Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp3697402pxv; Mon, 28 Jun 2021 10:32:04 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwl4lPSG2YPVsSudipQ6r++HwHTPqYZjeUCgitdEnEi57IEwYXdpWvOpWGLeGN7QlBgO42N X-Received: by 2002:a17:906:3e15:: with SMTP id k21mr39537eji.423.1624901524577; Mon, 28 Jun 2021 10:32:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624901524; cv=none; d=google.com; s=arc-20160816; b=gQBzdvU9IlVwuwHcUGx99Llk20vacXsaIs10/e8NbhD14nelRHY5m0RcPXFnBE/Anp UeJbUK9lwmtXouvyhARGqLmxd3eSa61u5qV5i/L/syktDQ4+5pcDzuoTZlEfR4wXREKG ZeLT6HfTqPWH0mFs+J/e03c32+ZW6XC+gAgoX2NDZlPvOoRclmz9d0TbYq1vk/J/5e15 lPHqJR+6NMWHB+XlkIZ6ifeIEkfjvJSbXKVYgRyTlXn1dnoytZQhfI6ZZyKun54j7GNe sn1BaXRAJ7rzOL1Y6BdcD2pch2wN1zDNR7KSFzRtrIsiQhqksUj2geiYFWsbIbc8nA3P 0LLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=oHNyn0QM83NliIDsNwDs+IKuVr2bUiQow5tPYwMcBc8=; b=jVaf2zE9dDO8uIYHbld5qeXEOCW1UFHdUeyy1qrBK7TyZmha6Fd/Df4/xHSv3J/2nv kwotHnlLRMnALTapA+mxQN8v5JtBdzTjPOI+D6622t96qsPwodtzxMEgoeNL4Lfbj3J3 0NJemD8JTvgz86rxjc14WL4yEHwnKiU7dOcmEWyGthhbi7t6AlhwFRUIWGTE2NJKMnmB /LxafipqlCIEV0uqs6Y3IGpKtCdoLiLacjjxbLK3yg5KwIQQnnHq0psH/Hx6zzfEHkgO omHrAvYyJKu/5Nn2M6yRY/W3RRZvwfksohDIoNNt7THuftFFgjki9LztgT8RfTn0gDe5 4hrA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YM4U0nae; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id 4si14770520ejr.444.2021.06.28.10.31.40; Mon, 28 Jun 2021 10:32:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=YM4U0nae; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233763AbhF1OZH (ORCPT + 99 others); Mon, 28 Jun 2021 10:25:07 -0400 Received: from mail.kernel.org ([198.145.29.99]:54392 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233213AbhF1OVi (ORCPT ); Mon, 28 Jun 2021 10:21:38 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 22EE361C84; Mon, 28 Jun 2021 14:19:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1624889952; bh=9vC0oU6syjYGdklmjia7zQ2uiRzVS9zWBv0i7cZ6amQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=YM4U0naenmed+uZOnsWucuaUr4/25FgxV2VQ5C3NdmjecEemoXufwTw0kXTWboWFN jQ35dgOAn9pBYkvvQ/Zlhj+G0pBmAKgenoYfzuP8/iW+bnfhpEkfwq63QSW1h4xZxG kfUCUAK27bTZdAPeoSMaEw0xvg64VBU6/Sp2KSMH56r9IKMwgiF8dZe8lSCJoIoODE OeW8zOZxR440VW/DP6kJSlkgYDAGtrQqLyUJ4zEb/U+I5QdGdGuTU69KxmjJJomgds RuBzmmWbn8YDd84dYb+h8MG3xMP2zgdSz8HmmnGPM5BfZ9h2VC816y6+Vkek9U6EsB kDfRF1S+MaXEQ== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Kees Cook , "David S . Miller" , Sasha Levin Subject: [PATCH 5.12 050/110] sh_eth: Avoid memcpy() over-reading of ETH_SS_STATS Date: Mon, 28 Jun 2021 10:17:28 -0400 Message-Id: <20210628141828.31757-51-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210628141828.31757-1-sashal@kernel.org> References: <20210628141828.31757-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.12.14-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.12.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.12.14-rc1 X-KernelTest-Deadline: 2021-06-30T14:18+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Kees Cook [ Upstream commit 224004fbb033600715dbd626bceec10bfd9c58bc ] In preparation for FORTIFY_SOURCE performing compile-time and run-time field bounds checking for memcpy(), memmove(), and memset(), avoid intentionally reading across neighboring array fields. The memcpy() is copying the entire structure, not just the first array. Adjust the source argument so the compiler can do appropriate bounds checking. Signed-off-by: Kees Cook Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/renesas/sh_eth.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/renesas/sh_eth.c b/drivers/net/ethernet/renesas/sh_eth.c index f029c7c03804..393cf99856ed 100644 --- a/drivers/net/ethernet/renesas/sh_eth.c +++ b/drivers/net/ethernet/renesas/sh_eth.c @@ -2287,7 +2287,7 @@ static void sh_eth_get_strings(struct net_device *ndev, u32 stringset, u8 *data) { switch (stringset) { case ETH_SS_STATS: - memcpy(data, *sh_eth_gstrings_stats, + memcpy(data, sh_eth_gstrings_stats, sizeof(sh_eth_gstrings_stats)); break; } -- 2.30.2