From: David Decotigny <ddeco...@gmail.com>
Date: Mon, 14 Dec 2015 13:03:52 -0800

> +static int ethtool_get_ksettings(struct net_device *dev, void __user 
> *useraddr)
> +{
 ...
> +     if (__ETHTOOL_LINK_MODE_MASK_NU32
> +         != ksettings.parent.link_mode_masks_nwords) {
> +             /* wrong link mode nbits requested */
> +             memset(&ksettings, 0, sizeof(ksettings));
> +             /* keep cmd field reset to 0 */
> +             /* send back number of words required as negative val */
> +             compiletime_assert(__ETHTOOL_LINK_MODE_MASK_NU32 <= S8_MAX,
> +                                "need too many bits for link modes!");
> +             ksettings.parent.link_mode_masks_nwords
> +                     = -((s8)__ETHTOOL_LINK_MODE_MASK_NU32);

I'm trying to understand how this can work.

Supposedly, the link_mode_masks_nwords field is there so that we can
add new link modes yet still work with tools built against any
particular link mode list in the UAPI header files.

But here you're forcing the value of link_mode_masks_nwords and then
copying that amount back to userspace.  If the user allocated less
space than the the link mode list in the kernel supports, we will
overwrite past the end of the user's usettings object.

You cannot unconditionally copy sizeof(usettings) back to the user,
as store_ksettings_for_user() will do.

I think you have to truncate here, copying only the array elements the
user's structure actually has space for.  That's the only way this can
work.
--
To unsubscribe from this list: send the line "unsubscribe linux-api" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to