diff options
author | Steven Rostedt (Red Hat) <rostedt@goodmis.org> | 2014-06-20 23:31:26 -0400 |
---|---|---|
committer | Steven Rostedt <rostedt@goodmis.org> | 2014-07-01 07:13:37 -0400 |
commit | 6d2289f3faa71dcc5bba15c7aeba4f31c185b6df (patch) | |
tree | 8425f1195f29a670dcb1ad00e56ee1836514ab02 /kernel/trace/trace_output.c | |
parent | 36aabfff50b6a03bcfd2c3cfbd7b83eb0a9ce0c1 (diff) | |
download | linux-6d2289f3faa71dcc5bba15c7aeba4f31c185b6df.tar.bz2 |
tracing: Make trace_seq_putmem_hex() more robust
Currently trace_seq_putmem_hex() can only take as a parameter a pointer
to something that is 8 bytes or less, otherwise it will overflow the
buffer. This is protected by a macro that encompasses the call to
trace_seq_putmem_hex() that has a BUILD_BUG_ON() for the variable before
it is passed in. This is not very robust and if trace_seq_putmem_hex() ever
gets used outside that macro it will cause issues.
Instead of only being able to produce a hex output of memory that is for
a single word, change it to be more robust and allow any size input.
Signed-off-by: Steven Rostedt <rostedt@goodmis.org>
Diffstat (limited to 'kernel/trace/trace_output.c')
0 files changed, 0 insertions, 0 deletions