]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
powerpc/pseries/lparcfg: Fix possible overflow are more than 1026
authorChen Gang <gang.chen@asianux.com>
Mon, 22 Apr 2013 17:12:54 +0000 (17:12 +0000)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Wed, 9 Jul 2014 17:51:21 +0000 (10:51 -0700)
commit 5676005acf26ab7e924a8438ea4746e47d405762 upstream.

need set '\0' for 'local_buffer'.

SPLPAR_MAXLENGTH is 1026, RTAS_DATA_BUF_SIZE is 4096. so the contents of
rtas_data_buf may truncated in memcpy.

if contents are really truncated.
  the splpar_strlen is more than 1026. the next while loop checking will
  not find the end of buffer. that will cause memory access violation.

Signed-off-by: Chen Gang <gang.chen@asianux.com>
Signed-off-by: Benjamin Herrenschmidt <benh@kernel.crashing.org>
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
Cc: Yijing Wang <wangyijing@huawei.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
arch/powerpc/kernel/lparcfg.c

index 7ebbae0e005afccf4dedcf1ac6124da6860aea0d..f62fda1b6d61689eeec667d0090cb9459162662c 100644 (file)
@@ -307,6 +307,7 @@ static void parse_system_parameter_string(struct seq_file *m)
                                __pa(rtas_data_buf),
                                RTAS_DATA_BUF_SIZE);
        memcpy(local_buffer, rtas_data_buf, SPLPAR_MAXLENGTH);
+       local_buffer[SPLPAR_MAXLENGTH - 1] = '\0';
        spin_unlock(&rtas_data_buf_lock);
 
        if (call_status != 0) {