Message ID | 714cf2aeb7cfd12e3e3290b9391a1e8a46d4e759.1376847403.git.ydroneaud@opteya.com (mailing list archive) |
---|---|
State | Rejected |
Headers | show |
diff --git a/drivers/infiniband/core/ucm.c b/drivers/infiniband/core/ucm.c index 49bf680..81dc068 100644 --- a/drivers/infiniband/core/ucm.c +++ b/drivers/infiniband/core/ucm.c @@ -1178,7 +1178,7 @@ static ssize_t ib_ucm_write(struct file *filp, const char __user *buf, if (copy_from_user(&hdr, buf, sizeof(hdr))) return -EFAULT; - if (hdr.in + sizeof(hdr) > len) + if (hdr.in + sizeof(hdr) != len) return -EINVAL; if (hdr.cmd >= ARRAY_SIZE(ucm_cmd_table))
Like uverbs, strictly check the length parameter: this prevent ucm from processing truncated buffer. Signed-off-by: Yann Droneaud <ydroneaud@opteya.com> Link: http://mid.gmane.org/cover.1376847403.git.ydroneaud@opteya.com --- drivers/infiniband/core/ucm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)