Commit 2d3e5caf authored by Gustavo A. R. Silva's avatar Gustavo A. R. Silva Committed by David S. Miller

net/ipv4: Replace one-element array with flexible-array member

There is a regular need in the kernel to provide a way to declare having
a dynamically sized set of trailing elements in a structure. Kernel code
should always use “flexible array members”[1] for these cases. The older
style of one-element or zero-length arrays should no longer be used[2].

Use an anonymous union with a couple of anonymous structs in order to
keep userspace unchanged:

$ pahole -C ip_msfilter net/ipv4/ip_sockglue.o
struct ip_msfilter {
	union {
		struct {
			__be32     imsf_multiaddr_aux;   /*     0     4 */
			__be32     imsf_interface_aux;   /*     4     4 */
			__u32      imsf_fmode_aux;       /*     8     4 */
			__u32      imsf_numsrc_aux;      /*    12     4 */
			__be32     imsf_slist[1];        /*    16     4 */
		};                                       /*     0    20 */
		struct {
			__be32     imsf_multiaddr;       /*     0     4 */
			__be32     imsf_interface;       /*     4     4 */
			__u32      imsf_fmode;           /*     8     4 */
			__u32      imsf_numsrc;          /*    12     4 */
			__be32     imsf_slist_flex[0];   /*    16     0 */
		};                                       /*     0    16 */
	};                                               /*     0    20 */

	/* size: 20, cachelines: 1, members: 1 */
	/* last cacheline: 20 bytes */
};

Also, refactor the code accordingly and make use of the struct_size()
and flex_array_size() helpers.

This helps with the ongoing efforts to globally enable -Warray-bounds
and get us closer to being able to tighten the FORTIFY_SOURCE routines
on memcpy().

[1] https://en.wikipedia.org/wiki/Flexible_array_member
[2] https://www.kernel.org/doc/html/v5.10/process/deprecated.html#zero-length-and-one-element-arrays

