From: David Decotigny <ddeco...@gmail.com> Date: Mon, 14 Dec 2015 13:03:52 -0800
> +static int ethtool_get_ksettings(struct net_device *dev, void __user > *useraddr) > +{ ... > + if (__ETHTOOL_LINK_MODE_MASK_NU32 > + != ksettings.parent.link_mode_masks_nwords) { > + /* wrong link mode nbits requested */ > + memset(&ksettings, 0, sizeof(ksettings)); > + /* keep cmd field reset to 0 */ > + /* send back number of words required as negative val */ > + compiletime_assert(__ETHTOOL_LINK_MODE_MASK_NU32 <= S8_MAX, > + "need too many bits for link modes!"); > + ksettings.parent.link_mode_masks_nwords > + = -((s8)__ETHTOOL_LINK_MODE_MASK_NU32); I'm trying to understand how this can work. Supposedly, the link_mode_masks_nwords field is there so that we can add new link modes yet still work with tools built against any particular link mode list in the UAPI header files. But here you're forcing the value of link_mode_masks_nwords and then copying that amount back to userspace. If the user allocated less space than the the link mode list in the kernel supports, we will overwrite past the end of the user's usettings object. You cannot unconditionally copy sizeof(usettings) back to the user, as store_ksettings_for_user() will do. I think you have to truncate here, copying only the array elements the user's structure actually has space for. That's the only way this can work. -- To unsubscribe from this list: send the line "unsubscribe linux-api" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html