diff options
author | Gustavo A. R. Silva <gustavoars@kernel.org> | 2020-07-29 22:17:00 -0500 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2020-07-30 17:38:47 -0700 |
commit | a0d716d8e42abcb973afed27c6fa44bd146d2616 (patch) | |
tree | 12fec84955ef61155a06077d904e63d93b866bc0 /net/sched | |
parent | 10470c0d7e921a46e126ff8f8a3b60fdb944b3d0 (diff) | |
download | linux-stable-a0d716d8e42abcb973afed27c6fa44bd146d2616.tar.gz linux-stable-a0d716d8e42abcb973afed27c6fa44bd146d2616.tar.bz2 linux-stable-a0d716d8e42abcb973afed27c6fa44bd146d2616.zip |
net/sched: act_pedit: Use flex_array_size() helper in memcpy()
Make use of the flex_array_size() helper to calculate the size of a
flexible array member within an enclosing structure.
This helper offers defense-in-depth against potential integer
overflows, while at the same time makes it explicitly clear that
we are dealing with a flexible array member.
Signed-off-by: Gustavo A. R. Silva <gustavoars@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/sched')
-rw-r--r-- | net/sched/act_pedit.c | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/net/sched/act_pedit.c b/net/sched/act_pedit.c index 66986db062ed..c158bfed86d5 100644 --- a/net/sched/act_pedit.c +++ b/net/sched/act_pedit.c @@ -436,8 +436,7 @@ static int tcf_pedit_dump(struct sk_buff *skb, struct tc_action *a, return -ENOBUFS; spin_lock_bh(&p->tcf_lock); - memcpy(opt->keys, p->tcfp_keys, - p->tcfp_nkeys * sizeof(struct tc_pedit_key)); + memcpy(opt->keys, p->tcfp_keys, flex_array_size(opt, keys, p->tcfp_nkeys)); opt->index = p->tcf_index; opt->nkeys = p->tcfp_nkeys; opt->flags = p->tcfp_flags; |