[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20230819005552.39751-1-kuniyu@amazon.com>
Date: Fri, 18 Aug 2023 17:55:52 -0700
From: Kuniyuki Iwashima <kuniyu@...zon.com>
To: "David S. Miller" <davem@...emloft.net>, Eric Dumazet
<edumazet@...gle.com>, Jakub Kicinski <kuba@...nel.org>, Paolo Abeni
<pabeni@...hat.com>
CC: Kuniyuki Iwashima <kuniyu@...zon.com>, Kuniyuki Iwashima
<kuni1840@...il.com>, <netdev@...r.kernel.org>
Subject: [PATCH v1 net] net: Allow larger buffer than peer address for SO_PEERNAME.
When we call getsockopt(SO_PEERNAME), the buffer size must be smaller
than or equal to the length of the peer name.
It works with protocols whose address size is fixed. However, the
restriction does not make sense for socket families with an arbitrary
length address.
For example, we usually do not know the peer name if we get an AF_UNIX
socket by accept(), FD passing, or pidfd_getfd(). Then we get -EINVAL
if we pass sizeof(struct sockaddr_un) to getsockopt(SO_PEERNAME). So,
we need to do binary search to get the exact peer name.
addrlen = sizeof(struct sockaddr_un);
getsockopt(fd, SOL_SOCKET, SO_PEERNAME,
(struct sockaddr *)&addr, &addrlen); <-- -EINVAL
The error handling is to avoid copying garbage after the copied peer
address in the temporal buffer.
Let's update copy size by the peer name size if it is larger.
Fixes: 1da177e4c3f4 ("Linux-2.6.12-rc2")
Signed-off-by: Kuniyuki Iwashima <kuniyu@...zon.com>
---
net/core/sock.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/net/core/sock.c b/net/core/sock.c
index c9cffb7acbea..f6ee2998a109 100644
--- a/net/core/sock.c
+++ b/net/core/sock.c
@@ -1829,7 +1829,7 @@ int sk_getsockopt(struct sock *sk, int level, int optname,
if (lv < 0)
return -ENOTCONN;
if (lv < len)
- return -EINVAL;
+ len = lv;
if (copy_to_sockptr(optval, address, len))
return -EFAULT;
goto lenout;
--
2.30.2
Powered by blists - more mailing lists