kernel_optimize_test/fs/cifs
Dan Carpenter 097f5863b1 cifs: read overflow in is_valid_oplock_break()
We need to verify that the "data_offset" is within bounds.

Reported-by: Dr Silvio Cesare of InfoSect <silvio.cesare@gmail.com>
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Steve French <stfrench@microsoft.com>
Reviewed-by: Aurelien Aptel <aaptel@suse.com>
2018-09-12 17:13:34 -05:00
..
asn1.c
cache.c
cifs_debug.c
cifs_debug.h
cifs_dfs_ref.c
cifs_fs_sb.h
cifs_ioctl.h
cifs_spnego.c
cifs_spnego.h
cifs_unicode.c fs/cifs: don't translate SFM_SLASH (U+F026) to backslash 2018-09-02 23:21:42 -05:00
cifs_unicode.h
cifs_uniupr.h
cifsacl.c
cifsacl.h
cifsencrypt.c
cifsfs.c
cifsfs.h cifs: update internal module version number for cifs.ko to 2.12 2018-08-23 15:11:10 -05:00
cifsglob.h
cifspdu.h
cifsproto.h
cifssmb.c fs/cifs: suppress a string overflow warning 2018-09-09 00:02:39 -05:00
connect.c cifs: connect to servername instead of IP for IPC$ share 2018-09-02 23:21:42 -05:00
dir.c
dns_resolve.c
dns_resolve.h
export.c
file.c
fscache.c
fscache.h
inode.c SMB3: Backup intent flag missing for directory opens with backupuid mounts 2018-09-02 23:21:42 -05:00
ioctl.c
Kconfig fs/cifs: require sha512 2018-09-09 00:04:27 -05:00
link.c
Makefile
misc.c cifs: read overflow in is_valid_oplock_break() 2018-09-12 17:13:34 -05:00
netmisc.c
nterr.c
nterr.h
ntlmssp.h
readdir.c cifs: prevent integer overflow in nxt_dir_entry() 2018-09-12 09:27:57 -05:00
rfc1002pdu.h
sess.c cifs: check kmalloc before use 2018-08-23 15:10:49 -05:00
smb1ops.c
smb2file.c
smb2glob.h
smb2inode.c
smb2maperror.c
smb2misc.c smb3: minor debugging clarifications in rfc1001 len processing 2018-09-02 23:21:42 -05:00
smb2ops.c smb3: check for and properly advertise directory lease support 2018-09-02 23:21:42 -05:00
smb2pdu.c cifs: integer overflow in in SMB2_ioctl() 2018-09-12 09:32:07 -05:00
smb2pdu.h
smb2proto.h
smb2status.h
smb2transport.c
smbdirect.c
smbdirect.h
smbencrypt.c
smberr.h
smbfsctl.h
trace.c
trace.h
transport.c
winucase.c
xattr.c