[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20210209085909.32d27f0d@kicinski-fedora-pc1c0hjn.dhcp.thefacebook.com>
Date: Tue, 9 Feb 2021 08:59:09 -0800
From: Jakub Kicinski <kuba@...nel.org>
To: David Ahern <dsahern@...il.com>
Cc: Leon Romanovsky <leon@...nel.org>,
Arjun Roy <arjunroy.kdev@...il.com>, davem@...emloft.net,
netdev@...r.kernel.org, arjunroy@...gle.com, edumazet@...gle.com,
soheil@...gle.com
Subject: Re: [net-next v2] tcp: Explicitly mark reserved field in
tcp_zerocopy_receive args.
On Mon, 8 Feb 2021 20:20:29 -0700 David Ahern wrote:
> On 2/8/21 7:53 PM, Jakub Kicinski wrote:
> > On Mon, 8 Feb 2021 19:24:05 -0700 David Ahern wrote:
> >> That would be the case for new userspace on old kernel. Extending the
> >> check to the end of the struct would guarantee new userspace can not ask
> >> for something that the running kernel does not understand.
> >
> > Indeed, so we're agreeing that check_zeroed_user() is needed before
> > original optlen from user space gets truncated?
>
> I thought so, but maybe not. To think through this ...
>
> If current kernel understands a struct of size N, it can only copy that
> amount from user to kernel. Anything beyond is ignored in these
> multiplexed uAPIs, and that is where the new userspace on old kernel falls.
>
> Known value checks can only be done up to size N. In this case, the
> reserved field is at the end of the known struct size, so checking just
> the field is fine. Going beyond the reserved field has implications for
> extensions to the API which should be handled when those extensions are
> added.
Let me try one last time.
There is no check in the kernels that len <= N. User can pass any
length _already_. check_zeroed_user() forces the values beyond the
structure length to be known (0) rather than anything. It can only
avoid breakages in the future.
> So, in short I think the "if (zc.reserved)" is correct as Leon noted.
If it's correct to check some arbitrary part of the buffer is zeroed
it should be correct to check the entire tail is zeroed.
Powered by blists - more mailing lists