Kees Cook <keescook@xxxxxxxxxxxx> wrote: > In preparation for FORTIFY_SOURCE performing compile-time and run-time > field bounds checking for memcpy(), memmove(), and memset(), avoid > intentionally writing across neighboring array fields. > > Validate the expected key size and introduce a wrapping structure > to use as the multi-field memcpy() destination so that overflows > can be correctly detected. > > Signed-off-by: Kees Cook <keescook@xxxxxxxxxxxx> Patch applied to wireless-drivers-next.git, thanks. 70ca8441ebfc orinoco: Avoid field-overflowing memcpy() -- https://patchwork.kernel.org/project/linux-wireless/patch/20210616203952.1248910-1-keescook@xxxxxxxxxxxx/ https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches