Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp800804pxb; Tue, 3 Nov 2020 12:55:21 -0800 (PST) X-Google-Smtp-Source: ABdhPJzJpom8URd4fKUFcFbGowbYfzvn2mUlCY0mt1wePAh+RdtuGF5quVAQKM0z3CXzRqwqZXxB X-Received: by 2002:a17:906:48a:: with SMTP id f10mr21417059eja.5.1604436920758; Tue, 03 Nov 2020 12:55:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604436920; cv=none; d=google.com; s=arc-20160816; b=Wjm12TY72wRtVMVmNUEuIduWt/sTn5m9BeJj+Vm9Xo13+ZuldS7i/dFJ+rBQpqGdlr lNgeYUywHyirW8k16o6fV36GPt8uQemuc9aIROXTFGUFtg4mRlD8chGpG6Uq6aRNyBGq q69f9zYW+owRAN6pc2qV8zVekSIJjgzK/bK8kjQKgjHDdHdu71oRswkn78rJ6n4nuw04 O86CYXz21/bjGenw1X1WuzxMlp/rDrt4GMH5OVSm8E8kDnYkrdD472tvKYoZWCNL2P9h GWv+8/TE24Sk2GYITRo+A9UXONbzjid2VMJIqolezBbGwUqiMCKVuvJCvyN4e0n91c4Z I74Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=TS5lWmpvf3PV+bHD0w34bORW3XFmbDdFDG/ksn2HG9M=; b=JqCzkPVZhNOeDoAdyn6FqCc+dx/RSUJPKAL2LTjThpsfSE516UusFIr5Uobw+s4x4P z27TSatgLKIXhG47koJCMgFc7Rv+4kg4kclfFHFxv0SL7TU4VmkmxtFY0MYTsn6Lh21S vYi+xIs/owvRmogfy4Pgacqfu0o7lAstKiDfRrIYIMIYoC5vcdHYcAviD0T1+OM9bJVH G8ctSO8iEn6MrNo7l8NzYRJZWrDcm+dQxV/8JaH9RCIA4HHQWcfs24YNUU1HZPV42kfF 4aJcjcu7dl7RG/3iHdac+WUBXSw0R4cT4g1JfatrhRuR/bC+ySCjdk8/FJB+UbSA05Kz Zwjg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YBul79fJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x14si3307753edq.219.2020.11.03.12.54.57; Tue, 03 Nov 2020 12:55:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=YBul79fJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731809AbgKCUua (ORCPT + 99 others); Tue, 3 Nov 2020 15:50:30 -0500 Received: from mail.kernel.org ([198.145.29.99]:44424 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731793AbgKCUu0 (ORCPT ); Tue, 3 Nov 2020 15:50:26 -0500 Received: from localhost (83-86-74-64.cable.dynamic.v4.ziggo.nl [83.86.74.64]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8E0A820719; Tue, 3 Nov 2020 20:50:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604436626; bh=6b8Zad7jOreNIBtR21Pp7q5CgMaXPTJhitl42m2QMR4=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=YBul79fJNY9t49NzWsUahuk/axZTELd4mAb84woLXTVdKDdodT8AtsMZtn9XSw+9a H37cBMypN8Kquo9chy356FRi9cNsIlJf75vPFE+nyRZ7XEBXMyA1aAsV3pm6i6JH8y rT36rtoTEN7EDIe1oFpDhhxLCtoaRbZRkW9xFZD0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Artur Molchanov , "J. Bruce Fields" Subject: [PATCH 5.9 331/391] net/sunrpc: Fix return value for sysctl sunrpc.transports Date: Tue, 3 Nov 2020 21:36:22 +0100 Message-Id: <20201103203409.457535281@linuxfoundation.org> X-Mailer: git-send-email 2.29.2 In-Reply-To: <20201103203348.153465465@linuxfoundation.org> References: <20201103203348.153465465@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Artur Molchanov commit c09f56b8f68d4d536bff518227aea323b835b2ce upstream. Fix returning value for sysctl sunrpc.transports. Return error code from sysctl proc_handler function proc_do_xprt instead of number of the written bytes. Otherwise sysctl returns random garbage for this key. Since v1: - Handle negative returned value from memory_read_from_buffer as an error Signed-off-by: Artur Molchanov Cc: stable@vger.kernel.org Signed-off-by: J. Bruce Fields Signed-off-by: Greg Kroah-Hartman --- net/sunrpc/sysctl.c | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) --- a/net/sunrpc/sysctl.c +++ b/net/sunrpc/sysctl.c @@ -70,7 +70,13 @@ static int proc_do_xprt(struct ctl_table return 0; } len = svc_print_xprts(tmpbuf, sizeof(tmpbuf)); - return memory_read_from_buffer(buffer, *lenp, ppos, tmpbuf, len); + *lenp = memory_read_from_buffer(buffer, *lenp, ppos, tmpbuf, len); + + if (*lenp < 0) { + *lenp = 0; + return -EINVAL; + } + return 0; } static int