[Intel-xe] ✓ CI.checkpatch: success for drm/xe: stringify the argument to avoid potential vulnerability

Patchwork patchwork at emeril.freedesktop.org
Thu Oct 26 22:07:28 UTC 2023


== Series Details ==

Series: drm/xe: stringify the argument to avoid potential vulnerability
URL   : https://patchwork.freedesktop.org/series/125660/
State : success

== Summary ==

+ KERNEL=/kernel
+ git clone https://gitlab.freedesktop.org/drm/maintainer-tools mt
Cloning into 'mt'...
warning: redirecting to https://gitlab.freedesktop.org/drm/maintainer-tools.git/
+ git -C mt rev-list -n1 origin/master
63c2b6b160bca2df6efc7bc4cea6f442097d7854
+ cd /kernel
+ git config --global --add safe.directory /kernel
+ git log -n1
commit a18855f9ea17bfb54a6f7c04f318af703b484445
Author: Carlos Santa <carlos.santa at intel.com>
Date:   Thu Oct 26 15:01:27 2023 -0700

    drm/xe: stringify the argument to avoid potential vulnerability
    
    This error gets printed inside a sandbox with warnings turned on.
    
    /mnt/host/source/src/third_party/kernel/v5.15/drivers/
    gpu/drm/xe/xe_gt_idle_sysfs.c:87:26: error: format string is
    not a string literal (potentially insecure) [-Werror,-Wformat-security]
            return sysfs_emit(buff, gtidle->name);
                                    ^~~~~~~~~~~~
    /mnt/host/source/src/third_party/kernel/v5.15/drivers/
    gpu/drm/xe/xe_gt_idle_sysfs.c:87:26: note: treat the string
    as an argument to avoid this
            return sysfs_emit(buff, gtidle->name);
                                    ^
                                    "%s",
    1 error generated.
    
    CC: Rodrigo Vivi <rodrigo.vivi at intel.com>
    Signed-off-by: Carlos Santa <carlos.santa at intel.com>
+ /mt/dim checkpatch 21919db9eeaabfaf401c2470a6a95450ac92fafd drm-intel
a18855f9e drm/xe: stringify the argument to avoid potential vulnerability




More information about the Intel-xe mailing list