Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit ca2861a8 authored by qctecmdr's avatar qctecmdr Committed by Gerrit - the friendly Code Review server
Browse files

Merge "msm: ipa3: Fix to prevent Integer Overflow"

parents ce3a75f7 c52c4727
Loading
Loading
Loading
Loading
+9 −5
Original line number Diff line number Diff line
// SPDX-License-Identifier: GPL-2.0-only
/*
 * Copyright (c) 2013-2020, The Linux Foundation. All rights reserved.
 * Copyright (c) 2013-2021, The Linux Foundation. All rights reserved.
 */

#include <linux/module.h>
@@ -930,7 +930,10 @@ int ipa3_qmi_add_offload_request_send(
	}

	/* check if the filter rules from IPACM is valid */
	if (req->filter_spec_ex2_list_len == 0) {
	if (req->filter_spec_ex2_list_len < 0) {
		IPAWANERR("IPACM pass invalid num of rules\n");
		return -EINVAL;
	} else if (req->filter_spec_ex2_list_len == 0) {
		IPAWANDBG("IPACM pass zero rules to Q6\n");
	} else {
		IPAWANDBG("IPACM pass %u rules to Q6\n",
@@ -938,9 +941,10 @@ int ipa3_qmi_add_offload_request_send(
	}

	/* currently set total max to 64 */
	if (req->filter_spec_ex2_list_len +
		ipa3_qmi_ctx->num_ipa_offload_connection
		>= QMI_IPA_MAX_FILTERS_V01) {
	if ((ipa3_qmi_ctx->num_ipa_offload_connection < 0) ||
		(req->filter_spec_ex2_list_len >=
		(QMI_IPA_MAX_FILTERS_V01 -
			ipa3_qmi_ctx->num_ipa_offload_connection))) {
		IPAWANDBG(
		"cur(%d), req(%d), exceed limit (%d)\n",
			ipa3_qmi_ctx->num_ipa_offload_connection,