Received: by 2002:a05:6a10:f3d0:0:0:0:0 with SMTP id a16csp3764690pxv; Mon, 28 Jun 2021 12:14:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxOC7ImyyWGBHcm3C8gpxyXT/8wo202Hx4ybrJfkKslt9UCkVp4QmsV75Fu/WJ/64SstgMB X-Received: by 2002:a17:907:1b29:: with SMTP id mp41mr26050173ejc.459.1624907664059; Mon, 28 Jun 2021 12:14:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1624907664; cv=none; d=google.com; s=arc-20160816; b=fZGQsl/Xw5vtwKx26P4wgBZbppZUsSy5ZzUCHTuQZVUVsPfasI6dgbbprz7EjL1QsT XrH40arIQGLubNrOXbS/JGt+ETnymIxahzSb94JHhXHGHJMiNqkca0s85otrJQQxD0Eu cuSldeu22okMdjREGYIgJ+r3BIRhljDmAMs5AWJEuyerHEc7WuxtrvCmOEUdLFydI8aL zAHaYdDObo3r5C6alysY4wUf+BHMvn2A2WDVZHWnzVbI1bU3C3fq6GxbQG4/yVVvjZYJ AHNsgcbtSlfLwo0Jk9ObOL5lMx27wKf+pWGJmot30n3l/nkf3wl56dM2QK3l9jHgnhpQ Mlrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=FRxl8dW2NfhRA9rP/f5sQckLQaJ/ZXlu+S+qBIVRAVA=; b=TVx5Ek1+sf6e4+rIBVzep76u+1JtSEls+xDa0YRrbXtgHLd2OFpFJxZqMKirfocbwP 3QonIwgfv/ruwu0TVF5dIhopMGa4K8PHe3bp4XR4ifG0ilP55WMAn/Bza68mKtifvSo3 fyFbh8lWd+IAk1DaJnXK8CBCovfHU+bdPWP5BynvMCNt06+0mx3wF0rruF+sE+qOkZPi 4IwWKL2lJva3HKBa82CMjCp+UgXFcpC6LpU8f67/KMFJpjjP7V2cVrqupS6G4S+CAFX9 rpXdTg1dUXntTbuWcmOZD8lOSTFMpFa+BrBTP9m2dUacWEsAZ46UKbv+dBp9n8Le7mJ3 RtqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=fzErmzmW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b4si14086845eds.581.2021.06.28.12.13.57; Mon, 28 Jun 2021 12:14:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=fzErmzmW; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235220AbhF1OfL (ORCPT + 99 others); Mon, 28 Jun 2021 10:35:11 -0400 Received: from mail.kernel.org ([198.145.29.99]:37318 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234762AbhF1Oa1 (ORCPT ); Mon, 28 Jun 2021 10:30:27 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 7F19F61CBD; Mon, 28 Jun 2021 14:26:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1624890410; bh=iU6xzPa6JQVBHnxsg6oN/Htpg2TH7DcVkVfnLQl7mLE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=fzErmzmWxLA3OOQ1MeuFjxwaPcKBKduX2wjci2wf7yHiKFc/6SKBMhMoiARXYsk4g D1Fvg39e8VuUHk901QEmGB+VY/fOcsHWi8a1ZIjKCRVMAtCRaGZxvS7Ql59iCjvhWJ efK6CyoG3UXlJ5AtDGTs49WEujTP5JZiy3O0tASEaDUmph5/kxJsPqcLKBfoCCZb2x lE26PJLavT916LKFWecgFyyLhMI0OuLTQkQkxrgT0dRGtfBs8zR0lTO2nzcLWYupzp xYMZMYI8yFP0U/JZMhAh+BXRjZ11MImMDd/b77EQgBz/IxpXni/l6z6oPVVRcwqlu2 bgiTxstk4Z6BQ== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Kees Cook , "David S . Miller" , Sasha Levin Subject: [PATCH 5.10 048/101] r8169: Avoid memcpy() over-reading of ETH_SS_STATS Date: Mon, 28 Jun 2021 10:25:14 -0400 Message-Id: <20210628142607.32218-49-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210628142607.32218-1-sashal@kernel.org> References: <20210628142607.32218-1-sashal@kernel.org> MIME-Version: 1.0 X-KernelTest-Patch: http://kernel.org/pub/linux/kernel/v5.x/stable-review/patch-5.10.47-rc1.gz X-KernelTest-Tree: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git X-KernelTest-Branch: linux-5.10.y X-KernelTest-Patches: git://git.kernel.org/pub/scm/linux/kernel/git/stable/stable-queue.git X-KernelTest-Version: 5.10.47-rc1 X-KernelTest-Deadline: 2021-06-30T14:25+00:00 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Kees Cook [ Upstream commit da5ac772cfe2a03058b0accfac03fad60c46c24d ] In preparation for FORTIFY_SOURCE performing compile-time and run-time field bounds checking for memcpy(), memmove(), and memset(), avoid intentionally reading across neighboring array fields. The memcpy() is copying the entire structure, not just the first array. Adjust the source argument so the compiler can do appropriate bounds checking. Signed-off-by: Kees Cook Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- drivers/net/ethernet/realtek/r8169_main.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/net/ethernet/realtek/r8169_main.c b/drivers/net/ethernet/realtek/r8169_main.c index 3bb36f4a984e..a6bf80b52967 100644 --- a/drivers/net/ethernet/realtek/r8169_main.c +++ b/drivers/net/ethernet/realtek/r8169_main.c @@ -1673,7 +1673,7 @@ static void rtl8169_get_strings(struct net_device *dev, u32 stringset, u8 *data) { switch(stringset) { case ETH_SS_STATS: - memcpy(data, *rtl8169_gstrings, sizeof(rtl8169_gstrings)); + memcpy(data, rtl8169_gstrings, sizeof(rtl8169_gstrings)); break; } } -- 2.30.2