android_kernel_oneplus_msm8998/drivers/scsi/bfa
Dan Carpenter a114af87c0 scsi: bfa: integer overflow in debugfs
[ Upstream commit 3e351275655d3c84dc28abf170def9786db5176d ]

We could allocate less memory than intended because we do:

	bfad->regdata = kzalloc(len << 2, GFP_KERNEL);

The shift can overflow leading to a crash.  This is debugfs code so the
impact is very small.  I fixed the network version of this in March with
commit 13e2d5187f6b ("bna: integer overflow bug in debugfs").

Fixes: ab2a9ba189 ("[SCSI] bfa: add debugfs support")
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Martin K. Petersen <martin.petersen@oracle.com>
Signed-off-by: Sasha Levin <alexander.levin@verizon.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2017-12-20 10:05:01 +01:00
..
bfa.h
bfa_core.c
bfa_cs.h
bfa_defs.h
bfa_defs_fcs.h
bfa_defs_svc.h
bfa_fc.h
bfa_fcbuild.c
bfa_fcbuild.h
bfa_fcpim.c
bfa_fcpim.h
bfa_fcs.c
bfa_fcs.h
bfa_fcs_fcpim.c
bfa_fcs_lport.c
bfa_fcs_rport.c
bfa_hw_cb.c
bfa_hw_ct.c
bfa_ioc.c
bfa_ioc.h
bfa_ioc_cb.c
bfa_ioc_ct.c
bfa_modules.h
bfa_plog.h
bfa_port.c
bfa_port.h
bfa_svc.c
bfa_svc.h
bfad.c
bfad_attr.c
bfad_bsg.c
bfad_bsg.h
bfad_debugfs.c
bfad_drv.h
bfad_im.c
bfad_im.h
bfi.h
bfi_ms.h
bfi_reg.h
Makefile