summaryrefslogtreecommitdiff
path: root/net/mac80211
diff options
context:
space:
mode:
authorKees Cook <keescook@chromium.org>2021-06-17 20:09:53 +0300
committerSasha Levin <sashal@kernel.org>2021-06-30 15:47:23 +0300
commitca0e1fefbb534cc86296d9e5d116b0bf49084112 (patch)
tree7d14c96114062128a7bdd556d2094c8961f516bb /net/mac80211
parent4658a8d3079137d8d407892bdc95b390a419c261 (diff)
downloadlinux-ca0e1fefbb534cc86296d9e5d116b0bf49084112.tar.xz
net: qed: Fix memcpy() overflow of qed_dcbx_params()
[ Upstream commit 1c200f832e14420fa770193f9871f4ce2df00d07 ] The source (&dcbx_info->operational.params) and dest (&p_hwfn->p_dcbx_info->set.config.params) are both struct qed_dcbx_params (560 bytes), not struct qed_dcbx_admin_params (564 bytes), which is used as the memcpy() size. However it seems that struct qed_dcbx_operational_params (dcbx_info->operational)'s layout matches struct qed_dcbx_admin_params (p_hwfn->p_dcbx_info->set.config)'s 4 byte difference (3 padding, 1 byte for "valid"). On the assumption that the size is wrong (rather than the source structure type), adjust the memcpy() size argument to be 4 bytes smaller and add a BUILD_BUG_ON() to validate any changes to the structure sizes. Signed-off-by: Kees Cook <keescook@chromium.org> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Sasha Levin <sashal@kernel.org>
Diffstat (limited to 'net/mac80211')
0 files changed, 0 insertions, 0 deletions