From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx2.suse.de ([195.135.220.15]:53042 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755731AbcIVHMQ (ORCPT ); Thu, 22 Sep 2016 03:12:16 -0400 From: Jiri Slaby To: stable@vger.kernel.org Cc: Alexander Shiyan , Michael Krufky , Mauro Carvalho Chehab , Willy Tarreau , Jiri Slaby Subject: [patch added to 3.12-stable] stb6100: fix buffer length check in stb6100_write_reg_range() Date: Thu, 22 Sep 2016 09:11:51 +0200 Message-Id: <20160922071154.1297-39-jslaby@suse.cz> In-Reply-To: <20160922071154.1297-1-jslaby@suse.cz> References: <20160922071154.1297-1-jslaby@suse.cz> Sender: stable-owner@vger.kernel.org List-ID: From: Alexander Shiyan This patch has been added to the 3.12 stable tree. If you have any objections, please let us know. =============== commit 7e6bd12fb77b0067df13fb3ba3fadbdff2945396 upstream. We are checking sizeof() the wrong variable! Signed-off-by: Alexander Shiyan Signed-off-by: Michael Krufky Signed-off-by: Mauro Carvalho Chehab Cc: Willy Tarreau Signed-off-by: Jiri Slaby --- drivers/media/dvb-frontends/stb6100.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/media/dvb-frontends/stb6100.c b/drivers/media/dvb-frontends/stb6100.c index cea175d19890..4ef8a5c7003e 100644 --- a/drivers/media/dvb-frontends/stb6100.c +++ b/drivers/media/dvb-frontends/stb6100.c @@ -193,7 +193,7 @@ static int stb6100_write_reg_range(struct stb6100_state *state, u8 buf[], int st .len = len + 1 }; - if (1 + len > sizeof(buf)) { + if (1 + len > sizeof(cmdbuf)) { printk(KERN_WARNING "%s: i2c wr: len=%d is too big!\n", KBUILD_MODNAME, len); -- 2.10.0