Dawson Engler writes:
> ---------------------------------------------------------
> [UNKNOWN] I'm not sure about this: "csum_partial_*" calls the generic
> cksum routine which does guard against user pointers ---
> is this redundant paranoia in this case?
>
> /u2/engler/mc/oses/linux/2.4.1/net/ipv4/tcp_output.c:643:tcp_retrans_try_collapse: ERROR:PARAM:651:643: tainted var 'skb_put' (from line 651) used as arg 0 to '__constant_memcpy'
csum_partial_copy_nocheck works on kernel pointers.
Later,
David S. Miller
davem@redhat.com
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Fri Mar 23 2001 - 21:00:08 EST