diff options
author | Gustavo A. R. Silva <gustavoars@kernel.org> | 2023-09-15 13:25:36 -0600 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2023-09-18 09:39:41 +0100 |
commit | 0201409079b975e46cc40e8bdff4bd61329ee10f (patch) | |
tree | 3a0c71e1d04326f884e32f131b267d663a1a617c /tools/testing/selftests/bpf/prog_tests/exceptions.c | |
parent | 2506a91734754de690869824fb0d1ac592ec1266 (diff) |
net: spider_net: Use size_add() in call to struct_size()
If, for any reason, the open-coded arithmetic causes a wraparound,
the protection that `struct_size()` adds against potential integer
overflows is defeated. Fix this by hardening call to `struct_size()`
with `size_add()`.
Fixes: 3f1071ec39f7 ("net: spider_net: Use struct_size() helper")
Signed-off-by: Gustavo A. R. Silva <gustavoars@kernel.org>
Reviewed-by: Kees Cook <keescook@chromium.org>
Signed-off-by: Geoff Levand <geoff@infradead.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'tools/testing/selftests/bpf/prog_tests/exceptions.c')
0 files changed, 0 insertions, 0 deletions