617af17fc377a984762c61893b9f2a92ae62213a
-- 
2.45.2


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