Link: https://github.com/KSPP/linux/issues/79
Link: https://github.com/KSPP/linux/issues/109Signed-off-by: default avatarGustavo A. R. Silva <gustavoars@kernel.org>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent 29a097b7
...@@ -188,11 +188,22 @@ struct ip_mreq_source { ...@@ -188,11 +188,22 @@ struct ip_mreq_source {
}; };
struct ip_msfilter { struct ip_msfilter {
__be32 imsf_multiaddr; union {
__be32 imsf_interface; struct {
__u32 imsf_fmode; __be32 imsf_multiaddr_aux;
__u32 imsf_numsrc; __be32 imsf_interface_aux;
__be32 imsf_slist[1]; __u32 imsf_fmode_aux;
__u32 imsf_numsrc_aux;
__be32 imsf_slist[1];
};
struct {
__be32 imsf_multiaddr;
__be32 imsf_interface;
__u32 imsf_fmode;
__u32 imsf_numsrc;
__be32 imsf_slist_flex[];
};
};
}; };
#define IP_MSFILTER_SIZE(numsrc) \ #define IP_MSFILTER_SIZE(numsrc) \
......
...@@ -2475,8 +2475,8 @@ int ip_mc_msfilter(struct sock *sk, struct ip_msfilter *msf, int ifindex) ...@@ -2475,8 +2475,8 @@ int ip_mc_msfilter(struct sock *sk, struct ip_msfilter *msf, int ifindex)
goto done; goto done;
} }
newpsl->sl_max = newpsl->sl_count = msf->imsf_numsrc; newpsl->sl_max = newpsl->sl_count = msf->imsf_numsrc;
memcpy(newpsl->sl_addr, msf->imsf_slist, memcpy(newpsl->sl_addr, msf->imsf_slist_flex,
msf->imsf_numsrc * sizeof(msf->imsf_slist[0])); flex_array_size(msf, imsf_slist_flex, msf->imsf_numsrc));
err = ip_mc_add_src(in_dev, &msf->imsf_multiaddr, err = ip_mc_add_src(in_dev, &msf->imsf_multiaddr,
msf->imsf_fmode, newpsl->sl_count, newpsl->sl_addr, 0); msf->imsf_fmode, newpsl->sl_count, newpsl->sl_addr, 0);
if (err) { if (err) {
...@@ -2551,14 +2551,14 @@ int ip_mc_msfget(struct sock *sk, struct ip_msfilter *msf, ...@@ -2551,14 +2551,14 @@ int ip_mc_msfget(struct sock *sk, struct ip_msfilter *msf,
count = psl->sl_count; count = psl->sl_count;
} }
copycount = count < msf->imsf_numsrc ? count : msf->imsf_numsrc; copycount = count < msf->imsf_numsrc ? count : msf->imsf_numsrc;
len = copycount * sizeof(psl->sl_addr[0]); len = flex_array_size(psl, sl_addr, copycount);
msf->imsf_numsrc = count; msf->imsf_numsrc = count;
if (put_user(IP_MSFILTER_SIZE(copycount), optlen) || if (put_user(struct_size(optval, imsf_slist_flex, copycount), optlen) ||
copy_to_user(optval, msf, IP_MSFILTER_SIZE(0))) { copy_to_user(optval, msf, struct_size(optval, imsf_slist_flex, 0))) {
return -EFAULT; return -EFAULT;
} }
if (len && if (len &&
copy_to_user(&optval->imsf_slist[0], psl->sl_addr, len)) copy_to_user(&optval->imsf_slist_flex[0], psl->sl_addr, len))
return -EFAULT; return -EFAULT;
return 0; return 0;
done: done:
......
...@@ -663,12 +663,11 @@ static int set_mcast_msfilter(struct sock *sk, int ifindex, ...@@ -663,12 +663,11 @@ static int set_mcast_msfilter(struct sock *sk, int ifindex,
struct sockaddr_storage *group, struct sockaddr_storage *group,
struct sockaddr_storage *list) struct sockaddr_storage *list)
{ {
int msize = IP_MSFILTER_SIZE(numsrc);
struct ip_msfilter *msf; struct ip_msfilter *msf;
struct sockaddr_in *psin; struct sockaddr_in *psin;
int err, i; int err, i;
msf = kmalloc(msize, GFP_KERNEL); msf = kmalloc(struct_size(msf, imsf_slist_flex, numsrc), GFP_KERNEL);
if (!msf) if (!msf)
return -ENOBUFS; return -ENOBUFS;
...@@ -684,7 +683,7 @@ static int set_mcast_msfilter(struct sock *sk, int ifindex, ...@@ -684,7 +683,7 @@ static int set_mcast_msfilter(struct sock *sk, int ifindex,
if (psin->sin_family != AF_INET) if (psin->sin_family != AF_INET)
goto Eaddrnotavail; goto Eaddrnotavail;
msf->imsf_slist[i] = psin->sin_addr.s_addr; msf->imsf_slist_flex[i] = psin->sin_addr.s_addr;
} }
err = ip_mc_msfilter(sk, msf, ifindex); err = ip_mc_msfilter(sk, msf, ifindex);
kfree(msf); kfree(msf);
...@@ -1229,7 +1228,7 @@ static int do_ip_setsockopt(struct sock *sk, int level, int optname, ...@@ -1229,7 +1228,7 @@ static int do_ip_setsockopt(struct sock *sk, int level, int optname,
{ {
struct ip_msfilter *msf; struct ip_msfilter *msf;
if (optlen < IP_MSFILTER_SIZE(0)) if (optlen < struct_size(msf, imsf_slist_flex, 0))
goto e_inval; goto e_inval;
if (optlen > sysctl_optmem_max) { if (optlen > sysctl_optmem_max) {
err = -ENOBUFS; err = -ENOBUFS;
...@@ -1247,7 +1246,8 @@ static int do_ip_setsockopt(struct sock *sk, int level, int optname, ...@@ -1247,7 +1246,8 @@ static int do_ip_setsockopt(struct sock *sk, int level, int optname,
err = -ENOBUFS; err = -ENOBUFS;
break; break;
} }
if (IP_MSFILTER_SIZE(msf->imsf_numsrc) > optlen) { if (struct_size(msf, imsf_slist_flex, msf->imsf_numsrc) >
optlen) {
kfree(msf); kfree(msf);
err = -EINVAL; err = -EINVAL;
break; break;
...@@ -1660,11 +1660,12 @@ static int do_ip_getsockopt(struct sock *sk, int level, int optname, ...@@ -1660,11 +1660,12 @@ static int do_ip_getsockopt(struct sock *sk, int level, int optname,
{ {
struct ip_msfilter msf; struct ip_msfilter msf;
if (len < IP_MSFILTER_SIZE(0)) { if (len < struct_size(&msf, imsf_slist_flex, 0)) {
err = -EINVAL; err = -EINVAL;
goto out; goto out;
} }
if (copy_from_user(&msf, optval, IP_MSFILTER_SIZE(0))) { if (copy_from_user(&msf, optval,
struct_size(&msf, imsf_slist_flex, 0))) {
err = -EFAULT; err = -EFAULT;
goto out; goto out;
} }
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment