diff options
author | Lukas Wunner <[email protected]> | 2023-03-11 15:40:04 +0100 |
---|---|---|
committer | Dan Williams <[email protected]> | 2023-04-03 16:16:49 -0700 |
commit | 4fe2c13d59d849be3b45371e3913ec5dc77fc0fb (patch) | |
tree | 50323597540ddc1ac7f92e2047bfcadef83ce3a8 /lib/test_fortify/write_overflow_field-memcpy.c | |
parent | b56faef2312057db20479b240eb71bd2e51fb51c (diff) |
cxl/pci: Handle excessive CDAT length
If the length in the CDAT header is larger than the concatenation of the
header and all table entries, then the CDAT exposed to user space
contains trailing null bytes.
Not every consumer may be able to handle that. Per Postel's robustness
principle, "be liberal in what you accept" and silently reduce the
cached length to avoid exposing those null bytes.
Fixes: c97006046c79 ("cxl/port: Read CDAT table")
Tested-by: Ira Weiny <[email protected]>
Signed-off-by: Lukas Wunner <[email protected]>
Reviewed-by: Dan Williams <[email protected]>
Reviewed-by: Jonathan Cameron <[email protected]>
Cc: [email protected] # v6.0+
Link: https://lore.kernel.org/r/6d98b3c7da5343172bd3ccabfabbc1f31c079d74.1678543498.git.lukas@wunner.de
Signed-off-by: Dan Williams <[email protected]>
Diffstat (limited to 'lib/test_fortify/write_overflow_field-memcpy.c')
0 files changed, 0 insertions, 0 deletions