mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-12-18 13:36:46 +07:00
staging: lustre: improve length checks in ioctls
We copy "hdr->ioc_len" from the user twice but we only verify that it's within the limit on the first copy. Otherwise we could read unmapped memory and Oops. Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com> Reviewed-by: Peng Tao <bergwolf@gmail.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
This commit is contained in:
parent
cad7aa13a3
commit
2e5ed7fdfb
@ -44,6 +44,7 @@ int libcfs_ioctl_getdata(char *buf, char *end, void *arg)
|
||||
{
|
||||
struct libcfs_ioctl_hdr *hdr;
|
||||
struct libcfs_ioctl_data *data;
|
||||
int orig_len;
|
||||
int err;
|
||||
|
||||
hdr = (struct libcfs_ioctl_hdr *)buf;
|
||||
@ -69,9 +70,12 @@ int libcfs_ioctl_getdata(char *buf, char *end, void *arg)
|
||||
return -EINVAL;
|
||||
}
|
||||
|
||||
orig_len = hdr->ioc_len;
|
||||
err = copy_from_user(buf, (void *)arg, hdr->ioc_len);
|
||||
if (err)
|
||||
return err;
|
||||
if (orig_len != data->ioc_len)
|
||||
return -EINVAL;
|
||||
|
||||
if (libcfs_ioctl_is_invalid(data)) {
|
||||
CERROR("PORTALS: ioctl not correctly formatted\n");
|
||||
|
@ -122,6 +122,8 @@ int obd_ioctl_getdata(char **buf, int *len, void *arg)
|
||||
OBD_FREE_LARGE(*buf, hdr.ioc_len);
|
||||
return err;
|
||||
}
|
||||
if (hdr.ioc_len != data->ioc_len)
|
||||
return -EINVAL;
|
||||
|
||||
if (obd_ioctl_is_invalid(data)) {
|
||||
CERROR("ioctl not correctly formatted\n");
|
||||
|
Loading…
Reference in New Issue
Block a user