Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1431745AbdDYQcZ (ORCPT ); Tue, 25 Apr 2017 12:32:25 -0400 Received: from shards.monkeyblade.net ([184.105.139.130]:41596 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1176509AbdDYQcR (ORCPT ); Tue, 25 Apr 2017 12:32:17 -0400 Date: Tue, 25 Apr 2017 12:32:01 -0400 (EDT) Message-Id: <20170425.123201.1910437101082999848.davem@davemloft.net> To: glider@google.com Cc: dvyukov@google.com, kcc@google.com, edumazet@google.com, kuznet@ms2.inr.ac.ru, linux-kernel@vger.kernel.org, netdev@vger.kernel.org Subject: Re: [PATCH v2] net/packet: initialize val in packet_getsockopt() From: David Miller In-Reply-To: References: <20170424125914.43270-1-glider@google.com> <20170425.114433.143144279134920277.davem@davemloft.net> X-Mailer: Mew version 6.7 on Emacs 24.5 / Mule 6.0 (HANACHIRUSATO) Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Greylist: Sender succeeded SMTP AUTH, not delayed by milter-greylist-4.5.12 (shards.monkeyblade.net [149.20.54.216]); Tue, 25 Apr 2017 08:50:39 -0700 (PDT) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1143 Lines: 26 From: Alexander Potapenko Date: Tue, 25 Apr 2017 18:27:04 +0200 > On Tue, Apr 25, 2017 at 5:44 PM, David Miller wrote: >> From: Alexander Potapenko >> Date: Mon, 24 Apr 2017 14:59:14 +0200 >> >>> In the case getsockopt() is called with PACKET_HDRLEN and optlen < 4 >>> |val| remains uninitialized and the syscall may behave differently >>> depending on its value. This doesn't have security consequences (as the >>> uninit bytes aren't copied back), but it's still cleaner to initialize >>> |val| and ensure optlen is not less than sizeof(int). >>> >>> This bug has been detected with KMSAN. >>> >>> Signed-off-by: Alexander Potapenko >>> --- >>> v2: - if len < sizeof(int), make it 0 >> >> No, you should signal an error if the len is too small. > According to manpages, only setsockopt() may return EINVAL. > Is it ok to change the behavior of getsockopt() to return EINVAL in > this case? (I.e. won't we break existing users that don't expect it?) They are currently getting corrupt data depending upon the endianness, so -EINVAL is a serious improvement.