Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp2227958imm; Thu, 18 Oct 2018 11:02:27 -0700 (PDT) X-Google-Smtp-Source: ACcGV60iM2qXru4XQul81oRZodfcObRS7GW/EvnFJPySOTtp94es/kZiUHPGNWyC/Xpec1vMdem6 X-Received: by 2002:a63:2f42:: with SMTP id v63-v6mr15245294pgv.202.1539885747029; Thu, 18 Oct 2018 11:02:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539885747; cv=none; d=google.com; s=arc-20160816; b=s8dSw61uCs7JJc/KqWPI3n0XzXZ/1iCAF5h8G4K6pclcbgv//dVuz3dXM/jqYJd9eC AOSnO5NwU7S81F9EpnpoKszkxxrR3yLhI6IHDK70kGfnZmCOI0C2Qkoo3O05sEgLAuQY tTx6v8M8ul6gd8w5AagOZT1hie8g4HMxcEz25ikZC58K+ck9WSkTTfT1z3+Ncx/RBIdW /iDiqrwkxKVZnkNVlf9uT67Icg2EuIeNdNoWC6GcWw02aa0s6bt3bLnLxpkZtJCxrfhI wd8k+j7cRV/C4tx5Q99ct/RInE5xXvn/dFmW3+vIygkPMEOP0gTxFnyn/HoLTaGLXeeU 5ejQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=/9eCK9yqRvN4YZvls26TtxqgFI20/jPTKxj0WL1R7ks=; b=V9G/dcTyN5sChf3eZcbEEUYkn8yp5PgOFyH3PH5HF2MQq6Xad6O0TGLwvkyBckewst zNvoz0hYD8ZEYAZUPyzyYcbfh2ePPTBq0TWLzI8aOJwPfI+y1NKrMQmx0FRmrxMHOGtK U9svZBkje1aoeUDfdoLBl7YPEOkaKlSHA6DC9bmyyaED3UFVXwGziSPNPjGwk4RGP4Sl U2z6WMtPxg7krRdBI1mTCFtUY4CuXVidvYCmaOWzSUs7xy7kqYdyDzZNFfWnXDw/zwUO uI6NfGkkT6prcp6V84qhrBsZhlgVjADgzc0ZNJxPaKnNRvBWducHy4Lzhh21N6qZ+wZd 77yw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0SI7MMBh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id e2-v6si24464080pfh.64.2018.10.18.11.02.11; Thu, 18 Oct 2018 11:02:27 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=0SI7MMBh; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729511AbeJSCDK (ORCPT + 99 others); Thu, 18 Oct 2018 22:03:10 -0400 Received: from mail.kernel.org ([198.145.29.99]:51270 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728086AbeJSCDJ (ORCPT ); Thu, 18 Oct 2018 22:03:09 -0400 Received: from localhost (ip-213-127-77-176.ip.prioritytelecom.net [213.127.77.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 090B821479; Thu, 18 Oct 2018 18:01:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1539885663; bh=5QTJxqfTtt2lkREeBvv8czVcA58xWVUGwdIy5XPY3gY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=0SI7MMBhAWtEhpfAeEkeG1EzcDPGcgH1DQp6Rf7NqEDdpL7/MqHJ9G60c3HGvl0ci A/dluQSdyjlO9d2vQUuw/NlIfB/OOHqXbURlsXTLk0WkLS9SIFbNyomLps2mlXelk3 /PI57YxnhyfqnBDUh5zZNaZ+aMXHLgr8gh8zX70s= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sven Eckelmann , Marek Lindner , Simon Wunderlich , Sasha Levin Subject: [PATCH 4.14 03/41] batman-adv: Fix segfault when writing to throughput_override Date: Thu, 18 Oct 2018 19:54:18 +0200 Message-Id: <20181018175417.169590775@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181018175416.718399607@linuxfoundation.org> References: <20181018175416.718399607@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Sven Eckelmann [ Upstream commit b9fd14c20871e6189f635e49b32d7789e430b3c8 ] The per hardif sysfs file "batman_adv/throughput_override" prints the resulting change as info text when the users writes to this file. It uses the helper function batadv_info to add it at the same time to the kernel ring buffer and to the batman-adv debug log (when CONFIG_BATMAN_ADV_DEBUG is enabled). The function batadv_info requires as first parameter the batman-adv softif net_device. This parameter is then used to find the private buffer which contains the debug log for this batman-adv interface. But batadv_store_throughput_override used as first argument the slave net_device. This slave device doesn't have the batadv_priv private data which is access by batadv_info. Writing to this file with CONFIG_BATMAN_ADV_DEBUG enabled can either lead to a segfault or to memory corruption. Fixes: 0b5ecc6811bd ("batman-adv: add throughput override attribute to hard_ifaces") Signed-off-by: Sven Eckelmann Acked-by: Marek Lindner Signed-off-by: Simon Wunderlich Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- net/batman-adv/sysfs.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) --- a/net/batman-adv/sysfs.c +++ b/net/batman-adv/sysfs.c @@ -1078,8 +1078,9 @@ static ssize_t batadv_store_throughput_o if (old_tp_override == tp_override) goto out; - batadv_info(net_dev, "%s: Changing from: %u.%u MBit to: %u.%u MBit\n", - "throughput_override", + batadv_info(hard_iface->soft_iface, + "%s: %s: Changing from: %u.%u MBit to: %u.%u MBit\n", + "throughput_override", net_dev->name, old_tp_override / 10, old_tp_override % 10, tp_override / 10, tp_override % 10);