Received: by 2002:ac0:a582:0:0:0:0:0 with SMTP id m2-v6csp2230363imm; Thu, 18 Oct 2018 11:04:33 -0700 (PDT) X-Google-Smtp-Source: ACcGV62R8TSGogKI4Hw9/69fOJRBHRBFVfp8hHj184dOvwxr0HTLWuDLvLJVxQ9vQ3BjohCu4/RZ X-Received: by 2002:a63:d30c:: with SMTP id b12-v6mr29526602pgg.61.1539885873401; Thu, 18 Oct 2018 11:04:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1539885873; cv=none; d=google.com; s=arc-20160816; b=W9J1l/mcvWAEQjcWvaGjlRMPXN5prE/74yKpzzB1WERVUUpvBhytZ7KjLmYssdDZzs giXTIa9ezxkU5afSVz2iA9FFlkQVfF05FHbkiBqKOenS2YBpOr4jTOm7nuELYOX8exsb FjjdCZPQja8HVdLaLGw6oQRZiyLaRPqmw3A6MDJfxF60+ylxZYW5iZcGLpIPlJ+eWynQ 8wiMEme3Y/AEhSJAbkSTYXtRAPQeu+bBT241YOtiKSo6rKe+00e4A+ivNovP7/qfrEms lEuE6aEEQloF3esIhYnBzqBZskWx6nVy0/E1Bsx7ANfDf+StWii70F3O2IJeZ8NGvJtz RGEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Gen/C5Ygyjo4scbmx6BbRgsfWh2NhGWHDG15jj28SsM=; b=ss0SDvpb+lzHvnM0MZBKm0f5MNscizVg53Ln5vxjY+tWYJ675j05aiuAlKs4u0vox9 eBLeNQd2r04UfZQTmlORTyDIjFVJV6p4P2SC8DqwZD2m5T0+0Ru2iUhq/fQW9Q3HnwUe WPbLXf9Qh0JuwbRbPR5DZzOloKNGZ4LerShDbE5WGdtSBBlu5DJy6IAcmxgGlUzYxv7l ZU3/l1CXR+K+T0X0dTHg3/Lz6W+/LsSvnYYhTWjygAJynjAcf85xwWszGhA6yB5jxHWq qhEEYOB7Mp0KyEPzrX/aBqnEY06XfPRvf1mk9m9vbVjpm/hhmNiXal8OlHqAn2SY0u6T pzUA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=j33Rz5OU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x21-v6si18767266pll.221.2018.10.18.11.04.17; Thu, 18 Oct 2018 11:04:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=j33Rz5OU; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729885AbeJSCFR (ORCPT + 99 others); Thu, 18 Oct 2018 22:05:17 -0400 Received: from mail.kernel.org ([198.145.29.99]:53482 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729257AbeJSCFR (ORCPT ); Thu, 18 Oct 2018 22:05:17 -0400 Received: from localhost (ip-213-127-77-176.ip.prioritytelecom.net [213.127.77.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 00F7A2148D; Thu, 18 Oct 2018 18:03:09 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1539885790; bh=s+bohfJI/87q/O1UVJbNvRH2rCtvI+GODMrGehFB2jg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=j33Rz5OU1NbRch4uyPvrsrKd7+ffKhFeQznXAg2k1kdHyVlLabVLQ6W0SQCps7ZU2 sJ4WcB9Afmj6H3MAQ5FH75P+lNceJpSXYDP2HIRxMrmVo/VNpA2wJiKVMjCc/1oelQ 9beRNMKa6rTrdoKxqVZXrZrfJ0D5W/9Csqc3XlcI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sven Eckelmann , Marek Lindner , Simon Wunderlich , Sasha Levin Subject: [PATCH 4.9 02/35] batman-adv: Fix segfault when writing to throughput_override Date: Thu, 18 Oct 2018 19:54:31 +0200 Message-Id: <20181018175422.793287919@linuxfoundation.org> X-Mailer: git-send-email 2.19.1 In-Reply-To: <20181018175422.506152522@linuxfoundation.org> References: <20181018175422.506152522@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Sven Eckelmann [ Upstream commit b9fd14c20871e6189f635e49b32d7789e430b3c8 ] The per hardif sysfs file "batman_adv/throughput_override" prints the resulting change as info text when the users writes to this file. It uses the helper function batadv_info to add it at the same time to the kernel ring buffer and to the batman-adv debug log (when CONFIG_BATMAN_ADV_DEBUG is enabled). The function batadv_info requires as first parameter the batman-adv softif net_device. This parameter is then used to find the private buffer which contains the debug log for this batman-adv interface. But batadv_store_throughput_override used as first argument the slave net_device. This slave device doesn't have the batadv_priv private data which is access by batadv_info. Writing to this file with CONFIG_BATMAN_ADV_DEBUG enabled can either lead to a segfault or to memory corruption. Fixes: 0b5ecc6811bd ("batman-adv: add throughput override attribute to hard_ifaces") Signed-off-by: Sven Eckelmann Acked-by: Marek Lindner Signed-off-by: Simon Wunderlich Signed-off-by: Sasha Levin Signed-off-by: Greg Kroah-Hartman --- net/batman-adv/sysfs.c | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) --- a/net/batman-adv/sysfs.c +++ b/net/batman-adv/sysfs.c @@ -1084,8 +1084,9 @@ static ssize_t batadv_store_throughput_o if (old_tp_override == tp_override) goto out; - batadv_info(net_dev, "%s: Changing from: %u.%u MBit to: %u.%u MBit\n", - "throughput_override", + batadv_info(hard_iface->soft_iface, + "%s: %s: Changing from: %u.%u MBit to: %u.%u MBit\n", + "throughput_override", net_dev->name, old_tp_override / 10, old_tp_override % 10, tp_override / 10, tp_override % 10);