]> git.karo-electronics.de Git - karo-tx-linux.git/commitdiff
sysctl: refactor sysctl string writing logic
authorKees Cook <keescook@chromium.org>
Thu, 22 May 2014 00:44:10 +0000 (10:44 +1000)
committerStephen Rothwell <sfr@canb.auug.org.au>
Thu, 22 May 2014 00:44:10 +0000 (10:44 +1000)
Consolidate buffer length checking with new-line/end-of-line checking.
Additionally, instead of reading user memory twice, just do the assignment
during the loop.

This change doesn't affect the potential races here.  It was already
possible to read a sysctl that was in the middle of a write.  In both
cases, the string will always be NULL terminated.  The pre-existing race
remains a problem to be solved.

Signed-off-by: Kees Cook <keescook@chromium.org>
Cc: Randy Dunlap <rdunlap@infradead.org>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
kernel/sysctl.c

index e7ff80a73c44507c5d0fd0640ed9dbf90576054a..0e08103a69c8caa11f1665f107d299cffaf194f2 100644 (file)
@@ -1712,21 +1712,18 @@ static int _proc_do_string(char *data, int maxlen, int write,
        }
 
        if (write) {
+               /* Start writing from beginning of buffer. */
                len = 0;
+               *ppos += *lenp;
                p = buffer;
-               while (len < *lenp) {
+               while ((p - buffer) < *lenp && len < maxlen - 1) {
                        if (get_user(c, p++))
                                return -EFAULT;
                        if (c == 0 || c == '\n')
                                break;
-                       len++;
+                       data[len++] = c;
                }
-               if (len >= maxlen)
-                       len = maxlen-1;
-               if(copy_from_user(data, buffer, len))
-                       return -EFAULT;
                data[len] = 0;
-               *ppos += *lenp;
        } else {
                len = strlen(data);
                if (len > maxlen)