Home
last modified time | relevance | path

Searched refs:fru (Results 1 – 14 of 14) sorted by relevance

/OK3568_Linux_fs/buildroot/package/ipmitool/
H A D0008-fru-Fix-buffer-overflow-vulnerabilities.patch4 Subject: [PATCH] fru: Fix buffer overflow vulnerabilities
29 read_fru_area(struct ipmi_intf * intf, struct fru_info *fru, uint8_t id,
40 @@ -628,10 +631,12 @@ read_fru_area(struct ipmi_intf * intf, struct fru_info *fru, uint8_t id,
43 if (finish > fru->size) {
44 + memset(frubuf + fru->size, 0, length - fru->size);
45 finish = fru->size;
53 @@ -667,6 +672,7 @@ read_fru_area(struct ipmi_intf * intf, struct fru_info *fru, uint8_t id,
59 tmp = fru->access ? off >> 1 : off;
61 @@ -707,9 +713,18 @@ read_fru_area(struct ipmi_intf * intf, struct fru_info *fru, uint8_t id,
64 tmp = fru->access ? rsp->data[0] << 1 : rsp->data[0];
[all …]
H A D0013-fru-sdr-Fix-id_string-buffer-overflows.patch4 Subject: [PATCH] fru, sdr: Fix id_string buffer overflows
34 @@ -3062,7 +3062,7 @@ ipmi_fru_print(struct ipmi_intf * intf, struct sdr_record_fru_locator * fru)
38 - memcpy(desc, fru->id_string, fru->id_code & 0x01f);
39 + memcpy(desc, fru->id_string, __min(fru->id_code & 0x01f, sizeof(desc)));
40 desc[fru->id_code & 0x01f] = 0;
41 printf("FRU Device Description : %s (ID %d)\n", desc, fru->device_id);
78 - snprintf(desc, (fru->id_code & 0x1f) + 1, "%s", fru->id_string);
79 + snprintf(desc, sizeof(desc), "%.*s", (fru->id_code & 0x1f) + 1, fru->id_string);
H A D0009-fru-Fix-buffer-overflow-in-ipmi_spd_print_fru.patch4 Subject: [PATCH] fru: Fix buffer overflow in ipmi_spd_print_fru
11 made to get the `fru.size`, which is used as the size for the allocation
29 struct fru_info fru;
42 + || len > fru.size - offset)
49 } while (offset < fru.size);
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-kernel/ipmitool/ipmitool/
H A D0001-fru-Fix-buffer-overflow-vulnerabilities.patch4 Subject: [PATCH] fru: Fix buffer overflow vulnerabilities
30 read_fru_area(struct ipmi_intf * intf, struct fru_info *fru, uint8_t id,
41 @@ -676,10 +679,12 @@ read_fru_area(struct ipmi_intf * intf, struct fru_info *fru, uint8_t id,
44 if (finish > fru->size) {
45 + memset(frubuf + fru->size, 0, length - fru->size);
46 finish = fru->size;
54 @@ -715,6 +720,7 @@ read_fru_area(struct ipmi_intf * intf, struct fru_info *fru, uint8_t id,
60 tmp = fru->access ? off >> 1 : off;
62 @@ -756,9 +762,18 @@ read_fru_area(struct ipmi_intf * intf, struct fru_info *fru, uint8_t id,
65 tmp = fru->access ? rsp->data[0] << 1 : rsp->data[0];
[all …]
H A D0005-fru-sdr-Fix-id_string-buffer-overflows.patch4 Subject: [PATCH 5/5] fru, sdr: Fix id_string buffer overflows
35 @@ -3038,7 +3038,7 @@ ipmi_fru_print(struct ipmi_intf * intf, struct sdr_record_fru_locator * fru)
39 - memcpy(desc, fru->id_string, fru->id_code & 0x01f);
40 + memcpy(desc, fru->id_string, __min(fru->id_code & 0x01f, sizeof(desc)));
41 desc[fru->id_code & 0x01f] = 0;
42 printf("FRU Device Description : %s (ID %d)\n", desc, fru->device_id);
79 - snprintf(desc, (fru->id_code & 0x1f) + 1, "%s", fru->id_string);
80 + snprintf(desc, sizeof(desc), "%.*s", (fru->id_code & 0x1f) + 1, fru->id_string);
H A D0001-fru-Fix-buffer-overflow-in-ipmi_spd_print_fru.patch4 Subject: [PATCH 1/5] fru: Fix buffer overflow in ipmi_spd_print_fru
11 made to get the `fru.size`, which is used as the size for the allocation
30 struct fru_info fru;
43 + || len > fru.size - offset)
50 } while (offset < fru.size);
/OK3568_Linux_fs/kernel/drivers/scsi/bfa/
H A Dbfa_ioc.c6188 struct bfa_fru_s *fru = cbarg; in bfa_fru_notify() local
6190 bfa_trc(fru, event); in bfa_fru_notify()
6195 if (fru->op_busy) { in bfa_fru_notify()
6196 fru->status = BFA_STATUS_IOC_FAILURE; in bfa_fru_notify()
6197 fru->cbfn(fru->cbarg, fru->status); in bfa_fru_notify()
6198 fru->op_busy = 0; in bfa_fru_notify()
6215 struct bfa_fru_s *fru = cbarg; in bfa_fru_write_send() local
6217 (struct bfi_fru_write_req_s *) fru->mb.msg; in bfa_fru_write_send()
6220 msg->offset = cpu_to_be32(fru->addr_off + fru->offset); in bfa_fru_write_send()
6221 len = (fru->residue < BFA_FRU_DMA_BUF_SZ) ? in bfa_fru_write_send()
[all …]
H A Dbfa_ioc.h736 #define BFA_FRU(__bfa) (&(__bfa)->modules.fru)
739 bfa_status_t bfa_fruvpd_update(struct bfa_fru_s *fru,
742 bfa_status_t bfa_fruvpd_read(struct bfa_fru_s *fru,
745 bfa_status_t bfa_fruvpd_get_max_size(struct bfa_fru_s *fru, u32 *max_size);
746 bfa_status_t bfa_tfru_write(struct bfa_fru_s *fru,
749 bfa_status_t bfa_tfru_read(struct bfa_fru_s *fru,
753 void bfa_fru_attach(struct bfa_fru_s *fru, struct bfa_ioc_s *ioc,
755 void bfa_fru_memclaim(struct bfa_fru_s *fru,
H A Dbfa_modules.h41 struct bfa_fru_s fru; /* fru module */ member
H A Dbfa_core.c167 struct bfa_fru_s *fru = BFA_FRU(bfa); in bfa_com_fru_attach() local
170 bfa_fru_attach(fru, &bfa->ioc, bfa, bfa->trcmod, mincfg); in bfa_com_fru_attach()
171 bfa_fru_memclaim(fru, fru_dma->kva_curp, fru_dma->dma_curp, mincfg); in bfa_com_fru_attach()
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-kernel/ipmitool/
H A Dipmitool_1.8.18.bb27 file://0001-fru-Fix-buffer-overflow-vulnerabilities.patch \
28 file://0001-fru-Fix-buffer-overflow-in-ipmi_spd_print_fru.patch \
32 file://0005-fru-sdr-Fix-id_string-buffer-overflows.patch \
/OK3568_Linux_fs/yocto/meta-openembedded/meta-networking/recipes-daemons/openhpi/files/
H A Dopenhpi-fix-alignment-issue.patch13 rv = ipmi_fru_set_board_info_mfg_time(fru, 0);
18 rv = ipmi_fru_set_board_info_mfg_time(fru,
/OK3568_Linux_fs/kernel/drivers/scsi/aic7xxx/
H A Daiclib.h109 uint8_t fru; member
/OK3568_Linux_fs/kernel/arch/arm/boot/dts/
H A Daspeed-bmc-inspur-fp5280g2.dts297 label = "fru";